Security issues and Ada runtime support

This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime syste...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Harrison, L.J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 183
container_issue
container_start_page 177
container_title
container_volume
creator Harrison, L.J.
description This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.< >
doi_str_mv 10.1109/CSAC.1989.81049
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_81049</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>81049</ieee_id><sourcerecordid>81049</sourcerecordid><originalsourceid>FETCH-LOGICAL-g135t-fc7d0babdaa1720ed8c0c8401de725fd42613a0bbec33cb4f0c2ecc2a22130963</originalsourceid><addsrcrecordid>eNotjz1PwzAUAC1VSJTSGbF5Y0r6nj8Se4wioJUqMRTmyh8vyIiWyE6G_nsQcMttJx1jdwg1IthNf-j6Gq2xtUFQdsFuwKBpBECjrtm6lA_4QWsDVi_Zw4HCnNN04amUmQp358i76Hiez1M6ES_zOH7l6ZZdDe6z0PrfK_b29Pjab6v9y_Ou7_bVO0o9VUNoI3jno3PYCqBoAgSjACO1Qg9RiQalA-8pSBm8GiAICkE4IVCCbeSK3f91ExEdx5xOLl-OvyfyG3-3Pm8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security issues and Ada runtime support</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Harrison, L.J.</creator><creatorcontrib>Harrison, L.J.</creatorcontrib><description>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.&lt; &gt;</description><identifier>ISBN: 0818620064</identifier><identifier>ISBN: 9780818620065</identifier><identifier>DOI: 10.1109/CSAC.1989.81049</identifier><language>eng</language><publisher>IEEE Comput. Soc. Press</publisher><subject>Access control ; Contracts ; Hardware ; Invasive software ; Performance analysis ; Protection ; Runtime environment ; Runtime library ; Security ; Virtual machining</subject><ispartof>[1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.177-183</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/81049$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/81049$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Harrison, L.J.</creatorcontrib><title>Security issues and Ada runtime support</title><title>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</title><addtitle>CSAC</addtitle><description>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.&lt; &gt;</description><subject>Access control</subject><subject>Contracts</subject><subject>Hardware</subject><subject>Invasive software</subject><subject>Performance analysis</subject><subject>Protection</subject><subject>Runtime environment</subject><subject>Runtime library</subject><subject>Security</subject><subject>Virtual machining</subject><isbn>0818620064</isbn><isbn>9780818620065</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1989</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjz1PwzAUAC1VSJTSGbF5Y0r6nj8Se4wioJUqMRTmyh8vyIiWyE6G_nsQcMttJx1jdwg1IthNf-j6Gq2xtUFQdsFuwKBpBECjrtm6lA_4QWsDVi_Zw4HCnNN04amUmQp358i76Hiez1M6ES_zOH7l6ZZdDe6z0PrfK_b29Pjab6v9y_Ou7_bVO0o9VUNoI3jno3PYCqBoAgSjACO1Qg9RiQalA-8pSBm8GiAICkE4IVCCbeSK3f91ExEdx5xOLl-OvyfyG3-3Pm8</recordid><startdate>1989</startdate><enddate>1989</enddate><creator>Harrison, L.J.</creator><general>IEEE Comput. Soc. Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>1989</creationdate><title>Security issues and Ada runtime support</title><author>Harrison, L.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g135t-fc7d0babdaa1720ed8c0c8401de725fd42613a0bbec33cb4f0c2ecc2a22130963</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1989</creationdate><topic>Access control</topic><topic>Contracts</topic><topic>Hardware</topic><topic>Invasive software</topic><topic>Performance analysis</topic><topic>Protection</topic><topic>Runtime environment</topic><topic>Runtime library</topic><topic>Security</topic><topic>Virtual machining</topic><toplevel>online_resources</toplevel><creatorcontrib>Harrison, L.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harrison, L.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security issues and Ada runtime support</atitle><btitle>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</btitle><stitle>CSAC</stitle><date>1989</date><risdate>1989</risdate><spage>177</spage><epage>183</epage><pages>177-183</pages><isbn>0818620064</isbn><isbn>9780818620065</isbn><abstract>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.&lt; &gt;</abstract><pub>IEEE Comput. Soc. Press</pub><doi>10.1109/CSAC.1989.81049</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0818620064
ispartof [1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.177-183
issn
language eng
recordid cdi_ieee_primary_81049
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Contracts
Hardware
Invasive software
Performance analysis
Protection
Runtime environment
Runtime library
Security
Virtual machining
title Security issues and Ada runtime support
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A44%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20issues%20and%20Ada%20runtime%20support&rft.btitle=%5B1989%20Proceedings%5D%20Fifth%20Annual%20Computer%20Security%20Applications%20Conference&rft.au=Harrison,%20L.J.&rft.date=1989&rft.spage=177&rft.epage=183&rft.pages=177-183&rft.isbn=0818620064&rft.isbn_list=9780818620065&rft_id=info:doi/10.1109/CSAC.1989.81049&rft_dat=%3Cieee_6IE%3E81049%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=81049&rfr_iscdi=true