DocumentCode :
2748232
Title :
Security models for priority buffering and interrupt handling
Author :
Rosenthal, David
Author_Institution :
Odyssey Research Associates, Inc., Ithaca, NY, USA
fYear :
1990
fDate :
12-14 Jun 1990
Firstpage :
91
Lastpage :
97
Abstract :
Ways to securely buffer messages are examined. The focus is on the development of a decomposition theorem for the theory of restrictiveness, so that if the buffering part of a process and the output part of a process satisfy the specified constraints then the combined process is restrictive. This technique is applied to a number of buffering methods, including a priority queue. A method of decomposition for interrupt handling is shown
Keywords :
interrupts; security of data; decomposition theorem; interrupt handling; priority buffering; priority queue; restrictiveness; Constraint theory; Contracts; Costs; Security; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop III, 1990. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2071-4
Type :
conf
DOI :
10.1109/CSFW.1990.128189
Filename :
128189
Link To Document :
بازگشت