메뉴 건너뛰기




Volumn 28, Issue 1, 2006, Pages 175-205

Computability classes for enforcement mechanisms

Author keywords

Edit automata; Execution monitoring; Inlined reference monitoring; Program rewriting; Reference monitors; Security automata

Indexed keywords

EDIT AUTOMATA; EXECUTION MONITORING; INLINED REFERENCE MONITORING; PROGRAM REWRITING; REFERENCE MONITORS; SECURITY AUTOMATA;

EID: 33745329295     PISSN: 01640925     EISSN: 01640925     Source Type: Journal    
DOI: 10.1145/1111596.1111601     Document Type: Article
Times cited : (165)

References (32)
  • 1
    • 33745409854 scopus 로고
    • Computer security technology planning study vols. I and III
    • HQ Electronic Systems Division: Hanscom AFB, MA, Fort Washington, Pennsylvania. October
    • ANDERSON, J. 1972. Computer security technology planning study vols. I and III. Tech. Rep. ESD-TR-73-51, HQ Electronic Systems Division: Hanscom AFB, MA, Fort Washington, Pennsylvania. October.
    • (1972) Tech. Rep. , vol.ESD-TR-73-51
    • Anderson, J.1
  • 7
    • 34347193348 scopus 로고
    • Über formal unentscheidbare sätze der Principia Mathematica und verwandter Systeme
    • GÖDEL, K. 1931. Über formal unentscheidbare sätze der Principia Mathematica und verwandter Systeme. Monatshefte für Mathematik und Physik 38, 173-198.
    • (1931) Monatshefte für Mathematik und Physik , vol.38 , pp. 173-198
    • Gödel, K.1
  • 8
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Comm. ACM 19, 8 (Aug.), 461-471.
    • (1976) Comm. ACM , vol.19 , Issue.8 AUG , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 12
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • LAMPORT, L. 1977. Proving the correctness of multiprocess programs. IEEE Trans. Soft. Eng. SE-3 2, 125-143.
    • (1977) IEEE Trans. Soft. Eng. , vol.SE-32 , pp. 125-143
    • Lamport, L.1
  • 14
    • 33646064059 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for runtime security policies
    • Princeton University, Princeton, New Jersey. May
    • LIGATTI, J., BAUER, L., AND WALKER, D. 2003. Edit automata: Enforcement mechanisms for runtime security policies. Tech. Rep. TR-681-03, Princeton University, Princeton, New Jersey. May.
    • (2003) Tech. Rep. , vol.TR-681-03
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 15
    • 33646067678 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • Princeton University, Princeton, New Jersey. January
    • LIGATTI, J., BAUER, L., AND WALKER, D. 2005. Enforcing non-safety security policies with program monitors. Tech. Rep. TR-720-05, Princeton University, Princeton, New Jersey. January.
    • (2005) Tech. Rep. , vol.TR-720-05
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 17
    • 33745381466 scopus 로고
    • The search for a unifying framework for computer security
    • Invited Panel Discussion Position Paper, Second Franconia Workshop on Foundations of Computer Security, June 11-14, 1989
    • MARCUS, L. Fall 1989. The search for a unifying framework for computer security. IEEE Cipher, 55-63. Invited Panel Discussion Position Paper, Second Franconia Workshop on Foundations of Computer Security, June 11-14, 1989.
    • (1989) IEEE Cipher , pp. 55-63
    • Marcus, L.F.1
  • 18
    • 0041525084 scopus 로고    scopus 로고
    • From system F to typed assembly language
    • MORRISETT, G., CRARY, K., AND GLEW, N. 1999. From System F to Typed Assembly Language. ACM Trans. Prog. Lang. Syst. 21, 3 (May), 527-568.
    • (1999) ACM Trans. Prog. Lang. Syst. , vol.21 , Issue.3 MAY , pp. 527-568
    • Morrisett, G.1    Crary, K.2    Glew, N.3
  • 20
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • NACHENBERG, C. 1997. Computer virus-antivirus coevolution. Comm. ACM 40, 1 (Jan.), 46-51.
    • (1997) Comm. ACM , vol.40 , Issue.1 JAN , pp. 46-51
    • Nachenberg, C.1
  • 25
    • 0005258611 scopus 로고
    • Revised 4 report on the algorithmic language Scheme
    • REES, J. AND CLINGER, W. 1991. Revised 4 report on the algorithmic language Scheme. Lisp Pointers 4, 3 (July-Sept.), 1-55.
    • (1991) Lisp Pointers , vol.4 , Issue.3 JULY-SEPT , pp. 1-55
    • Rees, J.1    Clinger, W.2
  • 27
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • SCHNEIDER, F. B. 2000. Enforceable security policies. ACM Trans. Inform. Syst. Secur. 3, 1 (Feb.), 30-50.
    • (2000) ACM Trans. Inform. Syst. Secur. , vol.3 , Issue.1 FEB , pp. 30-50
    • Schneider, F.B.1
  • 29
    • 84960561455 scopus 로고
    • On computable numbers with an application to the Entscheidungs-problem
    • TURING, A. M. 1936. On computable numbers with an application to the Entscheidungs-problem. In Proceedings of the London Mathematical Society, vol. 2. 42, 230-265.
    • (1936) Proceedings of the London Mathematical Society , vol.2 , Issue.42 , pp. 230-265
    • Turing, A.M.1
  • 32
    • 0006291871 scopus 로고
    • Security controls for computer systems
    • Rand Corp. October
    • WARE, W. 1979. Security controls for computer systems. Tech. Rep. R-609-1, Rand Corp. October.
    • (1979) Tech. Rep. , vol.R-609-1
    • Ware, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.