Filters








83,702 Hits in 6.5 sec

Enforcing high-level protocols in low-level software

Robert DeLine, Manuel Fähndrich
2001 Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation - PLDI '01  
We validate the utility of our approach by enforcing protocols present in the interface between the Windows 2000 kernel and its device drivers. ¡ Accessing a value means applying a primitive operation  ...  The Vault programming language allows a programmer to describe resource management protocols that the compiler can statically enforce.  ...  Like the Vault project, the SLAM project at Microsoft Research is also focussed on using exhaustive static analysis to enforce protocols of low-level software [1] .  ... 
doi:10.1145/378795.378811 dblp:conf/pldi/DeLineF01 fatcat:offf7xx3mnhgbnnbx5yzlfjoa4

Enforcing high-level protocols in low-level software

Robert DeLine, Manuel Fähndrich
2001 SIGPLAN notices  
We validate the utility of our approach by enforcing protocols present in the interface between the Windows 2000 kernel and its device drivers. ¡ Accessing a value means applying a primitive operation  ...  The Vault programming language allows a programmer to describe resource management protocols that the compiler can statically enforce.  ...  Like the Vault project, the SLAM project at Microsoft Research is also focussed on using exhaustive static analysis to enforce protocols of low-level software [1] .  ... 
doi:10.1145/381694.378811 fatcat:ahi5iyz4tfggvafgd6bxagiuny

MYSEA

Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, Mark Gondree
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
The MYSEA architecture uses component security services and mechanisms to extend and inter-operate with commodity PCs, commodity client software, applications, trusted components, and legacy single level  ...  This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.  ...  The locus of policy enforcement in MYSEA is a federation of high assurance servers.  ... 
doi:10.1145/1655108.1655115 dblp:conf/ccs/IrvineNSLKPCG09 fatcat:t7mnl7ltlbdrtdedcxlbepvhmy

From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture

Angelo Liguori
2017 International Journal of Mobile Network Design and Innovation  
A novel cross-domain solution is presented as the thread in-between the two approaches.  ...  The requirement to protect information characterised by a hierarchy of sensitivity levels led to the definition of multilevel security.  ...  There are two virtualised subjects, one connected to the low classification level network, in the following referred as low-side subject (LSS), the other connected to the high classification level network  ... 
doi:10.1504/ijmndi.2017.082802 fatcat:jihunjqyr5fotmvsymol4j5u3e

Improving network management with software defined networking

Hyojoon Kim, Nick Feamster
2013 IEEE Communications Magazine  
Network configuration remains incredibly difficult because implementing these high-level policies requires specifying them in terms of distributed low-level configuration.  ...  Procera effectively serves as a glue between high-level event-driven network policies and low-level network configuration.  ... 
doi:10.1109/mcom.2013.6461195 fatcat:k3pqiymphrexzcpcpyi2kdb4fe

Middleware for real-time and embedded systems

Douglas C. Schmidt
2002 Communications of the ACM  
Schmidt received B.S. and M.A. degrees in Sociology from the College of William and Mary in Williamsburg, Virginia, and an M.S. and a Ph.D. in Computer Science from the University of California, Irvine  ...  (UCI) in 1984, 1986, 1990, and 1994, respectively.  ...  These layers include the following capabilities: LOW LOW--LEVEL LEVEL MIDDLEWARE MIDDLEWARE OPERATING OPERATING SYSTEMS SYSTEMS & & PROTOCOLS PROTOCOLS HIGHER HIGHER--LEVEL LEVEL MIDDLEWARE  ... 
doi:10.1145/508448.508472 fatcat:aozfva7plvd5zho5ughpy5bxni

Design a Resilient Network Infrastructure Security Policy Framework

Akashdeep Bhardwaj, G. V. B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry
2016 Indian Journal of Science and Technology  
This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation.  ...  This paper presents a security framework to bridge the gap between high level specification requirements and the low level implementation phase for network infrastructure security using the network architecture  ...  This provides the ability to have yet-to-be developed low-level components in the form of black box sub components in high-level design model.  ... 
doi:10.17485/ijst/2016/v9i19/90133 fatcat:5ce6d46pwvdhlb5dao5emeuesu

An Approach to Security Requirements Engineering for a High Assurance System *

Cynthia E. Irvine, Timothy Levin, Jeffery D. Wilson, David Shifflett, Barbara Pereira
2002 Requirements Engineering  
Requirements specifications for high assurance secure systems are rare in the open literature.  ...  We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering.  ...  These requests will be passed on to untrusted Application Protocol Servers, operating as a system defined anonymous user, at a system defined low secrecy, low integrity, session sensitivity level.  ... 
doi:10.1007/s007660200015 fatcat:652zihg3nfcdpaazyyu2e2ajom

Toward Edge-enabled Cyber-Physical Systems Testbeds [article]

V. K. Cody Bumgardner, Nima Seyedtalebi, Caylin Hickey
2019 arXiv   pre-print
The use of edge computing can be extremely valuable in support of CPS efforts.  ...  We present the purpose of our work, the basic architecture, initial results, the relationship to the existing software, and the potential of an existing edge-focused framework to support the foundations  ...  This type of high-level scheduling of low-level, geographically distributed resources is very different from the way cloud providers, such as Amazon EC2 provide resources.  ... 
arXiv:1910.01173v1 fatcat:x7db3tna2zdbfgekhnsaegrsva

Enabling Virtual AAA Management in SDN-Based IoT Networks †

Alejandro Molina Zarca, Dan Garcia-Carrillo, Jorge Bernal Bernabe, Jordi Ortiz, Rafael Marin-Perez, Antonio Skarmeta
2019 Sensors  
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things  ...  (AAA) as well as Channel Protection virtual security functions in IoT networks enabled with SDN/NFV.  ...  A high-level channel protection policy allows for specifying protection requirement regardless of the underlying channel protection techniques and protocols, and the high-level security policy is translated  ... 
doi:10.3390/s19020295 fatcat:5o6pyk6tdbfnljt72gp3ulxis4

Enforcing interoperability with the open archives initiative repository explorer

Hussein Suleman
2001 Proceedings of the first ACM/IEEE-CS joint conference on Digital libraries - JCDL '01  
The lack of standardized implementation is a substantial barrier to interoperability in many existing client/server protocols.  ...  The success of such an activity requires vigilance in specification of the protocol as well as standardization of implementation.  ...  As one approach to address these concerns, we developed a protocol tester that would allow a user to perform low-level protocol tests on a server implementation without the need for a corresponding client  ... 
doi:10.1145/379437.379450 dblp:conf/jcdl/Suleman01 fatcat:tndyn6gpuvajjgxauhc2xw4fky

From human regulations to regulated software agents' behavior

Javier Vázquez-Salceda, Huib Aldewereld, Davide Grossi, Frank Dignum
2007 Artificial Intelligence and Law  
Acknowledgements This position paper compiles results of work done in collaboration with Frank Dignum, Virginia Dignum, John-Jules Ch. Meyer, Davide Grossi and Huib Aldewereld.  ...  The HarmonIA framework only covered the normative di-mension of e-Institutions and proposed a way to connect the high-and low-levels.  ...  norms at a very high, declarative, abstract level, formally specifying norms in, e.g., deontic logic.  ... 
doi:10.1007/s10506-007-9057-x fatcat:xhp6v37jp5devkyr4s5dtp57sq

A high-assurance, virtual guard architecture

Mark R. Heckman, Roger R. Schell, Edwards E. Reed
2012 MILCOM 2012 - 2012 IEEE Military Communications Conference  
The Low Message Buffer has a secrecy level of "Low" and, from this point on, all processing in the guard is done at the "Low" secrecy level. 3) Guard Output The Output Queue Manager is an assured pipeline  ...  High-assurance features GEMSOS is "high-assurance" due to a high level of trust that the protection mechanisms of the system correctly enforce the security policy during all phases of the system lifecycle  ... 
doi:10.1109/milcom.2012.6415677 dblp:conf/milcom/HeckmanSR12 fatcat:olgo6ex6ljazti7wnnvlhv7f4y

A programmable, generic forwarding element approach for dynamic network functionality

Ran Giladi, Niv Yemini
2009 Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow - PRESTO '09  
In this paper, we introduce a programmable, generic forwarding element (GFE), which can be used as a platform for a flexible and reconfigurable network system.  ...  LFB Classifier This is the first LFB, which is mandatory in the classification phase of the Low Level Rule Enforcer.  ...  Software [6] and reconfigurable [13] routers have also been suggested to define low-level behavior of a network node.  ... 
doi:10.1145/1592631.1592637 dblp:conf/sigcomm/GiladiY09 fatcat:7bdeyhvqhveonli7au2dh3gahu

Towards robust OSes for appliances

Gilles Muller, Charles Consel, Renaud Marlet, Luciano Porto Barreto, Fabrice Mérillon, Laurent Réveillère
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Consequently, there must be a high level of confidence in the software. Additionally, the pace of innovation requires rapid OS development so as to match ever changing needs of new appliances.  ...  To offer confidence, software must be highly robust.  ...  Furthermore, developing an OS requires low-level expressiveness, not covered by a high-level language (e.g., manipulation of raw data).  ... 
doi:10.1145/566726.566732 dblp:conf/sigopsE/MullerCMBMR00 fatcat:pmuakjazc5adfi7t6saa2la6me
« Previous Showing results 1 — 15 out of 83,702 results