Results 1 - 10
of
4,066
Lottery Scheduling: Flexible Proportional-Share Resource Management
, 1994
"... This paper presents lottery scheduling, a novel randomized resource allocation mechanism. Lottery scheduling provides efficient, responsive control over the relative execution rates of computations. Such control is beyond the capabilities of conventional schedulers, and is desirable in systems that ..."
Abstract
-
Cited by 480 (5 self)
- Add to MetaCart
that service requests of varying importance, such as databases, media-based applications, and networks. Lottery scheduling also supports modular resource management by enabling concurrent modules to insulate their resource allocation policies from one another. A currency abstraction is introduced to flexibly
Secure compilation to protected module architectures
- ACM TOPLAS
, 2015
"... A fully abstract compiler prevents security features of the source language from being bypassed by an at-tacker operating at the target language level. Unfortunately, developing fully abstract compilers is very complex, and it is even more so when the target language is an untyped assembly language. ..."
Abstract
-
Cited by 6 (4 self)
- Add to MetaCart
. To provide a fully abstract compiler that targets untyped assembly, it has been suggested to extend the target language with a protected module architecture — an assembly-level isolation mechanism which can be found in next-generation processors. This paper provides a fully abstract compilation scheme whose
Memoir: Practical State Continuity for Protected Modules
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract
-
Cited by 26 (7 self)
- Add to MetaCart
to a correct but stale version. For this reason, we present Memoir, the first system that fully ensures the continuity of a protected software module’s state. In other words, it ensures that a module’s state remains persistently and completely inviolate. A key contribution of Memoir is a technique
Fully Abstract Trace Semantics for Protected Module Architectures
"... Protected module architectures (PMA) are an isolation mechanism that emerg-ing processors provide as security building blocks for modern software systems. Reasoning about these building blocks means reasoning about elaborate assem-bly code, which can be very complex due to the loose structure of the ..."
Abstract
- Add to MetaCart
Protected module architectures (PMA) are an isolation mechanism that emerg-ing processors provide as security building blocks for modern software systems. Reasoning about these building blocks means reasoning about elaborate assem-bly code, which can be very complex due to the loose structure
Protection Module provides protection for the High Power
"... the Low-Level Radio-Frequency (LLRF) Field Control Module (FCM). The fault detection logic is implemented in a single FPGA allowing modifications and upgrades to the logic as we gain operational experience with the RF LINAC systems. This paper describes the integration and upgrade issues we have enc ..."
Abstract
- Add to MetaCart
the Low-Level Radio-Frequency (LLRF) Field Control Module (FCM). The fault detection logic is implemented in a single FPGA allowing modifications and upgrades to the logic as we gain operational experience with the RF LINAC systems. This paper describes the integration and upgrade issues we have
of Object-Oriented Components to Protected Module Architectures
, 2013
"... A fully abstract compilation scheme prevents the security features of the high-level language from being bypassed by an attacker compilation scheme from a realistic object-oriented language with dynamic memory allocation, cross-package inheritance, exceptions and inner classes to untyped machine cod ..."
Abstract
- Add to MetaCart
A fully abstract compilation scheme prevents the security features of the high-level language from being bypassed by an attacker compilation scheme from a realistic object-oriented language with dynamic memory allocation, cross-package inheritance, exceptions and inner classes to untyped machine code. Full abstraction of the compilation scheme relies on enhancing the low-level machine model with a fine-grained, program counter-based memory access control mechanism. This paper contains the outline of a formal proof of full abstraction of the compilation scheme. Measurements of the overhead introduced by the compilation scheme indicate that it is negligible. Secure Compilation
Cryptographic Key Protection Module in Hardware for the Need2Know System
"... Abstract — Traditional public key cryptographic methods provide access control to sensitive data by allowing the message sender to grant a single recipient permission to read the encrypted message. The Need2Know ® system (N2K) improves upon these methods by providing rolebased access control. N2K de ..."
Abstract
- Add to MetaCart
a hardware implementation. To this end, the main N2K algorithm, the Key Protection Module (KPM), was specified in VHDL. The design was built and tested incrementally: first the KPM controller was specified, then cryptographic sub-modules for random number generation, Elliptic Curve Cryptography (ECC
Design and Development of Protective Module for the Transmission of Data Using a PLUG-IN Program
, 2008
"... This paper provides a client environment in which web pages can be used safely through document securing function among Internet web browser (Netscape Communicator or Netscape Navigator) functions. Transmission of cryptographic web data is performed by using the protective module. One characteristic ..."
Abstract
- Add to MetaCart
This paper provides a client environment in which web pages can be used safely through document securing function among Internet web browser (Netscape Communicator or Netscape Navigator) functions. Transmission of cryptographic web data is performed by using the protective module. One
Implementation of a reconfigurable data protection module for noc-based mpsocs
- in Proc. IEEE 18th IEEE Int. Symposium on Parallel and Distributed Processing
, 2008
"... Security issues are emerging to be a basic concern in modern SoC development. Since in the field of on-chip interconnections the security problem continues to remain mostly an unexplored topic, this paper proposes a novel technique for data protection that uses the communication subsystem as basis. ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
. The proposed architecture works as a firewall managing the memory accesses on the basis of a lookup table containing the access rights. This module, called Data Protection Unit (DPU), has been designed for MPSoC architectures and integrated in the Network Inter-faces near the shared memory. We implement
Secure Compilation of Object-Oriented Components to Protected Module Architectures?
"... N.B. When citing this work, cite the original published paper. Permanent link to this version: ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
N.B. When citing this work, cite the original published paper. Permanent link to this version:
Results 1 - 10
of
4,066