How to give control
Low-level interface
Fine-grained resource multiplexing
Limit management to protection
Visible revocation
Expose kernel data structures & hardware
Previous slide
Next slide
Back to first slide
View graphic version