• DocumentCode
    2748232
  • Title

    Security models for priority buffering and interrupt handling

  • Author

    Rosenthal, David

  • Author_Institution
    Odyssey Research Associates, Inc., Ithaca, NY, USA
  • fYear
    1990
  • fDate
    12-14 Jun 1990
  • Firstpage
    91
  • Lastpage
    97
  • Abstract
    Ways to securely buffer messages are examined. The focus is on the development of a decomposition theorem for the theory of restrictiveness, so that if the buffering part of a process and the output part of a process satisfy the specified constraints then the combined process is restrictive. This technique is applied to a number of buffering methods, including a priority queue. A method of decomposition for interrupt handling is shown
  • Keywords
    interrupts; security of data; decomposition theorem; interrupt handling; priority buffering; priority queue; restrictiveness; Constraint theory; Contracts; Costs; Security; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop III, 1990. Proceedings
  • Conference_Location
    Franconia, NH
  • Print_ISBN
    0-8186-2071-4
  • Type

    conf

  • DOI
    10.1109/CSFW.1990.128189
  • Filename
    128189