Title :
Security models for priority buffering and interrupt handling
Author :
Rosenthal, David
Author_Institution :
Odyssey Research Associates, Inc., Ithaca, NY, USA
Abstract :
Ways to securely buffer messages are examined. The focus is on the development of a decomposition theorem for the theory of restrictiveness, so that if the buffering part of a process and the output part of a process satisfy the specified constraints then the combined process is restrictive. This technique is applied to a number of buffering methods, including a priority queue. A method of decomposition for interrupt handling is shown
Keywords :
interrupts; security of data; decomposition theorem; interrupt handling; priority buffering; priority queue; restrictiveness; Constraint theory; Contracts; Costs; Security; Testing;
Conference_Titel :
Computer Security Foundations Workshop III, 1990. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2071-4
DOI :
10.1109/CSFW.1990.128189