Middleware’98 1998
DOI: 10.1007/978-1-4471-1283-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Integrity management in GUARDS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

1999
1999
1999
1999

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…This is achieved by spatial and temporal isolation, which are provided respectively by memory management hardware and resource utilization budget timers [66]. Furthermore, for the most critical components (the topmost integrity level) and a core set of basic components (i.e., the integrity management components and the underlying hardware and operating systems), it must be assumed either that there are no design faults, or that they can be tolerated by some other means (e.g., through diversification).…”
Section: The Integrity Dimensionmentioning
confidence: 99%
See 1 more Smart Citation
“…This is achieved by spatial and temporal isolation, which are provided respectively by memory management hardware and resource utilization budget timers [66]. Furthermore, for the most critical components (the topmost integrity level) and a core set of basic components (i.e., the integrity management components and the underlying hardware and operating systems), it must be assumed either that there are no design faults, or that they can be tolerated by some other means (e.g., through diversification).…”
Section: The Integrity Dimensionmentioning
confidence: 99%
“…In this paper, we do not detail the integrity dimension any further -the interested reader should refer to references [66,67] …”
Section: The Integrity Dimensionmentioning
confidence: 99%