Security issues and Ada runtime support
This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime syste...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 183 |
---|---|
container_issue | |
container_start_page | 177 |
container_title | |
container_volume | |
creator | Harrison, L.J. |
description | This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.< > |
doi_str_mv | 10.1109/CSAC.1989.81049 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_81049</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>81049</ieee_id><sourcerecordid>81049</sourcerecordid><originalsourceid>FETCH-LOGICAL-g135t-fc7d0babdaa1720ed8c0c8401de725fd42613a0bbec33cb4f0c2ecc2a22130963</originalsourceid><addsrcrecordid>eNotjz1PwzAUAC1VSJTSGbF5Y0r6nj8Se4wioJUqMRTmyh8vyIiWyE6G_nsQcMttJx1jdwg1IthNf-j6Gq2xtUFQdsFuwKBpBECjrtm6lA_4QWsDVi_Zw4HCnNN04amUmQp358i76Hiez1M6ES_zOH7l6ZZdDe6z0PrfK_b29Pjab6v9y_Ou7_bVO0o9VUNoI3jno3PYCqBoAgSjACO1Qg9RiQalA-8pSBm8GiAICkE4IVCCbeSK3f91ExEdx5xOLl-OvyfyG3-3Pm8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security issues and Ada runtime support</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Harrison, L.J.</creator><creatorcontrib>Harrison, L.J.</creatorcontrib><description>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.< ></description><identifier>ISBN: 0818620064</identifier><identifier>ISBN: 9780818620065</identifier><identifier>DOI: 10.1109/CSAC.1989.81049</identifier><language>eng</language><publisher>IEEE Comput. Soc. Press</publisher><subject>Access control ; Contracts ; Hardware ; Invasive software ; Performance analysis ; Protection ; Runtime environment ; Runtime library ; Security ; Virtual machining</subject><ispartof>[1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.177-183</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/81049$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/81049$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Harrison, L.J.</creatorcontrib><title>Security issues and Ada runtime support</title><title>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</title><addtitle>CSAC</addtitle><description>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.< ></description><subject>Access control</subject><subject>Contracts</subject><subject>Hardware</subject><subject>Invasive software</subject><subject>Performance analysis</subject><subject>Protection</subject><subject>Runtime environment</subject><subject>Runtime library</subject><subject>Security</subject><subject>Virtual machining</subject><isbn>0818620064</isbn><isbn>9780818620065</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1989</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjz1PwzAUAC1VSJTSGbF5Y0r6nj8Se4wioJUqMRTmyh8vyIiWyE6G_nsQcMttJx1jdwg1IthNf-j6Gq2xtUFQdsFuwKBpBECjrtm6lA_4QWsDVi_Zw4HCnNN04amUmQp358i76Hiez1M6ES_zOH7l6ZZdDe6z0PrfK_b29Pjab6v9y_Ou7_bVO0o9VUNoI3jno3PYCqBoAgSjACO1Qg9RiQalA-8pSBm8GiAICkE4IVCCbeSK3f91ExEdx5xOLl-OvyfyG3-3Pm8</recordid><startdate>1989</startdate><enddate>1989</enddate><creator>Harrison, L.J.</creator><general>IEEE Comput. Soc. Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>1989</creationdate><title>Security issues and Ada runtime support</title><author>Harrison, L.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g135t-fc7d0babdaa1720ed8c0c8401de725fd42613a0bbec33cb4f0c2ecc2a22130963</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1989</creationdate><topic>Access control</topic><topic>Contracts</topic><topic>Hardware</topic><topic>Invasive software</topic><topic>Performance analysis</topic><topic>Protection</topic><topic>Runtime environment</topic><topic>Runtime library</topic><topic>Security</topic><topic>Virtual machining</topic><toplevel>online_resources</toplevel><creatorcontrib>Harrison, L.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harrison, L.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security issues and Ada runtime support</atitle><btitle>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</btitle><stitle>CSAC</stitle><date>1989</date><risdate>1989</risdate><spage>177</spage><epage>183</epage><pages>177-183</pages><isbn>0818620064</isbn><isbn>9780818620065</isbn><abstract>This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.< ></abstract><pub>IEEE Comput. Soc. Press</pub><doi>10.1109/CSAC.1989.81049</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0818620064 |
ispartof | [1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.177-183 |
issn | |
language | eng |
recordid | cdi_ieee_primary_81049 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Contracts Hardware Invasive software Performance analysis Protection Runtime environment Runtime library Security Virtual machining |
title | Security issues and Ada runtime support |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A44%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20issues%20and%20Ada%20runtime%20support&rft.btitle=%5B1989%20Proceedings%5D%20Fifth%20Annual%20Computer%20Security%20Applications%20Conference&rft.au=Harrison,%20L.J.&rft.date=1989&rft.spage=177&rft.epage=183&rft.pages=177-183&rft.isbn=0818620064&rft.isbn_list=9780818620065&rft_id=info:doi/10.1109/CSAC.1989.81049&rft_dat=%3Cieee_6IE%3E81049%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=81049&rfr_iscdi=true |