Table II. Instruction Breakdown of the Common Path … [31-48 operations] … Enter new protection domain [161 instructions] … Restore old protection domain [30 instructions] … The performance results show that access control operations … only impose as much structure as strictly necessary. … [p. 59] [For example] Our security policy places the Web … [file] cache operations. … The end-to-end performance experiment thus shows that the … security policy.
Google-1
Google-2
Copyright clearance needed for quotation.