Capability based tagged architectures
Lopriore - IEEE transactions on computers, 1984 - ieeexplore.ieee.org
An architecture is presented which incorporates capability based addressing and memory
tagging features. It defines three kinds of mechanisms for the implementation of object types …
tagging features. It defines three kinds of mechanisms for the implementation of object types …
A secure capability computer system
S Wiseman - 1986 IEEE Symposium on Security and Privacy, 1986 - ieeexplore.ieee.org
A secure computer system based on a capability architecture is described. Abstract types
are used to provide separation and the reference monitor function. By providing a trusted …
are used to provide separation and the reference monitor function. By providing a trusted …
[图书][B] Trends in operating systems towards dynamic user-level policy provision
KR Mayes - 1993 - apt.cs.manchester.ac.uk
It is possible to distinguish between policy and mechanism in operating system design.
There is a trend to move policy out of the operating system kernel and into the user-level …
There is a trend to move policy out of the operating system kernel and into the user-level …
Distributing and revoking access authorizations on abstract objecs: A capability approch
P Corsini, G Frosini, L Lopriore - Software: Practice and …, 1984 - Wiley Online Library
In this paper a capability addressing environment is presented, based on the concept of
extended capability. First of all it is shown that such an environment is well suited for …
extended capability. First of all it is shown that such an environment is well suited for …
An implementation of storage management in capability environments
P Corsini, L Lopriore - Software: Practice and Experience, 1995 - Wiley Online Library
The exploitation of the salient features of capability‐based addressing environments leads
to a high number of small objects existing in memory at the same time. It is thus necessary to …
to a high number of small objects existing in memory at the same time. It is thus necessary to …
The architecture of a capability-based microprocessor system
P Corsini, L Lopriore - IEEE Micro, 1987 - ieeexplore.ieee.org
The Architecture of a Capability-Based Microprocessor System Page 1 FEAT U RE By
implementing a capabilityoriented addressing scheme, tagged storage, and a single-level-store …
implementing a capabilityoriented addressing scheme, tagged storage, and a single-level-store …
Some problems arising out of the cross-disciplinary nature of information systems security
TC Wang - Proceedings of the Twenty-First Annual Hawaii …, 1988 - computer.org
It is suggested that risk management departments in companies are the appropriate location
for the information security risk manager (ISRM) position with its professional standards. An …
for the information security risk manager (ISRM) position with its professional standards. An …
[PDF][PDF] J. Goldberg, The Evolution of Fault Tolerant Computing at the Charles Stark Draper
J Bartlett, J Gray, B Horst, H Ihara, K Mori, S Miyamoto - researchgate.net
374 The Evolution of Dependable Computing in Italy present days, with in creased
emphasis being placed on dependability attributes. The growing interest of the Italian …
emphasis being placed on dependability attributes. The growing interest of the Italian …
The Evolution of Dependable Computing in Italy
P Ciompi, F Grandoni, L Strigini, L Simoncini - … : In the Honor of William C …, 1987 - Springer
This brief history of the evolution of dependable computing in Italy begins at the end of the
sixties with the need to produce test sequences and testing tools to verify hardware …
sixties with the need to produce test sequences and testing tools to verify hardware …