It's Time: OS Mechanisms for Enforcing Asymmetric Temporal Integrity

نویسندگان

  • Anna Lyons
  • Gernot Heiser
چکیده

Mixed-criticality systems combine real-time components of different levels of criticality, i.e. severity of failure, on the same processor, in order to obtain good resource utilisation. They must guarantee deadlines of highly-critical tasks at the expense of lower-criticality ones in the case of overload. Present operating systems provide inadequate support for this kind of system, which is of growing importance in avionics and other verticals. We present an approach that provides the required asymmetric integrity and its implementation in the high-assurance seL4 microkernel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing Request Integrity in Web Applications

A web application is constructed to process an intended sequence of requests. Failing to enforce the intended sequences can lead to request integrity (RI) attacks, wherein an attacker forces an application into processing an unintended request sequence. Cross-site-request forgeries (CSRF) and workflow violations are two classes of RI attacks. Enforcing the intended request sequences is essentia...

متن کامل

Implementing Temporal Integrity Constraints Using an Active DBMS

The system presented in this paper allows automatic and eecient translation of integrity constraints formulated in past temporal logic into rules of the Starburst DBMS. During the compilation the set of constraints is checked for the safe evaluation property. The result of the compilation is a set of Starburst SQL statements that deene all the necessary rules needed for enforcing the given cons...

متن کامل

Chomicki and Toman : Implementing Temporal Integrity Constraints Using an Active Dbms

|The paper proposes a general architecture for implementing temporal integrity constraints by compiling them into a set of active DBMS rules. The modularity of the design allows easy adaptation to diierent environments. Both diierences in the speciication languages and in the target rule systems can be easily accommodated. The advantages of this architecture are demonstrated on a particular tem...

متن کامل

Implementing Temporal Integrity

|The paper proposes a general architecture for implementing temporal integrity constraints by compiling them into a set of active DBMS rules. The modularity of the design allows easy adaptation to diierent environments. Both diierences in the speciication languages and in the target rule systems can be easily accommodated. The advantages of this architecture are demonstrated on a particular tem...

متن کامل

Spike timing dependent plasticity: mechanisms, significance, and controversies

Long-term modification of synaptic strength is one of the basic mechanisms of memory formation and activity-dependent refinement of neural circuits. This idea was purposed by Hebb to provide a basis for the formation of a cell assembly. Repetitive correlated activity of pre-synaptic and post-synaptic neurons can induce long-lasting synaptic strength modification, the direction and extent of whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1606.00111  شماره 

صفحات  -

تاریخ انتشار 2016