A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enforcing high-level protocols in low-level software
2001
Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation - PLDI '01
We validate the utility of our approach by enforcing protocols present in the interface between the Windows 2000 kernel and its device drivers. ¡ Accessing a value means applying a primitive operation ...
The Vault programming language allows a programmer to describe resource management protocols that the compiler can statically enforce. ...
Like the Vault project, the SLAM project at Microsoft Research is also focussed on using exhaustive static analysis to enforce protocols of low-level software [1] . ...
doi:10.1145/378795.378811
dblp:conf/pldi/DeLineF01
fatcat:offf7xx3mnhgbnnbx5yzlfjoa4
Enforcing high-level protocols in low-level software
2001
SIGPLAN notices
We validate the utility of our approach by enforcing protocols present in the interface between the Windows 2000 kernel and its device drivers. ¡ Accessing a value means applying a primitive operation ...
The Vault programming language allows a programmer to describe resource management protocols that the compiler can statically enforce. ...
Like the Vault project, the SLAM project at Microsoft Research is also focussed on using exhaustive static analysis to enforce protocols of low-level software [1] . ...
doi:10.1145/381694.378811
fatcat:ahi5iyz4tfggvafgd6bxagiuny
The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level ...
This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced. ...
The locus of policy enforcement in MYSEA is a federation of high assurance servers. ...
doi:10.1145/1655108.1655115
dblp:conf/ccs/IrvineNSLKPCG09
fatcat:t7mnl7ltlbdrtdedcxlbepvhmy
From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture
2017
International Journal of Mobile Network Design and Innovation
A novel cross-domain solution is presented as the thread in-between the two approaches. ...
The requirement to protect information characterised by a hierarchy of sensitivity levels led to the definition of multilevel security. ...
There are two virtualised subjects, one connected to the low classification level network, in the following referred as low-side subject (LSS), the other connected to the high classification level network ...
doi:10.1504/ijmndi.2017.082802
fatcat:jihunjqyr5fotmvsymol4j5u3e
Improving network management with software defined networking
2013
IEEE Communications Magazine
Network configuration remains incredibly difficult because implementing these high-level policies requires specifying them in terms of distributed low-level configuration. ...
Procera effectively serves as a glue between high-level event-driven network policies and low-level network configuration. ...
doi:10.1109/mcom.2013.6461195
fatcat:k3pqiymphrexzcpcpyi2kdb4fe
Middleware for real-time and embedded systems
2002
Communications of the ACM
Schmidt received B.S. and M.A. degrees in Sociology from the College of William and Mary in Williamsburg, Virginia, and an M.S. and a Ph.D. in Computer Science from the University of California, Irvine ...
(UCI) in 1984, 1986, 1990, and 1994, respectively. ...
These layers include the following capabilities: LOW
LOW--LEVEL LEVEL
MIDDLEWARE
MIDDLEWARE
OPERATING
OPERATING
SYSTEMS
SYSTEMS &
&
PROTOCOLS
PROTOCOLS
HIGHER
HIGHER--LEVEL LEVEL
MIDDLEWARE ...
doi:10.1145/508448.508472
fatcat:aozfva7plvd5zho5ughpy5bxni
Design a Resilient Network Infrastructure Security Policy Framework
2016
Indian Journal of Science and Technology
This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation. ...
This paper presents a security framework to bridge the gap between high level specification requirements and the low level implementation phase for network infrastructure security using the network architecture ...
This provides the ability to have yet-to-be developed low-level components in the form of black box sub components in high-level design model. ...
doi:10.17485/ijst/2016/v9i19/90133
fatcat:5ce6d46pwvdhlb5dao5emeuesu
An Approach to Security Requirements Engineering for a High Assurance System *
2002
Requirements Engineering
Requirements specifications for high assurance secure systems are rare in the open literature. ...
We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. ...
These requests will be passed on to untrusted Application Protocol Servers, operating as a system defined anonymous user, at a system defined low secrecy, low integrity, session sensitivity level. ...
doi:10.1007/s007660200015
fatcat:652zihg3nfcdpaazyyu2e2ajom
Toward Edge-enabled Cyber-Physical Systems Testbeds
[article]
2019
arXiv
pre-print
The use of edge computing can be extremely valuable in support of CPS efforts. ...
We present the purpose of our work, the basic architecture, initial results, the relationship to the existing software, and the potential of an existing edge-focused framework to support the foundations ...
This type of high-level scheduling of low-level, geographically distributed resources is very different from the way cloud providers, such as Amazon EC2 provide resources. ...
arXiv:1910.01173v1
fatcat:x7db3tna2zdbfgekhnsaegrsva
Enabling Virtual AAA Management in SDN-Based IoT Networks †
2019
Sensors
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things ...
(AAA) as well as Channel Protection virtual security functions in IoT networks enabled with SDN/NFV. ...
A high-level channel protection policy allows for specifying protection requirement regardless of the underlying channel protection techniques and protocols, and the high-level security policy is translated ...
doi:10.3390/s19020295
fatcat:5o6pyk6tdbfnljt72gp3ulxis4
Enforcing interoperability with the open archives initiative repository explorer
2001
Proceedings of the first ACM/IEEE-CS joint conference on Digital libraries - JCDL '01
The lack of standardized implementation is a substantial barrier to interoperability in many existing client/server protocols. ...
The success of such an activity requires vigilance in specification of the protocol as well as standardization of implementation. ...
As one approach to address these concerns, we developed a protocol tester that would allow a user to perform low-level protocol tests on a server implementation without the need for a corresponding client ...
doi:10.1145/379437.379450
dblp:conf/jcdl/Suleman01
fatcat:tndyn6gpuvajjgxauhc2xw4fky
From human regulations to regulated software agents' behavior
2007
Artificial Intelligence and Law
Acknowledgements This position paper compiles results of work done in collaboration with Frank Dignum, Virginia Dignum, John-Jules Ch. Meyer, Davide Grossi and Huib Aldewereld. ...
The HarmonIA framework only covered the normative di-mension of e-Institutions and proposed a way to connect the high-and low-levels. ...
norms at a very high, declarative, abstract level, formally specifying norms in, e.g., deontic logic. ...
doi:10.1007/s10506-007-9057-x
fatcat:xhp6v37jp5devkyr4s5dtp57sq
A high-assurance, virtual guard architecture
2012
MILCOM 2012 - 2012 IEEE Military Communications Conference
The Low Message Buffer has a secrecy level of "Low" and, from this point on, all processing in the guard is done at the "Low" secrecy level.
3) Guard Output The Output Queue Manager is an assured pipeline ...
High-assurance features GEMSOS is "high-assurance" due to a high level of trust that the protection mechanisms of the system correctly enforce the security policy during all phases of the system lifecycle ...
doi:10.1109/milcom.2012.6415677
dblp:conf/milcom/HeckmanSR12
fatcat:olgo6ex6ljazti7wnnvlhv7f4y
A programmable, generic forwarding element approach for dynamic network functionality
2009
Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow - PRESTO '09
In this paper, we introduce a programmable, generic forwarding element (GFE), which can be used as a platform for a flexible and reconfigurable network system. ...
LFB Classifier This is the first LFB, which is mandatory in the classification phase of the Low Level Rule Enforcer. ...
Software [6] and reconfigurable [13] routers have also been suggested to define low-level behavior of a network node. ...
doi:10.1145/1592631.1592637
dblp:conf/sigcomm/GiladiY09
fatcat:7bdeyhvqhveonli7au2dh3gahu
Towards robust OSes for appliances
2000
Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9
Consequently, there must be a high level of confidence in the software. Additionally, the pace of innovation requires rapid OS development so as to match ever changing needs of new appliances. ...
To offer confidence, software must be highly robust. ...
Furthermore, developing an OS requires low-level expressiveness, not covered by a high-level language (e.g., manipulation of raw data). ...
doi:10.1145/566726.566732
dblp:conf/sigopsE/MullerCMBMR00
fatcat:pmuakjazc5adfi7t6saa2la6me
« Previous
Showing results 1 — 15 out of 83,702 results