CERIAS Tech Report 2005-44 CUPIDS ENHANCES STUPIDS: EXPLORING A CO-PROCESSING PARADIGM SHIFT IN INFORMATION SYSTEM
نویسندگان
چکیده
The CuPIDS project is an exploration of increasing information system security by dedicating computational resources to system security tasks in a shared resource, multi-processor (MP) architecture. Our research explores ways in which this architecture offers improvements over the traditional uni-processor (UP) model of security. There are a number of areas to explore, one of which has a protected application running on one processor in a symmetric multiprocessing (SMP) system while a shadow process specific to that application runs on a different processor, monitoring its activity, ready to respond immediately if the application veers off course. This paper describes initial work into defining such an architecture and the prototype work done to validate our ideas.
منابع مشابه
CERIAS Tech Report 2005-42 A POLICY FRAMEWORK FOR ACCESS MANAGEMENT IN FEDERATED INFORMATION SHARING
متن کامل
CERIAS Tech Report 2005-34 ON CONNECTING RED AND BLUE RECTANGLES WITH NONINTERSECTING MONOTONE RECTILINEAR PATHS
متن کامل
An Exploration of Highly Focused , Coprocessor - based Information System Protection
The Co-Processing Intrusion Detection System (CuPIDS) project explores improving information system security through dedicating computational resources to system security tasks in a shared resource, multi-processor (MP) architecture. Our research explores ways in which this architecture offers improvements over the traditional uni-processor (UP) model of security. One approach we examined has a...
متن کاملCERIAS Tech Report 2005-83 A THEORY BASED ON SECURITY ANALYSIS FOR COMPARING THE EXPRESSIVE POWER OF ACCESS CONTROL MODELS
Tripunitara, Mahesh V. Ph.D., Purdue University, December, 2005. A Theory Based on Security Analysis for Comparing the Expressive Power of Access Control Models. Major Professor: Ninghui Li. We present a theory for comparing the expressive power of access control models. Our theory is based on reductions that preserve the results of security analysis. Security analysis is an approach to the ver...
متن کاملCERIAS Tech Report 2005-11 REMOTE REVOCATION OF SMART CARDS IN A PRIVATE DRM SYSTEM
We describe a DRM smartcard-based scheme in which content access requests are not linked to a user’s identity or smartcard, and in which compromised cards can be revoked without the need to communicate with any card (whether revoked or not). The scheme has many other features, such as efficiency and requiring minimal interaction to process an access request (no complex interactive protocols), f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005