메뉴 건너뛰기




Volumn 197, Issue 1, 2008, Pages 45-58

ConSpec - A Formal Language for Policy Specification

Author keywords

ConSpec; security automata; security policy; Specification languages

Indexed keywords

AUTOMATA THEORY; LIFE CYCLE; SECURITY OF DATA; SEMANTICS; SPECIFICATION LANGUAGES;

EID: 39149102159     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.10.013     Document Type: Article
Times cited : (40)

References (16)
  • 2
    • 39149088197 scopus 로고    scopus 로고
    • Bauer, L., J. Ligatti and D. Walker, A language and system for composing security policies, Technical Report TR-681-03, Princeton University (2004)
    • Bauer, L., J. Ligatti and D. Walker, A language and system for composing security policies, Technical Report TR-681-03, Princeton University (2004)
  • 4
    • 39149089178 scopus 로고    scopus 로고
    • Dragoni, N., F. Massacci, K. Naliuka and I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice (to appear), 2007
    • Dragoni, N., F. Massacci, K. Naliuka and I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice (to appear), 2007
  • 5
    • 39149108672 scopus 로고    scopus 로고
    • Erlingsson, U., "The inlined reference monitor approach to security policy enforcement," Ph.D. thesis, Dep. of Computer Science, Cornell University (2004)
    • Erlingsson, U., "The inlined reference monitor approach to security policy enforcement," Ph.D. thesis, Dep. of Computer Science, Cornell University (2004)
  • 6
    • 0033489650 scopus 로고    scopus 로고
    • Erlingsson, U. and F. B. Schneider, SASI enforcement of security policies: a retrospective, in: Proc. of the Workshop on New Security Paradigms (NSPW '99) (2000), pp. 87-95. URL http://research.microsoft.com/users/ulfar/tr99_1758.pdf
    • Erlingsson, U. and F. B. Schneider, SASI enforcement of security policies: a retrospective, in: Proc. of the Workshop on New Security Paradigms (NSPW '99) (2000), pp. 87-95. URL http://research.microsoft.com/users/ulfar/tr99_1758.pdf
  • 8
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • Holzmann G.J. The model checker SPIN. Software Engineering 23 (1997) 279-295
    • (1997) Software Engineering , vol.23 , pp. 279-295
    • Holzmann, G.J.1
  • 9
    • 26444441275 scopus 로고
    • On the equivalence and containment problems for context-free languages
    • Hopcroft J.E. On the equivalence and containment problems for context-free languages. Theory of Computing Systems 3 (1969) 119-124
    • (1969) Theory of Computing Systems , vol.3 , pp. 119-124
    • Hopcroft, J.E.1
  • 10
    • 84976739235 scopus 로고
    • On equivalence and containment problems for formal languages
    • Hunt H.B., and Rosenkrantz D.J. On equivalence and containment problems for formal languages. J. ACM 24 (1977) 387-396
    • (1977) J. ACM , vol.24 , pp. 387-396
    • Hunt, H.B.1    Rosenkrantz, D.J.2
  • 11
    • 84957836728 scopus 로고
    • A decision algorithm for full propositional temporal logic
    • Kesten Y., Manna Z., McGuire H., and Pnueli A. A decision algorithm for full propositional temporal logic. CAV (1993) 97-109
    • (1993) CAV , pp. 97-109
    • Kesten, Y.1    Manna, Z.2    McGuire, H.3    Pnueli, A.4
  • 13
    • 0030685617 scopus 로고    scopus 로고
    • Necula, G.C., Proof-carrying code, in: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997
    • Necula, G.C., Proof-carrying code, in: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997
  • 15
    • 21644444136 scopus 로고    scopus 로고
    • Sekar, R., V. Venkatakrishnan, S. Basu, S. Bhatkar and D. C. DuVarney, Model-carrying code: a practical approach for safe execution of untrusted applications, ACM SIGOPS Operating Systems Review (2003)
    • Sekar, R., V. Venkatakrishnan, S. Basu, S. Bhatkar and D. C. DuVarney, Model-carrying code: a practical approach for safe execution of untrusted applications, ACM SIGOPS Operating Systems Review (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.