Skip to main content

The ACROSS Integrity Model

  • Chapter
  • First Online:
IAENG Transactions on Engineering Technologies

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 247))

Abstract

In this chapter we discuss the application of integrity models in a mixed-criticality system to enable the secure sharing of information. The sharing of resources and information in computer systems enables cost savings. The major technical challenge of these systems is simple: low criticality applications must be prevented from interfering with high criticality ones which execute in the same system. An example for such an integrated architecture is the the ACROSS MPSoC architecture which facilitates the implementation of hard real-time systems. We present an integrity model for the secure exchange of information between different levels of criticality within ACROSS. Our approach is based on Totel’s integrity model which proposes to upgrade information from low to high by rigorously validating this information. We were able to show that the encapsulation mechanisms of the ACROSS architecture support the implementation of the proposed integrity model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://torcs.sourceforge.net/

References

  1. Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33

    Article  MATH  Google Scholar 

  2. Avizienis AA (1995) The methodology of N-version programming. In: Lyu M (ed) Software fault tolerance. Wiley, New York, pp 23–46

    Google Scholar 

  3. Banerjee A, Kumar V (2009) Anomaly detection: a survey. Technical report, ACM computing survey

    Google Scholar 

  4. Bell DE, LaPadula LJ (1975) Computer security model: unified exposition and multics interpretation. Technical report, MITRE Corp., Bedford

    Google Scholar 

  5. Biba KJ (1977) Integrity considerations for secure computer systems. Mitre Corporation, technical report

    Google Scholar 

  6. Boettcher C, DeLong R, Rushby J, Sifre W (2008) The MILS component integration approach to secure information sharing. In: Proceedings of the 27th digital avionics systems conference (DASC). IEEE/AIAA

    Google Scholar 

  7. Burton D, Delaney A, Newstead S, Logan D, Fields B (2004) Effectiveness of ABS and vehicle stability control systems. Technical report, Royal Automobile Club of Victoria (RACV) Ltd

    Google Scholar 

  8. Commission I.E.: IEC 61508 (2005) Functional safety of electrical/electronic/programmable electronic safety-related systems. In: 1st IEEE automotive electronics conference, pp 7–13

    Google Scholar 

  9. El-Salloum C, Elshuber M, Höftberger O, Isakovic H, Wasicek A (2012) The ACROSS MPSoC - a new generation of multi-core processors designed for safety-critical embedded systems. In: Proceedings of the 15th euromicro conference on digital systems design (DSD)

    Google Scholar 

  10. Evans DL, Bond PJ, Bement AL (2001) Security requireents for cryptographic modules. Federal Information Processing Stabdards Publication (Supercedes FIPS PUB 140–1)

    Google Scholar 

  11. Kopetz H (1995) Why time-triggered architectures will succeed in large hard real-time systems. In: FTDCS, pp 2–9

    Google Scholar 

  12. Kopetz H (2011) Real-time systems: design principles for distributed embedded applications, 2nd edn. Springer, Berlin

    Google Scholar 

  13. Laarouchi Y, Deswarte Y, Powell D, Arlat J (2003) Connecting commercial computers to avionics systems. In: 28th digital avionics systems conference pp 6.D.1-(1–9)

    Google Scholar 

  14. Lampson B, Abadi M, Burrows M, Wobber E (1992) Authentication in distributed systems: theory and practice. ACM Trans Comput Syst 10(4):265–310

    Article  Google Scholar 

  15. Lorczak PR, Caglayan AK, Eckhardt DE (1989) A theoretical investigation of generalized voters for redundant systems. In: Digest of papers FTCS-19: the nineteenth international symposium on fault-tolerant, computing, pp 444–450

    Google Scholar 

  16. Matteucci M (2000) Hierarchical clustering algorithms. Available at: http://home.dei.polimi.it/matteucc/Clustering/tutorial_html/hierarchic% al.html

  17. Morgan C (2002) Preliminary report: the incidence rate of odometer fraud. Technical report DOT HS 809 441, national highway traffic safety administration (NHTSA)

    Google Scholar 

  18. Obermaisser R, El Salloum C, Huber B, Kopetz H (2009) From a federated to an integrated automotive architecture. IEEE Trans Comput Aided Des Integr Circ Syst 28(7):956–965

    Article  Google Scholar 

  19. Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: Proceedings of the 32nd international conference on very large data bases (VLDB), pp 187–197

    Google Scholar 

  20. Totel E, Blanquart JP, Deswarte Y, Powell D (2000) Supporting multiple levels of criticality. ESPRIT project 20716: GUARDS

    Google Scholar 

  21. Wasicek A, Mair T (2012) Secure information sharing in mixed-criticality systems. In: Lecture notes in engineering and computer science: proceedings of the world congress on engineering and computer science 2012, IAENG, pp 23–29

    Google Scholar 

  22. Wasicek A, Salloum CE (2010) A system-on-a-chip platform for mixed-criticality applications. In: Proceedings of 13th IEEE international symposium on object/component/service-oriented real-time distributed computing (ISORC)

    Google Scholar 

Download references

Acknowledgments

This document is based on the ACROSS project in the framework of the ARTEMIS program. The work has been funded in part by the ARTEMIS Joint Undertaking and National Funding Agencies under the funding ID ARTEMIS-2009-1-100208.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Armin Wasicek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Wasicek, A. (2014). The ACROSS Integrity Model. In: Kim, H., Ao, SI., Amouzegar, M., Rieger, B. (eds) IAENG Transactions on Engineering Technologies. Lecture Notes in Electrical Engineering, vol 247. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6818-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6818-5_24

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6817-8

  • Online ISBN: 978-94-007-6818-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics