Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224)
DOI: 10.1109/ftcs.1998.689456
|View full text |Cite
|
Sign up to set email alerts
|

Supporting multiple levels of criticality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…The proposed contribution is based on an object-oriented, the SLO objects described levels of QoS and the MLO objects described levels of criticality of customers. In [24], the authors have specified that the MLO allow changing their level of criticality at any invocation method to control and accept data from lower or equal level. These objects have no memory, and are created at each invocation, which influences execution duration and reduces network performance; also, the identification of the exacted values for these thresholds is very difficult.…”
Section: Contribution and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed contribution is based on an object-oriented, the SLO objects described levels of QoS and the MLO objects described levels of criticality of customers. In [24], the authors have specified that the MLO allow changing their level of criticality at any invocation method to control and accept data from lower or equal level. These objects have no memory, and are created at each invocation, which influences execution duration and reduces network performance; also, the identification of the exacted values for these thresholds is very difficult.…”
Section: Contribution and Discussionmentioning
confidence: 99%
“…It is based on objects classification in order to give a strict information flow to check integrity policy and to manipulate the mechanisms of information integrity upgrade. Authors in [24,25] defined three object types: Single Level Objects (SLOs): are single constant integrity level. This king contains information and creates flows using its internal data at different levels of integrity.…”
Section: Integrity Modelsmentioning
confidence: 99%
“…The purpose of these objects is to output reliable information by using possibly corrupted data as input (i.e., with a low integrity level). Such objects upgrade the trustworthiness of data and hence allow information flows from low to high integrity levels [67].…”
Section: The Integrity Dimensionmentioning
confidence: 99%
“…The systems presented in [11] and [16] can be implemented as iProve nuclei. The communication between a distributed system's nodes can be augmented with timingrelated properties by using [11].…”
Section: Related Workmentioning
confidence: 99%
“…The communication between a distributed system's nodes can be augmented with timingrelated properties by using [11]. In [16], on every method call, an integrity kernel checks if the caller object has the right to access the callee object, to prevent usage of untrusted data by critical parts of the system. The iProve join verifier is similar to ESP [4]; however, there are some important differences between the two.…”
Section: Related Workmentioning
confidence: 99%