{"title":"安全问题和Ada运行时支持","authors":"L. J. Harrison","doi":"10.1109/CSAC.1989.81049","DOIUrl":null,"url":null,"abstract":"This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"89 10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security issues and Ada runtime support\",\"authors\":\"L. J. Harrison\",\"doi\":\"10.1109/CSAC.1989.81049\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.<<ETX>>\",\"PeriodicalId\":284420,\"journal\":{\"name\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"volume\":\"89 10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1989.81049\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper reports on an investigation of the security issues related to Ada runtime support. First, the need to use Ada features requiring runtime support is motivated. The paper then describes how the Ada runtime library in the development environment is transformed to become the Ada runtime system in the operational environment. Key security requirements, such as protection of the runtime library in the development environment, and design of a security architecture in the operational environment are examined. The paper concludes that further research is required along with the actual development of trusted Ada runtime systems.<>