作者: Michael D. Schroeder , Jerome H. Saltzer
关键词: Distributed computing 、 Privilege (computing) 、 Hardware architecture 、 Computer science 、 Virtual memory 、 Hardware compatibility list 、 Memory protection 、 Access control 、 Memory address 、 General Computer Science
摘要: … rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to … way is a quality of their user interface. An obvious goal in designing new …