2017
DOI: 10.1587/transinf.2016edp7447
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling

Abstract: While conventional studies on real-time systems have mostly considered the real-time constraint of real-time systems only, recent research initiatives are trying to incorporate a security constraint into realtime scheduling due to the recognition that the violation of either of two constrains can cause catastrophic losses for humans, the system, and even environment. The focus of most studies, however, is the single-criticality systems, while the security of mixed-criticality systems has received scant attenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Two state-of-the-art works [3], [39] proposed an RTA of non-preemptive FP scheduling, but under settings that are different from this paper's focus. We will report the main results in the form of equations to make it easier to follow the subsequent RTA for our problem.…”
Section: A Existing Rta For Non-mc and MC Tasksmentioning
confidence: 99%
See 2 more Smart Citations
“…Two state-of-the-art works [3], [39] proposed an RTA of non-preemptive FP scheduling, but under settings that are different from this paper's focus. We will report the main results in the form of equations to make it easier to follow the subsequent RTA for our problem.…”
Section: A Existing Rta For Non-mc and MC Tasksmentioning
confidence: 99%
“…Baek et al [3] extended the analysis above to MC task model by considering the adaptive MC (AMC) scheme [4], and derived WCRTs for the following three cases separately: Case 1. WCRT at lo-criticality mode for any task τ i is calculated as:…”
Section: A Existing Rta For Non-mc and MC Tasksmentioning
confidence: 99%
See 1 more Smart Citation
“…The papers belonging to the first category add a mechanism of flushing information remaining in computing resources, or integrate additional (periodic) security tasks [9,19,[24][25][26]. Mohan et al [19] focused on fixed priority scheduling (such as RM) on a uniprocessor platform, and proposed how to modify the original scheduling algorithm to accommodate the flushing mechanism, which prevents other tasks from eavesdropping information in computing resources owned by critical tasks.…”
Section: Related Workmentioning
confidence: 99%
“…Based on [19], Pellizzoni et al [9] explored tradeoffs between security requirements (achieved by the flushing mechanism) and real-time guarantees. Then, the studies for the flushing mechanism were extended towards considering preemption overheads [26] and mixed-criticality systems [25]. On the other hand, Hasan et al [24] developed how to integrate additional (periodic) security tasks without compromising timing guarantees.…”
Section: Related Workmentioning
confidence: 99%