Access Control for Adaptive Reservations on Multi-User Systems

This paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security requirements that need to be met by the system are identified, and an access control model satisfying them is proposed that also does not degrade the flexibility available on such systems due to the adaptive reservations framework. Also, the implementation of the proposed model within the AQuoSA architecture for Linux is briefly discussed.

[1]  Sanjoy K. Baruah,et al.  Greedy reclamation of unused bandwidth in constant-bandwidth servers , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.

[2]  Giorgio C. Buttazzo,et al.  Hierarchical QoS management for time sensitive applications , 2001, Proceedings Seventh IEEE Real-Time Technology and Applications Symposium.

[3]  Antonio Bicchi,et al.  Quality of service control in soft real-time applications , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[4]  Giuseppe Lipari,et al.  Constant bandwidth vs. proportional share resource allocation , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[5]  Tommaso Cucinotta,et al.  QoS Management Through Adaptive Reservations , 2005, Real-Time Systems.

[6]  Tommaso Cucinotta,et al.  AQuoSA—adaptive quality of service architecture , 2009 .

[7]  Ragunathan Rajkumar,et al.  Portable RK: a portable resource kernel for guaranteed and enforced timing behavior , 1999, Proceedings of the Fifth IEEE Real-Time Technology and Applications Symposium.

[8]  Ragunathan Rajkumar,et al.  Protecting resources with resource control lists , 2001, Proceedings Seventh IEEE Real-Time Technology and Applications Symposium.

[9]  Giuseppe Lipari,et al.  IRIS: a new reclaiming algorithm for server-based real-time systems , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..

[10]  Dan Tsafrir,et al.  Secretly Monopolizing the CPU Without Superuser Privileges , 2007, USENIX Security Symposium.

[11]  Tommaso Cucinotta,et al.  Feedback Scheduling for Pipelines of Tasks , 2007, HSCC.

[12]  P. Mantegazza,et al.  RTAI: Real Time Application Interface , 2000 .