{"id":"https://openalex.org/W1997840862","doi":"https://doi.org/10.4304/jcp.5.9.1297-1304","title":"Page Protection in Multithreaded Systems","display_name":"Page Protection in Multithreaded Systems","publication_year":2010,"publication_date":"2010-09-02","ids":{"openalex":"https://openalex.org/W1997840862","doi":"https://doi.org/10.4304/jcp.5.9.1297-1304","mag":"1997840862"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.5.9.1297-1304","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.5.9.1297-1304","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007891970","display_name":"Lanfranco Lopriore","orcid":null},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Lanfranco Lopriore","raw_affiliation_strings":["University of Pisa,#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Pisa,#TAB#","institution_ids":["https://openalex.org/I108290504"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5007891970"],"corresponding_institution_ids":["https://openalex.org/I108290504"],"apc_list":null,"apc_paid":null,"fwci":0.451,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71458927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":"9","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8578778505325317},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.8004487156867981},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.6272662878036499},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5634025931358337},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.5209980607032776},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.4874122440814972},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.4708268940448761},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.445789635181427},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.42446255683898926},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41187578439712524},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32943111658096313},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22053584456443787},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.14499825239181519},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.11591023206710815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8578778505325317},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.8004487156867981},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.6272662878036499},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5634025931358337},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.5209980607032776},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.4874122440814972},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.4708268940448761},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.445789635181427},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.42446255683898926},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41187578439712524},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32943111658096313},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22053584456443787},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.14499825239181519},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.11591023206710815},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4304/jcp.5.9.1297-1304","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.5.9.1297-1304","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},{"id":"pmh:oai:arpi.unipi.it:11568/141735","is_oa":false,"landing_page_url":"http://hdl.handle.net/11568/141735","pdf_url":null,"source":{"id":"https://openalex.org/S4377196265","display_name":"CINECA IRIS Institutial research information system (University of Pisa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I108290504","host_organization_name":"University of Pisa","host_organization_lineage":["https://openalex.org/I108290504"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W19193381","https://openalex.org/W565629685","https://openalex.org/W1520961854","https://openalex.org/W1965071495","https://openalex.org/W1974232202","https://openalex.org/W1993450876","https://openalex.org/W2018390443","https://openalex.org/W2065076704","https://openalex.org/W2081680436","https://openalex.org/W2097413040","https://openalex.org/W2123433847","https://openalex.org/W2137622193","https://openalex.org/W2144977275","https://openalex.org/W2146878883","https://openalex.org/W2151300542","https://openalex.org/W2153950928","https://openalex.org/W2157185728","https://openalex.org/W2162568437","https://openalex.org/W2167270386"],"related_works":["https://openalex.org/W4244773577","https://openalex.org/W2083276427","https://openalex.org/W2052673929","https://openalex.org/W2484072889","https://openalex.org/W4381611581","https://openalex.org/W4385373783","https://openalex.org/W3171324578","https://openalex.org/W4243333834","https://openalex.org/W82576482","https://openalex.org/W2501039532"],"abstract_inverted_index":{"With":[0],"reference":[1],"to":[2,24,35,57,123,165,192,194,210],"a":[3,11,16,32,83,89,161,202],"classical":[4],"address":[5],"translation\\n\\nscheme":[6],"supporting":[7],"the":[8,36,39,48,63,66,72,79,104,109,141,154,170,178,183,190],"notion":[9],"of":[10,65,71,82,91,93,96,112,143,156,204],"paged":[12],"virtual":[13,180],"address\\n\\nspace,":[14],"and":[15,78,167],"program":[17,151],"execution":[18],"environment":[19,137],"in":[20,177],"which":[21],"programs\\n\\nare":[22],"allowed":[23],"have":[25,76],"multiple":[26],"concurrent":[27],"threads":[28,70],"of\\n\\nexecution,":[29],"we":[30],"present":[31],"low-cost":[33],"addition":[34,155],"usual":[37],"hardware\\n\\ninside":[38],"memory":[40],"management":[41],"unit":[42],"aimed":[43],"at":[44,47,101,120,139],"supporting\\n\\npage":[45],"protection":[46,136,196,200,213],"thread":[49,85,106,119],"level.":[50],"The":[51],"resulting":[52],"protection\\n\\nsystem":[53],"makes":[54],"it":[55],"possible":[56,209],"define":[58],"several":[59],"distinct":[60],"protection\\n\\ndomains":[61],"within":[62],"boundaries":[64],"same":[67,73,179],"virtual\\n\\nspace.":[68],"Different":[69],"process":[74],"can":[75],"different\\n\\ndomains,":[77],"access":[80,97],"rights":[81],"given":[84,108],"can\\n\\nchange":[86],"dynamically":[87],"as":[88,182],"consequence":[90],"actions":[92],"amplification\\n\\nand":[94],"reduction":[95],"privileges,":[98],"so":[99],"that":[100,114,118,121,207],"any":[102],"given\\n\\ntime":[103],"running":[105],"is":[107,115,152],"smallest":[110],"set":[111,203],"access\\n\\nrights":[113],"necessary":[116],"for":[117],"time":[122],"carry\\n\\nout":[124],"its":[125],"job.\\n\\nRather":[126],"than":[127],"protecting":[128],"applications":[129],"from":[130],"software":[131],"attacks\\n\\nof":[132],"malicious":[133],"code,":[134,159],"our":[135,199],"is\\n\\naimed":[138],"limiting":[140],"consequences":[142],"programming":[144],"errors,\\n\\nfor":[145],"instance,":[146],"when":[147],"an":[148],"otherwise":[149],"secure":[150],"extended\\n\\nby":[153],"unverified":[157],"foreign":[158],"e.g.":[160],"plugin":[162],"that\\n\\nis":[163],"prone":[164],"corrupt":[166],"even":[168],"crash":[169],"main":[171],"process,":[172],"or":[173],"a\\n\\ndevice":[174],"driver":[175],"executed":[176],"space":[181],"operating\\n\\nsystem":[184],"kernel.":[185],"We":[186],"do":[187],"not":[188],"force":[189],"user":[191],"adhere":[193],"a\\n\\nspecific":[195],"model.":[197],"Instead,":[198],"system\\n\\nfeatures":[201],"hardware/software":[205],"mechanisms":[206],"makes\\n\\nit":[208],"implement":[211],"different":[212],"paradigms":[214],"at\\n\\nlittle":[215],"effort.":[216]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
