It's Time: OS Mechanisms for Enforcing Asymmetric Temporal Integrity
نویسندگان
چکیده
Mixed-criticality systems combine real-time components of different levels of criticality, i.e. severity of failure, on the same processor, in order to obtain good resource utilisation. They must guarantee deadlines of highly-critical tasks at the expense of lower-criticality ones in the case of overload. Present operating systems provide inadequate support for this kind of system, which is of growing importance in avionics and other verticals. We present an approach that provides the required asymmetric integrity and its implementation in the high-assurance seL4 microkernel.
منابع مشابه
Enforcing Request Integrity in Web Applications
A web application is constructed to process an intended sequence of requests. Failing to enforce the intended sequences can lead to request integrity (RI) attacks, wherein an attacker forces an application into processing an unintended request sequence. Cross-site-request forgeries (CSRF) and workflow violations are two classes of RI attacks. Enforcing the intended request sequences is essentia...
متن کاملImplementing Temporal Integrity Constraints Using an Active DBMS
The system presented in this paper allows automatic and eecient translation of integrity constraints formulated in past temporal logic into rules of the Starburst DBMS. During the compilation the set of constraints is checked for the safe evaluation property. The result of the compilation is a set of Starburst SQL statements that deene all the necessary rules needed for enforcing the given cons...
متن کاملChomicki and Toman : Implementing Temporal Integrity Constraints Using an Active Dbms
|The paper proposes a general architecture for implementing temporal integrity constraints by compiling them into a set of active DBMS rules. The modularity of the design allows easy adaptation to diierent environments. Both diierences in the speciication languages and in the target rule systems can be easily accommodated. The advantages of this architecture are demonstrated on a particular tem...
متن کاملImplementing Temporal Integrity
|The paper proposes a general architecture for implementing temporal integrity constraints by compiling them into a set of active DBMS rules. The modularity of the design allows easy adaptation to diierent environments. Both diierences in the speciication languages and in the target rule systems can be easily accommodated. The advantages of this architecture are demonstrated on a particular tem...
متن کاملSpike timing dependent plasticity: mechanisms, significance, and controversies
Long-term modification of synaptic strength is one of the basic mechanisms of memory formation and activity-dependent refinement of neural circuits. This idea was purposed by Hebb to provide a basis for the formation of a cell assembly. Repetitive correlated activity of pre-synaptic and post-synaptic neurons can induce long-lasting synaptic strength modification, the direction and extent of whi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1606.00111 شماره
صفحات -
تاریخ انتشار 2016