DocumentCode
2748232
Title
Security models for priority buffering and interrupt handling
Author
Rosenthal, David
Author_Institution
Odyssey Research Associates, Inc., Ithaca, NY, USA
fYear
1990
fDate
12-14 Jun 1990
Firstpage
91
Lastpage
97
Abstract
Ways to securely buffer messages are examined. The focus is on the development of a decomposition theorem for the theory of restrictiveness, so that if the buffering part of a process and the output part of a process satisfy the specified constraints then the combined process is restrictive. This technique is applied to a number of buffering methods, including a priority queue. A method of decomposition for interrupt handling is shown
Keywords
interrupts; security of data; decomposition theorem; interrupt handling; priority buffering; priority queue; restrictiveness; Constraint theory; Contracts; Costs; Security; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop III, 1990. Proceedings
Conference_Location
Franconia, NH
Print_ISBN
0-8186-2071-4
Type
conf
DOI
10.1109/CSFW.1990.128189
Filename
128189
Link To Document