Title :
Security pipeline interface (SPI)
Author :
Hoffman, Lance J. ; Davis, Russell J.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., George Washington Univ., Washington, DC, USA
Abstract :
Proposes a new approach, security pipeline interface, for adding security to existing systems. Security functions are added in series to existing I/O paths without modification to the host system internals. The result is an I/O pipeline of security functions which is adaptable to both trusted and untrusted environments. Security of the physically separated SPI architecture is easier to analyze then other security products. Additionally, SPI requires no modification to the operating system. However, SPI is limited to the host processor interfaces. The SPI approach is compared with and contrasted to other ongoing security pipeline research. Examples of applications are presented which illustrate how security functions are added in a pipeline. These include a rogue program controller and intrusion detection systems
Keywords :
data handling; pipeline processing; security of data; SPI architecture; host processor interfaces; intrusion detection systems; operating system; rogue program controller; security pipeline interface; Application software; Computer science; Computer security; Computerized monitoring; Control systems; Data security; Delay; Intrusion detection; Operating systems; Pipelines;
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2105-2
DOI :
10.1109/CSAC.1990.143797