Loading…
Utilizing Hardware Features for Secure Thread Management
Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control,...
Saved in:
Main Author: | |
---|---|
Format: | Report |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Isa, Haruna R |
description | Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems.
Master's thesis. |
format | report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA360097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA360097</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA3600973</originalsourceid><addsrcrecordid>eNrjZLAILcnMyazKzEtX8EgsSilPLEpVcEtNLCktSi1WSMsvUghOTQayFUIyilITUxR8E_MS01NzU_NKeBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHFJZl5qSbyji6OxmYGBpbkxAWkAK1grPA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Utilizing Hardware Features for Secure Thread Management</title><source>DTIC Technical Reports</source><creator>Isa, Haruna R</creator><creatorcontrib>Isa, Haruna R ; NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><description>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems.
Master's thesis.</description><language>eng</language><subject>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE) ; COMMAND CONTROL COMMUNICATIONS ; Command, Control and Communications Systems ; COMPUTER ARCHITECTURE ; Computer Systems Management and Standards ; COMPUTERS ; COSTS ; DATA PROCESSING SECURITY ; DEPARTMENT OF DEFENSE ; ENVIRONMENTS ; ISOLATION ; MANAGEMENT INFORMATION SYSTEMS ; NAVY ; POLICIES ; PROCESSING ; QUEUEING THEORY ; SCHEDULING ; SECURITY ; SWITCHING ; TCB(TRUSTED COMPUTING BASE)</subject><creationdate>1998</creationdate><rights>APPROVED FOR PUBLIC RELEASE</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA360097$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Isa, Haruna R</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><title>Utilizing Hardware Features for Secure Thread Management</title><description>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems.
Master's thesis.</description><subject>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE)</subject><subject>COMMAND CONTROL COMMUNICATIONS</subject><subject>Command, Control and Communications Systems</subject><subject>COMPUTER ARCHITECTURE</subject><subject>Computer Systems Management and Standards</subject><subject>COMPUTERS</subject><subject>COSTS</subject><subject>DATA PROCESSING SECURITY</subject><subject>DEPARTMENT OF DEFENSE</subject><subject>ENVIRONMENTS</subject><subject>ISOLATION</subject><subject>MANAGEMENT INFORMATION SYSTEMS</subject><subject>NAVY</subject><subject>POLICIES</subject><subject>PROCESSING</subject><subject>QUEUEING THEORY</subject><subject>SCHEDULING</subject><subject>SECURITY</subject><subject>SWITCHING</subject><subject>TCB(TRUSTED COMPUTING BASE)</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1998</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZLAILcnMyazKzEtX8EgsSilPLEpVcEtNLCktSi1WSMsvUghOTQayFUIyilITUxR8E_MS01NzU_NKeBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHFJZl5qSbyji6OxmYGBpbkxAWkAK1grPA</recordid><startdate>199812</startdate><enddate>199812</enddate><creator>Isa, Haruna R</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>199812</creationdate><title>Utilizing Hardware Features for Secure Thread Management</title><author>Isa, Haruna R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA3600973</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1998</creationdate><topic>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE)</topic><topic>COMMAND CONTROL COMMUNICATIONS</topic><topic>Command, Control and Communications Systems</topic><topic>COMPUTER ARCHITECTURE</topic><topic>Computer Systems Management and Standards</topic><topic>COMPUTERS</topic><topic>COSTS</topic><topic>DATA PROCESSING SECURITY</topic><topic>DEPARTMENT OF DEFENSE</topic><topic>ENVIRONMENTS</topic><topic>ISOLATION</topic><topic>MANAGEMENT INFORMATION SYSTEMS</topic><topic>NAVY</topic><topic>POLICIES</topic><topic>PROCESSING</topic><topic>QUEUEING THEORY</topic><topic>SCHEDULING</topic><topic>SECURITY</topic><topic>SWITCHING</topic><topic>TCB(TRUSTED COMPUTING BASE)</topic><toplevel>online_resources</toplevel><creatorcontrib>Isa, Haruna R</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Isa, Haruna R</au><aucorp>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Utilizing Hardware Features for Secure Thread Management</btitle><date>1998-12</date><risdate>1998</risdate><abstract>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems.
Master's thesis.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA360097 |
source | DTIC Technical Reports |
subjects | C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE) COMMAND CONTROL COMMUNICATIONS Command, Control and Communications Systems COMPUTER ARCHITECTURE Computer Systems Management and Standards COMPUTERS COSTS DATA PROCESSING SECURITY DEPARTMENT OF DEFENSE ENVIRONMENTS ISOLATION MANAGEMENT INFORMATION SYSTEMS NAVY POLICIES PROCESSING QUEUEING THEORY SCHEDULING SECURITY SWITCHING TCB(TRUSTED COMPUTING BASE) |
title | Utilizing Hardware Features for Secure Thread Management |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T00%3A08%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Utilizing%20Hardware%20Features%20for%20Secure%20Thread%20Management&rft.au=Isa,%20Haruna%20R&rft.aucorp=NAVAL%20POSTGRADUATE%20SCHOOL%20MONTEREY%20CA&rft.date=1998-12&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA360097%3C/dtic_1RU%3E%3Cgrp_id%3Ecdi_FETCH-dtic_stinet_ADA3600973%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |