Generated Fri Oct 22 07:12:57 PDT 1999 by

  • [Feustal73] E. A. Feustal On the Advantages of Tagged Architecture, IEEE Trans. on Computers C-22, no. 7 (July 1973):644--656. [This paper details a method for associating tags with all information in a computer system at the hardware level. It is the basis for many theoretically strong protection techniques based on the concept of associating protection information with other information for the purposes of deciding on the proper use of that information. These results were also used in Lisp workstations.]