Abstract
This paper discusses different issues related to protected object access in Ada. In particular, the in uence of the different approaches on the implementation and analysis of real-time systems is addressed. Based on results from previous and on-going work, some issues are discussed and some proposals are made.
- ARM12. ISO/IEC 8652:2012(E): Information Technology | Programming Languages | Ada, 2012.Google Scholar
- ARM2x. Ada Reference Manual ISO/IEC 8652:202x(E), draft 12, 2017. Available at http: //www.ada-auth.org/standards/ada2x.html.Google Scholar
- T. P. Baker. Stack-based scheduling for realtime processes. Real-Time Systems, 3(1):67-99, January 1991. Google Scholar
Digital Library
- A. Burns and A. J. Wellings. A schedulability compatible multiprocessor resource sharing protocol-MrsP. In Real-Time Systems (ECRTS), 2013 25th Euromicro Conference on, pages 282-291. IEEE, 2013. Google Scholar
Digital Library
- A. Burns and A. J. Wellings. Locking policies for multiprocessor Ada. Ada Letters, 33(2): 59-65, November 2013. Google Scholar
Digital Library
- S. Catellani, L. Bonato, S. Huber, and E. Mezzetti. Challenges in the Implementation of MrsP, pages 179-195. Springer International Publishing, Cham, 2015. ISBN 978-3-319-19584-1. URL http://dx.doi.org/10.1007/978-3-319-19584-1_12.Google Scholar
- R. I. Davis and A. Burns. A survey of hard real-time scheduling algorithms and schedulability analysis techniques for multiprocessor systems. ACM Computing Surveys, 43(4), 2011. Google Scholar
Digital Library
- P. Gai, G. Lipari, and M. D. Natale. Minimizing memory utilization of real-time task sets in single and multi-processor systems-on-a-chip. In Proceedings of the 22nd IEEE Real-Time Systems Symposium. IEEE Computer Society, 2001. Google Scholar
Digital Library
- J. Garrido, B. Lacruz, J. Zamorano, and J. A. de la Puente. In support of extending the ravenscar pro le. Ada Lett., 36(1):63-67, July 2016. ISSN 1094-3641. URL http://doi.acm.org/10.1145/2971571.2971579. Google Scholar
Digital Library
- J. Garrido, J. Zamorano, A. Alonso, and J. A. de la Puente. Evaluating MSRP and MrsP with the multiprocessor Ravenscar pro le. In J. Blieberger and M. Bader, editors, Reliable Software Technologies | Ada-Europe 2017, pages 3-17. Springer, 2017. ISBN 978-3-319-60588- 3. URL http://dx.doi.org/10.1007/10.1007/ 978-3-319-60588-3_1.Google Scholar
- J. Garrido, S. Zhao, A. Burns, and A. Wellings. Supporting nested resources in MrsP. In J. Blieberger and M. Bader, editors, Ada-Europe International Conference on Reli- able Software Technologies, pages 73-86. Springer, 2017. ISBN 978-3-319-60588-3. URL http://dx.doi.org/10.1007/978-3-319-60588-3_5.Google Scholar
- P. Rogers, J. Ruiz, and T. Gingold. Toward extensions to the ravenscar pro le. Ada Lett., 35(1):32-37, December 2015. ISSN 1094-3641. URL http: //doi.acm.org/10.1145/2870544.2870549. Google Scholar
Digital Library
- P. Rogers, J. Ruiz, T. Gingold, and P. Bernardi. A new pro le based on Ravenscar. Ada Europe 2017 Panel on The Future of Safety-Minded Languages., 2017.Google Scholar
- L. Sha, R. Rajkumar, and J. P. Lehoczky. Priority inheritance protocols: An approach to real-time synchronization. IEEE Tr. on Computers, 39(9), 1990. Google Scholar
Digital Library
- J. Shi, K.-H. Chen, S. Zhao, W.-H. Huang, J.-J. Chen, and A. Wellings. Implementation and evaluation of multiprocessor resource synchronization protocol (MrsP) on LITMUSRT. 13th Workshop on Operating Systems Platforms for Embedded Real-Time Applications, 2017.Google Scholar
- S. Zhao, J. Garrido, A. Burns, and A. Wellings. New schedulability analysis for MrsP. In Embedded and Real-Time Computing Systems and Applications (RTCSA), 2017 IEEE 23rd International Conference on, pages 1-10. IEEE, 2017.Google Scholar
Cross Ref
Index Terms
(auto-classified)On protocols for accessing protected objects on multiprocessors
Recommendations
Access Control Infrastructure for Digital Objects
ICICS '02: Proceedings of the 4th International Conference on Information and Communications SecurityDistributed systems usually contain objects with heterogeneous security requirements that pose important challenges on the underlying security mechanisms and especially in access control systems. Access control in distributed systems often relies on ...






Comments