I. Introduction
Recently there have been some efforts devoted to the development of real-time applications with security requirements. Security requirements in many real-time applications (see, for example, [25] and [27]) must be met in addition to satisfying timing constraints of the real-time applications. Examples of security sensitive real-time applications include online transaction processing systems [18], medical electronics [30], radar for tracking missiles [17], and aircraft control [9]. Sensitive data and processing in a variety of real-time systems must be protected against unauthorized accesses. For example, a radar tracking and processing system needs to read the images from the tracking subsystem periodically and send the tracking commands and directions to the tracking subsystem. In a railway signaling system, a train needs to communicate with the control center about its position, speed and the control center sends commands to the train of which track to follow and sets the train's speed if necessary. Such real-time applications require high quality of security to guarantee the messages between the subsystems not being read or altered by malicious users, and to guarantee the user really be whom he or she claims to be.