03.12.2016 Views

128-Bit Addressing in RISC-V and Security

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

AuthenCcaCon<br />

• The address space is unique over Cme <strong>and</strong> space. Any computer<br />

supporCng this address space is addressable by the name server.<br />

• Access<strong>in</strong>g an object for the first Cme requires<br />

– Permission to access (i.e., download A.OUT or .EXE file, entry with<strong>in</strong> an ACL)<br />

– Access privileges for the object<br />

• Local <strong>and</strong> Network read/write/execute<br />

• Access only thru a protected sub-object<br />

• ExecuCon Doma<strong>in</strong><br />

• Doma<strong>in</strong> of execuCon<br />

– Level of user (e.g., gold, plaCnum, execuCve plaCnum)<br />

– Adm<strong>in</strong> (Level 1, 2, or n)<br />

• In essence we have a global access control list<br />

– We have that today, but don’t realize it<br />

– It is distributed (e.g., ADOBE ma<strong>in</strong>ta<strong>in</strong>s it 2D slice of the matrix)<br />

– Each Vendor has their own access control list<br />

2016 _NOV _<strong>RISC</strong>V_WORKSHOP<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!