{"title":"非传统体系结构中的计算机安全","authors":"Terry A. Cureton","doi":"10.1145/800173.809696","DOIUrl":null,"url":null,"abstract":"Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.\n The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computer security in a non-traditional architecture\",\"authors\":\"Terry A. Cureton\",\"doi\":\"10.1145/800173.809696\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.\\n The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.\",\"PeriodicalId\":306306,\"journal\":{\"name\":\"ACM '83\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM '83\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800173.809696\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '83","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800173.809696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computer security in a non-traditional architecture
Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.
The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.