메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 158-184

Execution monitoring enforcement under memory-limitation constraints

Author keywords

Bounded history automata; Edit automata; Execution monitoring; Locally testable properties; Security policies

Indexed keywords

AUTOMATA THEORY; CONSTRAINT THEORY; DATA STORAGE EQUIPMENT; PROBLEM SOLVING; TAXONOMIES;

EID: 40149091526     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.07.009     Document Type: Article
Times cited : (35)

References (32)
  • 1
    • 40149087446 scopus 로고    scopus 로고
    • L. Bauer, J. Ligatti, D. Walker, More enforceable security policies, in: Foundations of Computer Security, Copenhagen, Denmark, 2002, pp. 95-104.
    • L. Bauer, J. Ligatti, D. Walker, More enforceable security policies, in: Foundations of Computer Security, Copenhagen, Denmark, 2002, pp. 95-104.
  • 2
    • 31844457357 scopus 로고    scopus 로고
    • Composing security policies with polymer
    • Bauer L., Ligatti J., and Walker D. Composing security policies with polymer. SIGPLAN Not 40 6 (2005) 305-314
    • (2005) SIGPLAN Not , vol.40 , Issue.6 , pp. 305-314
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 4
    • 40149101066 scopus 로고    scopus 로고
    • K. Biba, Integrity considerations for secure computer systems, Technical Report 76-372, US Air Force Electronic Systems Division, 1977.
    • K. Biba, Integrity considerations for secure computer systems, Technical Report 76-372, US Air Force Electronic Systems Division, 1977.
  • 5
    • 40149111802 scopus 로고    scopus 로고
    • W.E. Boebert, R.Y. Kain, A practical alternative to hierarchical integrity policies, in: Proceedings of the 8th National Computer Security Conference, 1985, pp. 18-27.
    • W.E. Boebert, R.Y. Kain, A practical alternative to hierarchical integrity policies, in: Proceedings of the 8th National Computer Security Conference, 1985, pp. 18-27.
  • 6
    • 0024663219 scopus 로고    scopus 로고
    • D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in: IEEE Symposium on Security and Privacy, 1989, pp. 206-214.
    • D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in: IEEE Symposium on Security and Privacy, 1989, pp. 206-214.
  • 7
    • 0347269342 scopus 로고    scopus 로고
    • Families of locally testable languages
    • Caron P. Families of locally testable languages. Theor. Comput. Sci. 242 1-2 (2000) 361-376
    • (2000) Theor. Comput. Sci. , vol.242 , Issue.1-2 , pp. 361-376
    • Caron, P.1
  • 8
    • 0032218233 scopus 로고    scopus 로고
    • G. Edjladi, A. Acharya, V. Chaudhary, History-based access control for mobile code, in: 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998, pp. 38-48.
    • G. Edjladi, A. Acharya, V. Chaudhary, History-based access control for mobile code, in: 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998, pp. 38-48.
  • 9
    • 3543121920 scopus 로고    scopus 로고
    • P.W.L. Fong, Access control by tracking shallow execution history, in: Proceedings of the 2004 IEEE Symposium on Security and Privacy, Berkeley, CA, 2004.
    • P.W.L. Fong, Access control by tracking shallow execution history, in: Proceedings of the 2004 IEEE Symposium on Security and Privacy, Berkeley, CA, 2004.
  • 10
    • 0036041144 scopus 로고    scopus 로고
    • C. Fournet, A.D. Gordon, Stack inspection: theory and variants, in: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, 2002, pp. 307-318.
    • C. Fournet, A.D. Gordon, Stack inspection: theory and variants, in: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, 2002, pp. 307-318.
  • 11
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • Gligor V.D. A note on denial-of-service in operating systems. IEEE Trans. Software Eng. 10 3 (1984) 320-324
    • (1984) IEEE Trans. Software Eng. , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 13
    • 0026243650 scopus 로고
    • A polynomial time algorithm for the local testability problem of deterministic finite automata
    • Kim S., McNaughton R., and McCloskey R. A polynomial time algorithm for the local testability problem of deterministic finite automata. IEEE Trans. Comput. 40 (1991) 1087-1093
    • (1991) IEEE Trans. Comput. , vol.40 , pp. 1087-1093
    • Kim, S.1    McNaughton, R.2    McCloskey, R.3
  • 14
    • 0028743322 scopus 로고
    • Computing the order of a locally testable automaton
    • Kim S., and McNaughton R. Computing the order of a locally testable automaton. SIAM J. Comput. 23 (1994) 1193-1215
    • (1994) SIAM J. Comput. , vol.23 , pp. 1193-1215
    • Kim, S.1    McNaughton, R.2
  • 15
    • 40149099687 scopus 로고    scopus 로고
    • O. Kupferman, Y. Lustig, M.Y. Vardi, On locally checkable properties, in: Proceedings of the 13th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR 2006), 2006.
    • O. Kupferman, Y. Lustig, M.Y. Vardi, On locally checkable properties, in: Proceedings of the 13th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR 2006), 2006.
  • 16
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport L. Proving the correctness of multiprocess programs. IEEE Trans. Software Eng. 3 2 (1977) 125-143
    • (1977) IEEE Trans. Software Eng. , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 17
    • 40149100416 scopus 로고    scopus 로고
    • B. Lampson, Protection, in: Proceedings 5th Symposium on Information Sciences and Systems, Princeton, New Jersey, 1971, pp. 437-443.
    • B. Lampson, Protection, in: Proceedings 5th Symposium on Information Sciences and Systems, Princeton, New Jersey, 1971, pp. 437-443.
  • 18
    • 13444275220 scopus 로고    scopus 로고
    • J. Ligatti, L. Bauer, D. Walker, Edit automata: enforcement mechanisms for run-time security policies, Int. J. Inform. Secur. 4 (1-2) (2005) 2-16 (Published online 26 Oct 2004).
    • J. Ligatti, L. Bauer, D. Walker, Edit automata: enforcement mechanisms for run-time security policies, Int. J. Inform. Secur. 4 (1-2) (2005) 2-16 (Published online 26 Oct 2004).
  • 19
    • 40149107825 scopus 로고    scopus 로고
    • J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, Technical Report TR-720-05, Princeton University, January 2005.
    • J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, Technical Report TR-720-05, Princeton University, January 2005.
  • 20
    • 33646066871 scopus 로고    scopus 로고
    • J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, in: Computer Security-ESORICS 2005: 10th European Symposium on Research in Computer Security, in: Lecture Notes in Computer Science, vol. 3679, 2005, pp. 355-373.
    • J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, in: Computer Security-ESORICS 2005: 10th European Symposium on Research in Computer Security, in: Lecture Notes in Computer Science, vol. 3679, 2005, pp. 355-373.
  • 21
    • 40149102760 scopus 로고    scopus 로고
    • A. Magnaghi, H. Tanaka, An efficient algorithm for order evaluation of strict locally testable languages.
    • A. Magnaghi, H. Tanaka, An efficient algorithm for order evaluation of strict locally testable languages.
  • 23
    • 40149102472 scopus 로고    scopus 로고
    • D. Perrin, J.-E. Pin, Infinite words. Automata, semigroups, logic and games, Pure and Applied Mathematics, vol. 141, Elsevier, 2004.
    • D. Perrin, J.-E. Pin, Infinite words. Automata, semigroups, logic and games, Pure and Applied Mathematics, vol. 141, Elsevier, 2004.
  • 24
    • 0002230149 scopus 로고
    • Finite semigroups and recognizable languages : an introduction
    • Fountain J. (Ed), Kluwer academic publishers
    • Pin J.E. Finite semigroups and recognizable languages : an introduction. In: Fountain J. (Ed). NATO Advanced Study Institute Semigroups, Formal Languages and Groups (1995), Kluwer academic publishers 1-32
    • (1995) NATO Advanced Study Institute Semigroups, Formal Languages and Groups , pp. 1-32
    • Pin, J.E.1
  • 26
    • 40149083041 scopus 로고    scopus 로고
    • A. Taivalsaari, Java Specification Request 139 J2ME Connected Limited Device Configuration 1.1, March 2003.
    • A. Taivalsaari, Java Specification Request 139 J2ME Connected Limited Device Configuration 1.1, March 2003.
  • 27
    • 0346303936 scopus 로고    scopus 로고
    • A polynomial time algorithm for local testability and its level
    • Trahtman A.N. A polynomial time algorithm for local testability and its level. J. Algebra Comput. 9 1 (1998) 1-2
    • (1998) J. Algebra Comput. , vol.9 , Issue.1 , pp. 1-2
    • Trahtman, A.N.1
  • 28
    • 84908308177 scopus 로고    scopus 로고
    • An algorithm to verify local threshold testability of deterministic finite automata
    • Trahtman A.N. An algorithm to verify local threshold testability of deterministic finite automata. Lecture Notes Comput. Sci. 2214 (2001) 164-171
    • (2001) Lecture Notes Comput. Sci. , vol.2214 , pp. 164-171
    • Trahtman, A.N.1
  • 29
    • 21144433767 scopus 로고    scopus 로고
    • A polynomial time algorithm for left [right] local testability
    • Trahtman A.N. A polynomial time algorithm for left [right] local testability. Lecture Notes Comput. Sci. 2608 (2003) 203-212
    • (2003) Lecture Notes Comput. Sci. , vol.2608 , pp. 203-212
    • Trahtman, A.N.1
  • 30
    • 40149087292 scopus 로고    scopus 로고
    • M. Viswanathan, Foundations for the Run-time Analysis of Software Systems, Ph.D. thesis, University of Pennsylvania, 2000.
    • M. Viswanathan, Foundations for the Run-time Analysis of Software Systems, Ph.D. thesis, University of Pennsylvania, 2000.
  • 31
    • 40149095042 scopus 로고    scopus 로고
    • W.D. Young, P.A. Telega, W.E. Boebert, A verified labler for the secure ada target, in: In Proceedings of the 9th National Computer Security Conference, 1986, pp. 55-61.
    • W.D. Young, P.A. Telega, W.E. Boebert, A verified labler for the secure ada target, in: In Proceedings of the 9th National Computer Security Conference, 1986, pp. 55-61.
  • 32
    • 40149099429 scopus 로고    scopus 로고
    • A Package TESTAS for Checking Some Kinds of Testability.
    • A Package TESTAS for Checking Some Kinds of Testability.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.