메뉴 건너뛰기




Volumn 3679 LNCS, Issue , 2005, Pages 355-373

Enforcing non-safety security policies with program monitors

Author keywords

[No Author keywords available]

Indexed keywords

RENEWAL PROPERTIES; SAFETY PROPERTY; SECURITY POLICIES; SECURITY-SENSITIVE ACTIONS;

EID: 33646066871     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11555827_21     Document Type: Conference Paper
Times cited : (43)

References (26)
  • 4
    • 35248842056 scopus 로고    scopus 로고
    • Types and effects for non-interfering program monitors
    • M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, Springer
    • L. Bauer, J. Ligatti, and D. Walker. Types and effects for non-interfering program monitors. In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, volume 2609 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2609
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 13
    • 3543139162 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • Cornell University, Aug.
    • K. Hamlen, G. Morrisett, and F. Schneider. Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University, Aug. 2003.
    • (2003) Technical Report , vol.TR2003-1908
    • Hamlen, K.1    Morrisett, G.2    Schneider, F.3
  • 18
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, 1977.
    • (1977) IEEE Transactions of Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 19
    • 33646064059 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Princeton University, May
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. Technical Report TR-681-03, Princeton University, May 2003.
    • (2003) Technical Report , vol.TR-681-03
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 20
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Feb.
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, Feb. 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 21
    • 33646067678 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • Princeton University, Jan.
    • J. Ligatti, L. Bauer, and D. Walker. Enforcing non-safety security policies with program monitors. Technical Report TR-720-05, Princeton University, Jan. 2005.
    • (2005) Technical Report , vol.TR-720-05
    • Ligatti, J.1    Bauer, L.2    Walker, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.