DocumentCode
3311202
Title
Security pipeline interface (SPI)
Author
Hoffman, Lance J. ; Davis, Russell J.
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., George Washington Univ., Washington, DC, USA
fYear
1990
fDate
3-7 Dec 1990
Firstpage
349
Lastpage
355
Abstract
Proposes a new approach, security pipeline interface, for adding security to existing systems. Security functions are added in series to existing I/O paths without modification to the host system internals. The result is an I/O pipeline of security functions which is adaptable to both trusted and untrusted environments. Security of the physically separated SPI architecture is easier to analyze then other security products. Additionally, SPI requires no modification to the operating system. However, SPI is limited to the host processor interfaces. The SPI approach is compared with and contrasted to other ongoing security pipeline research. Examples of applications are presented which illustrate how security functions are added in a pipeline. These include a rogue program controller and intrusion detection systems
Keywords
data handling; pipeline processing; security of data; SPI architecture; host processor interfaces; intrusion detection systems; operating system; rogue program controller; security pipeline interface; Application software; Computer science; Computer security; Computerized monitoring; Control systems; Data security; Delay; Intrusion detection; Operating systems; Pipelines;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location
Tucson, AZ
Print_ISBN
0-8186-2105-2
Type
conf
DOI
10.1109/CSAC.1990.143797
Filename
143797
Link To Document