IAENG Transactions on Engineering Technologies

Volume 247 of the series Lecture Notes in Electrical Engineering pp 333-348


The ACROSS Integrity Model

  • Armin WasicekAffiliated withVienna University of Technology, Institute for Computer Engineering Email author 

* Final gross prices may vary according to local VAT.

Get Access


In this chapter we discuss the application of integrity models in a mixed-criticality system to enable the secure sharing of information. The sharing of resources and information in computer systems enables cost savings. The major technical challenge of these systems is simple: low criticality applications must be prevented from interfering with high criticality ones which execute in the same system. An example for such an integrated architecture is the the ACROSS MPSoC architecture which facilitates the implementation of hard real-time systems. We present an integrity model for the secure exchange of information between different levels of criticality within ACROSS. Our approach is based on Totel’s integrity model which proposes to upgrade information from low to high by rigorously validating this information. We were able to show that the encapsulation mechanisms of the ACROSS architecture support the implementation of the proposed integrity model.


ACROSS architecture Integrity model Mixed-criticality Resource sharing Security policy Totel’s model