2014 26th Euromicro Conference on Real-Time Systems 2014
DOI: 10.1109/ecrts.2014.28
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Systems Security through Scheduler Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 50 publications
(72 citation statements)
references
References 21 publications
0
72
0
Order By: Relevance
“…We first describe how schedulability is tested for two tasks case to motivate our result. And then we generalize it to result stronger schedulability condition than proposed in [6].…”
Section: Lsf Schedulability Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…We first describe how schedulability is tested for two tasks case to motivate our result. And then we generalize it to result stronger schedulability condition than proposed in [6].…”
Section: Lsf Schedulability Analysismentioning
confidence: 99%
“…In both cases, security constraint is satisfied with FT * ki and j * i can execute without any interference from FT * ki reserved and invoked by LSF scheduler. Unlike LSF using flush task reservation, conventional scheduling algorithms [6] adopt a greedy approach for flush task invocation. When a job is released, a flush task is invoked if the latest finished job has a higher security level.…”
Section: Flush Task Mechanismsmentioning
confidence: 99%
See 3 more Smart Citations