Loading…

Utilizing Hardware Features for Secure Thread Management

Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control,...

Full description

Saved in:
Bibliographic Details
Main Author: Isa, Haruna R
Format: Report
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Isa, Haruna R
description Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems. Master's thesis.
format report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA360097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA360097</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA3600973</originalsourceid><addsrcrecordid>eNrjZLAILcnMyazKzEtX8EgsSilPLEpVcEtNLCktSi1WSMsvUghOTQayFUIyilITUxR8E_MS01NzU_NKeBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHFJZl5qSbyji6OxmYGBpbkxAWkAK1grPA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Utilizing Hardware Features for Secure Thread Management</title><source>DTIC Technical Reports</source><creator>Isa, Haruna R</creator><creatorcontrib>Isa, Haruna R ; NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><description>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems. Master's thesis.</description><language>eng</language><subject>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE) ; COMMAND CONTROL COMMUNICATIONS ; Command, Control and Communications Systems ; COMPUTER ARCHITECTURE ; Computer Systems Management and Standards ; COMPUTERS ; COSTS ; DATA PROCESSING SECURITY ; DEPARTMENT OF DEFENSE ; ENVIRONMENTS ; ISOLATION ; MANAGEMENT INFORMATION SYSTEMS ; NAVY ; POLICIES ; PROCESSING ; QUEUEING THEORY ; SCHEDULING ; SECURITY ; SWITCHING ; TCB(TRUSTED COMPUTING BASE)</subject><creationdate>1998</creationdate><rights>APPROVED FOR PUBLIC RELEASE</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA360097$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Isa, Haruna R</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><title>Utilizing Hardware Features for Secure Thread Management</title><description>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems. Master's thesis.</description><subject>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE)</subject><subject>COMMAND CONTROL COMMUNICATIONS</subject><subject>Command, Control and Communications Systems</subject><subject>COMPUTER ARCHITECTURE</subject><subject>Computer Systems Management and Standards</subject><subject>COMPUTERS</subject><subject>COSTS</subject><subject>DATA PROCESSING SECURITY</subject><subject>DEPARTMENT OF DEFENSE</subject><subject>ENVIRONMENTS</subject><subject>ISOLATION</subject><subject>MANAGEMENT INFORMATION SYSTEMS</subject><subject>NAVY</subject><subject>POLICIES</subject><subject>PROCESSING</subject><subject>QUEUEING THEORY</subject><subject>SCHEDULING</subject><subject>SECURITY</subject><subject>SWITCHING</subject><subject>TCB(TRUSTED COMPUTING BASE)</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1998</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZLAILcnMyazKzEtX8EgsSilPLEpVcEtNLCktSi1WSMsvUghOTQayFUIyilITUxR8E_MS01NzU_NKeBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHFJZl5qSbyji6OxmYGBpbkxAWkAK1grPA</recordid><startdate>199812</startdate><enddate>199812</enddate><creator>Isa, Haruna R</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>199812</creationdate><title>Utilizing Hardware Features for Secure Thread Management</title><author>Isa, Haruna R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA3600973</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1998</creationdate><topic>C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE)</topic><topic>COMMAND CONTROL COMMUNICATIONS</topic><topic>Command, Control and Communications Systems</topic><topic>COMPUTER ARCHITECTURE</topic><topic>Computer Systems Management and Standards</topic><topic>COMPUTERS</topic><topic>COSTS</topic><topic>DATA PROCESSING SECURITY</topic><topic>DEPARTMENT OF DEFENSE</topic><topic>ENVIRONMENTS</topic><topic>ISOLATION</topic><topic>MANAGEMENT INFORMATION SYSTEMS</topic><topic>NAVY</topic><topic>POLICIES</topic><topic>PROCESSING</topic><topic>QUEUEING THEORY</topic><topic>SCHEDULING</topic><topic>SECURITY</topic><topic>SWITCHING</topic><topic>TCB(TRUSTED COMPUTING BASE)</topic><toplevel>online_resources</toplevel><creatorcontrib>Isa, Haruna R</creatorcontrib><creatorcontrib>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Isa, Haruna R</au><aucorp>NAVAL POSTGRADUATE SCHOOL MONTEREY CA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Utilizing Hardware Features for Secure Thread Management</btitle><date>1998-12</date><risdate>1998</risdate><abstract>Transaction processing (TP) applications are of use when solving a wide variety of data processing problems. Current commercial TP systems do not possess the ability to manage information at multiple security levels with high assurance. Department of Defense and Department of Navy Command, Control, Communication, Computers and Intelligence (C4I) applications handle information over a wide variety of classifications and compartments. The existence of TP applications that can securely process information of different classifications (with assurance) would save the DoD the need to create separate single level systems to process all necessary information. A trusted computing base (TCB) and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment has been designed. Intel's Pentium CPU architecture provides hardware with two distinct descriptor tables. One is used in the usual way for process isolation while the other is used for thread isolation. This allocation, together with an appropriately designed scheduling policy, permits us to avoid the full cost of process creation when only switching between threads of different security classes in the same process. where large numbers of transactions are encountered on transaction queues, this approach has benefits over traditional multilevel systems. Master's thesis.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA360097
source DTIC Technical Reports
subjects C4I(COMAND CONTROL COMMUNICATIONS COMPUTERS AND INTELLIGENCE)
COMMAND CONTROL COMMUNICATIONS
Command, Control and Communications Systems
COMPUTER ARCHITECTURE
Computer Systems Management and Standards
COMPUTERS
COSTS
DATA PROCESSING SECURITY
DEPARTMENT OF DEFENSE
ENVIRONMENTS
ISOLATION
MANAGEMENT INFORMATION SYSTEMS
NAVY
POLICIES
PROCESSING
QUEUEING THEORY
SCHEDULING
SECURITY
SWITCHING
TCB(TRUSTED COMPUTING BASE)
title Utilizing Hardware Features for Secure Thread Management
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T00%3A08%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Utilizing%20Hardware%20Features%20for%20Secure%20Thread%20Management&rft.au=Isa,%20Haruna%20R&rft.aucorp=NAVAL%20POSTGRADUATE%20SCHOOL%20MONTEREY%20CA&rft.date=1998-12&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA360097%3C/dtic_1RU%3E%3Cgrp_id%3Ecdi_FETCH-dtic_stinet_ADA3600973%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true