摘要:
Systems, methods and apparatuses for embodiments of a transformation engine for structured documents are disclosed. More specifically, instruction code may be generated by a compiler from transformation instructions for a structured document. Embodiments of the transformation engine may comprise hardware circuitry operable to execute the instruction code to process a structured document according to the transformation instructions such that output for an output document is generated.
摘要:
Systems, methods and apparatuses for embodiments of a transformation engine for structured documents are disclosed. More specifically, instruction code may be generated by a compiler from transformation instructions for a structured document. Embodiments of the transformation engine may comprise hardware circuitry operable to execute the instruction code to process a structured document according to the transformation instructions such that output for an output document is generated.
摘要:
An apparatus comprises a stylesheet compiler and a document processor. The stylesheet compiler is configured to identify expressions in a stylesheet and is configured to generate one or more expression trees representing the expressions. Expressions having one or more common nodes are represented as children of a subtree that represents the common nodes. Coupled to receive a document and the expression tree, the document processor is configured to evaluate the expressions represented in the one or more expression trees against the document.
摘要:
A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.
摘要:
Method, apparatus, and system for qualifying CPU transactions with security attributes. Immutable security attributes are generated for transactions initiator by a CPU or processor core that identifying the execution mode of the CPU/core being trusted or untrusted. The transactions may be targeted to an Input/Output (I/O) device or system memory via which a protected asset may be accessed. Policy enforcement logic blocks are implemented at various points in the apparatus or system that allow or deny transactions access to protected assets based on the immutable security attributes generated for the transactions. In one aspect, a multiple-level security scheme is implemented under which a mode register is updated via a first transaction to indicate the CPU/core is operating in a trusted execution mode, and security attributes are generated for a second transaction using execution mode indicia in the mode register to verify the transaction is from a trusted initiator.
摘要:
A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.
摘要:
Numerous embodiments of structured data transformation are disclosed. Some embodiments include characterizing at least a portion of an expression in a stylesheet as evaluatable at a phase wherein the phase is one of a compile phase, a parse phase, or a transformation phase of applying the stylesheet to a document to transform the document in a document transformation appliance, applying at least a portion of the expression to the document in the phase determined in the characterizing, combining results from applying the at least a portion of the expression and from applying other expressions to the document to generate a transformed document, and outputting the transformed document or saving the transformed document to memory.
摘要:
A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.