多任务环境中功能独立的程序

A. I. Griuntal
{"title":"多任务环境中功能独立的程序","authors":"A. I. Griuntal","doi":"10.17587/prin.15.3-11","DOIUrl":null,"url":null,"abstract":"his paper introduces a new concept of information security in respect to multitasking computational systems. According to the proposed definition a multitasking computational system is information secure, if execution of any application cannot negatively influence on other applications. Thus information security is being considered as protection of executing application and system programs from arbitrary actions of other application programs. Information security is provided by the software and hardware architecture, which guarantee information and functional independence of system and application programs and in time resource availability. A program is functionally independent if an execution sequence of program commands and a program itself could not be changed by other programs. This ensures integrity of programs. Compliance with there conditions is ensured by some technological and hardware means including static program and data allocation, separation of configuration and execution stages, special hardware features, minimizing the complexity of system programs. A computational system model is introduced for which functional independence requirements are fulfilled. Implementation of the model needs a new kind of hardware. Execution of some typical algorithms must be performed by hardware. Some computations performing as a rule by operating system are executed on configuration stage. The computational system consists of hardware, system programs and application programs. System programs nomenclature and their configuration do not depend on application programs. System programs and application programs do not depend on each other according to the data. A processor as a part of hardware can execute in addition to commands processor transactions, i.e. standard programs, determining computational process. Implementation of some programs as processor transactions allows to protect the computational system from uncontrolled interference by application programs. The model does not use any hardware means for memory protection. This is implemented using system programs. Planning is carried out by system programs. The scheduling algorithm guarantees the integrity of system and application programs. When scheduling, processing of application-specific data is carried out by processor transactions. This provides information security at the scheduling stage. The proposed hardware and software architecture can be used in information and computing systems for the maintenance of critical objects. Architecture can serve as a conceptual basis for creating systems for which information security requirements are primary, especially for those that function in real time.","PeriodicalId":513113,"journal":{"name":"Programmnaya Ingeneria","volume":"428 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Functionally Independent Programs in Multitasking Environment\",\"authors\":\"A. I. Griuntal\",\"doi\":\"10.17587/prin.15.3-11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"his paper introduces a new concept of information security in respect to multitasking computational systems. According to the proposed definition a multitasking computational system is information secure, if execution of any application cannot negatively influence on other applications. Thus information security is being considered as protection of executing application and system programs from arbitrary actions of other application programs. Information security is provided by the software and hardware architecture, which guarantee information and functional independence of system and application programs and in time resource availability. A program is functionally independent if an execution sequence of program commands and a program itself could not be changed by other programs. This ensures integrity of programs. Compliance with there conditions is ensured by some technological and hardware means including static program and data allocation, separation of configuration and execution stages, special hardware features, minimizing the complexity of system programs. A computational system model is introduced for which functional independence requirements are fulfilled. Implementation of the model needs a new kind of hardware. Execution of some typical algorithms must be performed by hardware. Some computations performing as a rule by operating system are executed on configuration stage. The computational system consists of hardware, system programs and application programs. System programs nomenclature and their configuration do not depend on application programs. System programs and application programs do not depend on each other according to the data. A processor as a part of hardware can execute in addition to commands processor transactions, i.e. standard programs, determining computational process. Implementation of some programs as processor transactions allows to protect the computational system from uncontrolled interference by application programs. The model does not use any hardware means for memory protection. This is implemented using system programs. Planning is carried out by system programs. The scheduling algorithm guarantees the integrity of system and application programs. When scheduling, processing of application-specific data is carried out by processor transactions. This provides information security at the scheduling stage. The proposed hardware and software architecture can be used in information and computing systems for the maintenance of critical objects. Architecture can serve as a conceptual basis for creating systems for which information security requirements are primary, especially for those that function in real time.\",\"PeriodicalId\":513113,\"journal\":{\"name\":\"Programmnaya Ingeneria\",\"volume\":\"428 2\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Programmnaya Ingeneria\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17587/prin.15.3-11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Programmnaya Ingeneria","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17587/prin.15.3-11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文针对多任务计算系统提出了一个新的信息安全概念。根据提出的定义,如果任何应用程序的执行不会对其他应用程序产生负面影响,那么多任务计算系统就是信息安全的。因此,信息安全被认为是保护正在执行的应用程序和系统程序不受其他应用程序任意操作的影响。信息安全由软件和硬件架构提供,这些架构保证了系统和应用程序在信息和功能上的独立性,以及资源的及时可用性。如果程序命令的执行顺序和程序本身不能被其他程序更改,那么程序在功能上就是独立的。这确保了程序的完整性。确保符合上述条件的技术和硬件手段包括静态程序和数据分配、配置和执行阶段分离、特殊硬件功能、最大限度降低系统程序的复杂性。为满足功能独立性要求,引入了一种计算系统模型。该模型的实现需要一种新型硬件。一些典型算法的执行必须由硬件完成。操作系统通常执行的某些计算在配置阶段执行。计算系统由硬件、系统程序和应用程序组成。系统程序的命名及其配置不依赖于应用程序。根据数据,系统程序和应用程序互不依赖。处理器作为硬件的一部分,除了可以执行命令外,还可以执行处理器事务,即决定计算过程的标准程序。将某些程序作为处理器事务执行,可以保护计算系统不受应用程序的不可控干扰。该模型不使用任何硬件手段进行内存保护。这是通过系统程序实现的。规划由系统程序执行。调度算法保证了系统程序和应用程序的完整性。调度时,应用程序特定数据的处理由处理器事务执行。这在调度阶段提供了信息安全。建议的硬件和软件架构可用于信息和计算系统,以维护关键对象。架构可作为创建系统的概念基础,而信息安全要求则是创建系统的首要条件,尤其是那些实时运行的系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Functionally Independent Programs in Multitasking Environment
his paper introduces a new concept of information security in respect to multitasking computational systems. According to the proposed definition a multitasking computational system is information secure, if execution of any application cannot negatively influence on other applications. Thus information security is being considered as protection of executing application and system programs from arbitrary actions of other application programs. Information security is provided by the software and hardware architecture, which guarantee information and functional independence of system and application programs and in time resource availability. A program is functionally independent if an execution sequence of program commands and a program itself could not be changed by other programs. This ensures integrity of programs. Compliance with there conditions is ensured by some technological and hardware means including static program and data allocation, separation of configuration and execution stages, special hardware features, minimizing the complexity of system programs. A computational system model is introduced for which functional independence requirements are fulfilled. Implementation of the model needs a new kind of hardware. Execution of some typical algorithms must be performed by hardware. Some computations performing as a rule by operating system are executed on configuration stage. The computational system consists of hardware, system programs and application programs. System programs nomenclature and their configuration do not depend on application programs. System programs and application programs do not depend on each other according to the data. A processor as a part of hardware can execute in addition to commands processor transactions, i.e. standard programs, determining computational process. Implementation of some programs as processor transactions allows to protect the computational system from uncontrolled interference by application programs. The model does not use any hardware means for memory protection. This is implemented using system programs. Planning is carried out by system programs. The scheduling algorithm guarantees the integrity of system and application programs. When scheduling, processing of application-specific data is carried out by processor transactions. This provides information security at the scheduling stage. The proposed hardware and software architecture can be used in information and computing systems for the maintenance of critical objects. Architecture can serve as a conceptual basis for creating systems for which information security requirements are primary, especially for those that function in real time.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信