1972
DOI: 10.1145/361268.361275
|View full text |Cite
|
Sign up to set email alerts
|

A hardware architecture for implementing protection rings

Abstract: Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of referen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

1974
1974
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(37 citation statements)
references
References 10 publications
(7 reference statements)
0
37
0
Order By: Relevance
“…We are also exploring multilevel aware collaboration services, and the addition of QoSS to services other than network security. Additional future work includes a Network File System (NFS) port enhanced with ring-like privileges [68] in the user domain, to help constrain the behavior of applications, and a multilevel aware or multilevel DNS service [20].…”
Section: Discussionmentioning
confidence: 99%
“…We are also exploring multilevel aware collaboration services, and the addition of QoSS to services other than network security. Additional future work includes a Network File System (NFS) port enhanced with ring-like privileges [68] in the user domain, to help constrain the behavior of applications, and a multilevel aware or multilevel DNS service [20].…”
Section: Discussionmentioning
confidence: 99%
“…HiStar uses gates for protected control transfer, an idea dating back to Multics [21]. However, HiStar's protection domains are not hierarchical like Multics rings.…”
Section: Related Workmentioning
confidence: 99%
“…[2] The label space may support confidentiality and integrity policies as well as non-hierarchical categories, [26] A security kernel usually provides a hardware-supported ring abstraction [43][44] and can host trusted subjects. [39] The rings can separate applications within a process.…”
Section: Security Kernelmentioning
confidence: 99%
“…The "second-order" policy of PK-based architectures is not as concrete as the EP architecture's MLS model. Also, the MILS architecture lacks an overarching abstraction like rings for organizing program integrity and privilege [43]: those considerations must be handled in an ad hoc fashion via restrictions defined in AC-subject configuration data. As a result, it is more likely that the intended MLS policy can be undermined in a MILS-or LP-based system through programmer and verifier confusion (e.g., in constructing either the AC-subject or the configuration tool).…”
Section: Structural Abstractionsmentioning
confidence: 99%