Efficient secure data marshaling through at least one untrusted intermediate process

作者: Charles Alan Ludwig , Joaquin Guanter Gonzalbez , Pritam De

DOI:

关键词: Distributed memoryComputer networkMemory mapShared memoryDistributed shared memoryProcess (computing)Access control listMemory managementDistributed computingUniform memory accessComputer science

摘要: Secure marshaling of data via one or more intermediate processes is provided. A source process may create a named shared memory section resulting in first handle to the section. The populate with information. An access control list secure by preventing from accessing content section, while allowing target content. and name be marshaled respective new last marshal process, which use obtain

参考文章(12)
Sadahiro Sugimoto, Koji Watanabe, Storage apparatus and load distribution method ,(2012)
Srinivasa Reddy Neerudu, Ahmed M. Tolba, Nelamangal Krishnaswamy Srinivas, Gautam Swaminathan, Wilhelm R. Schmieder, Nadim Y. Abdo, Costin Hagiu, Vladimir K. Stoyanov, User-mode based remote desktop protocol (rdp) encoding architecture ,(2009)
Andrew Sigal, James E. Allard, Murali R. Krishnan, Seth B. Pollack, Mark T. Anders, David L. Kaplan, Lei Jin, Server architecture for segregation of dynamic content generation applications into separate process spaces ,(1998)
Luciano Bononi, Michele Bracuto, Gabriele D’Angelo, Lorenzo Donatiello, Analysis of High Performance Communication and Computation Solutions for Parallel and Distributed Simulation High Performance Computing and Communications. pp. 640- 651 ,(2005) , 10.1007/11557654_74
Panagiotis Kougiouris, Graham Hamilton, Method and apparatus for space-efficient inter-process communication ,(1995)
Min-Yu Yang, Wayne M. Cranston, Michael J. Purtell, High performance interprocess communication ,(2001)
Lasse Bigum, Egon Pedersen, Lars T. Mikkelsen, Anders Ravn, Henrik Davidsen, Emmanuel Fleury, Jinhong Guo, Il-Pyung Park, Stephen L. Johnson, Methodologies to secure inter-process communication based on trust ,(2006)
Phillip Brian Scott, Suresh Venkatraman, Chad N. R. Knudson, Cross-process common system resource data sharing ,(2005)
Muthian Sivathanu, Madhusudhan Talluri, Zero-copy transfer of memory between address spaces ,(2005)
Juraj Gottweis, Ramesh Chinta, Gareth A. Howell, David C. LeBlanc, Kiran Akella Venkata, S. Franklin Williams, Scott A. Field, System for running potentially malicious code ,(2008)