메뉴 건너뛰기




Volumn 4991 LNCS, Issue , 2008, Pages 233-247

Synthesising monitors from high-level policies for the safe execution of untrusted software

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PROGRAMMING LANGUAGES; SECURITY SYSTEMS; USER INTERFACES;

EID: 41549167799     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79104-1_17     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 41549124129 scopus 로고    scopus 로고
    • Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Cervesato, I. (ed.) Foundations of Computer Security: Proceedings of the FLoC 2002 workshop on Foundations of Computer Security, Copenhagen, Denmark, DIKU Technical Report, July 25-26, pp. 95-104 (2002)
    • Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Cervesato, I. (ed.) Foundations of Computer Security: Proceedings of the FLoC 2002 workshop on Foundations of Computer Security, Copenhagen, Denmark, DIKU Technical Report, July 25-26, pp. 95-104 (2002)
  • 2
    • 31844433932 scopus 로고    scopus 로고
    • A language and system for composing security policies
    • Technical Report TR-699-04, Princeton University January
    • Bauer, L., Ligatti, J., Walker, D.: A language and system for composing security policies. Technical Report TR-699-04, Princeton University (January 2004)
    • (2004)
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 5
    • 84982897952 scopus 로고    scopus 로고
    • History-based access-control for mobile code
    • Technical report, University of California at Santa Barbara, Santa Barbara, CA. USA
    • Edjlali, G., Acharya, A., Chaudhary, V.: History-based access-control for mobile code. Technical report, University of California at Santa Barbara, Santa Barbara, CA. USA (1998)
    • (1998)
    • Edjlali, G.1    Acharya, A.2    Chaudhary, V.3
  • 7
    • 0032667877 scopus 로고    scopus 로고
    • Flexible policy-directed code safety
    • IEEE Computer Society Press. Los Alamitos
    • Evans, D., Twyman, A.: Flexible policy-directed code safety. In: IEEE Symposium on Security and Privacy, pp. 32-45. IEEE Computer Society Press. Los Alamitos (1999)
    • (1999) IEEE Symposium on Security and Privacy , pp. 32-45
    • Evans, D.1    Twyman, A.2
  • 11
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Paxson, V, ed, Washington, DC. USENIX, pp, August
    • th USENIX Security Symposium, Washington, DC. USENIX, pp. 128-146 (August 2003)
    • (2003) th USENIX Security Symposium , pp. 128-146
    • Provos, N.1
  • 12
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1). 30-50 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 13
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Berkeley. CA. USA. p, USENIX Association
    • Sekar, R., Uppuluri, P.: Synthesizing fast intrusion prevention/detection systems from high-level specifications. In: SSYM 1999: Proceedings of the 8th conference on USENIX Security Symposium. Berkeley. CA. USA. p. 6, USENIX Association (1999)
    • (1999) SSYM 1999: Proceedings of the 8th conference on USENIX Security Symposium , pp. 6
    • Sekar, R.1    Uppuluri, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.