메뉴 건너뛰기




Volumn 12, Issue 3, 2009, Pages

Run-time enforcement of nonsafety policies

Author keywords

Liveness; Monitoring; Policy enforcement; Safety; Security automata; Security policies

Indexed keywords

LIVENESS; MONITORING; POLICY ENFORCEMENT; SAFETY; SECURITY AUTOMATA; SECURITY POLICIES;

EID: 60349103393     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1455526.1455532     Document Type: Article
Times cited : (160)

References (55)
  • 5
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • ALPERN, B. AND SCHNEIDER, F. B. 1987. Recognizing safety and liveness. Distrib. Comput. 2, 117-126.
    • (1987) Distrib. Comput , vol.2 , pp. 117-126
    • ALPERN, B.1    SCHNEIDER, F.B.2
  • 7
    • 35248842056 scopus 로고    scopus 로고
    • BAUER, L., LIGATTI, J., AND WALKER, D. 2003. Types and effects for non-interfering program monitors. In Proceedings of the Software Security-Theories and Systems. Mext-NSF-JSPS International Symposium, (ISSS'02). Tokyo, Japan, Revised Papers, M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds. Lecture Notes in Computer Science, 2609. Springer.
    • BAUER, L., LIGATTI, J., AND WALKER, D. 2003. Types and effects for non-interfering program monitors. In Proceedings of the Software Security-Theories and Systems. Mext-NSF-JSPS International Symposium, (ISSS'02). Tokyo, Japan, Revised Papers, M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds. Lecture Notes in Computer Science, vol. 2609. Springer.
  • 10
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Tech. rep. ESD-TR-76-372, MITRE Corporation
    • BIBA, K. J. 1975. Integrity considerations for secure computer systems. Tech. rep. ESD-TR-76-372, MITRE Corporation.
    • (1975)
    • BIBA, K.J.1
  • 20
    • 38349043294 scopus 로고    scopus 로고
    • Ph.D. thesis, Massachusetts Institute of Technology
    • EVANS, D. 2000. Policy-directed code safety. Ph.D. thesis, Massachusetts Institute of Technology.
    • (2000) Policy-directed code safety
    • EVANS, D.1
  • 23
    • 60349088604 scopus 로고    scopus 로고
    • Security policy enforcement by automated program-rewriting. Ph.D. thesis, Cornell University
    • HAMLEN, K. 2006. Security policy enforcement by automated program-rewriting. Ph.D. thesis, Cornell University.
    • (2006)
    • HAMLEN, K.1
  • 27
    • 84896694020 scopus 로고    scopus 로고
    • HAVELUND, K. AND ROŞU, G. 2004. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Trans. 6, 2, 158-173.
    • HAVELUND, K. AND ROŞU, G. 2004. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Trans. 6, 2, 158-173.
  • 31
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • LAMPOET, L. 1977. Proving the correctness of multiprocess programs. IEEE Trans. Softw. Engin. 3, 2, 125-143.
    • (1977) IEEE Trans. Softw. Engin , vol.3 , Issue.2 , pp. 125-143
    • LAMPOET, L.1
  • 32
    • 0026943147 scopus 로고
    • A specificational approach to high level program monitoring and measuring
    • LIAO, Y. AND COHEND. 1992. A specificational approach to high level program monitoring and measuring. IEEE Trans. Softw. Engin. 18, 11, 969-978.
    • (1992) IEEE Trans. Softw. Engin , vol.18 , Issue.11 , pp. 969-978
    • LIAO, Y.1    COHEND2
  • 33
    • 60349129736 scopus 로고    scopus 로고
    • Policy enforcement via program monitoring. Ph.D. thesis, Princeton University
    • LIGATTI, J. 2006. Policy enforcement via program monitoring. Ph.D. thesis, Princeton University.
    • (2006)
    • LIGATTI, J.1
  • 34
    • 33646064059 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Tech. rep. TR-681-03, Princeton University
    • LIGATTI, J., BAUER, L., AND WALKER, D. 2003. Edit automata: Enforcement mechanisms for run-time security policies. Tech. rep. TR-681-03, Princeton University.
    • (2003)
    • LIGATTI, J.1    BAUER, L.2    WALKER, D.3
  • 35
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • LIGATTI, J., BAUER, L., AND WALKER, D. 2005a. Edit automata: Enforcement mechanisms for run-time security policies. Int. J. Inform. Secur. 4, 1-2, 2-16.
    • (2005) Int. J. Inform. Secur , vol.4 , Issue.1-2 , pp. 2-16
    • LIGATTI, J.1    BAUER, L.2    WALKER, D.3
  • 39
    • 33846587542 scopus 로고    scopus 로고
    • An approach for the specification, verification and synthesis of secure systems
    • MAETINELLI, F. AND MATTEUCCI, I. 2007a. An approach for the specification, verification and synthesis of secure systems. Electron. Notes Theor. Comput. Sci. 168, 29-43.
    • (2007) Electron. Notes Theor. Comput. Sci , vol.168 , pp. 29-43
    • MAETINELLI, F.1    MATTEUCCI, I.2
  • 43
    • 34347249528 scopus 로고    scopus 로고
    • Automated synthesis of enforcing mechanisms for security properties in a timed setting
    • MATTEUCCI, I. 2007. Automated synthesis of enforcing mechanisms for security properties in a timed setting. Electron. Notes Theor. Comput. Sci. 186, 101-120.
    • (2007) Electron. Notes Theor. Comput. Sci , vol.186 , pp. 101-120
    • MATTEUCCI, I.1
  • 44
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of possibilistic properties
    • MCLEAN, J. 1996. A general theory of composition for a class of possibilistic properties. IEEE Trans. Softw. Engin. 22, 1, 53-67.
    • (1996) IEEE Trans. Softw. Engin , vol.22 , Issue.1 , pp. 53-67
    • MCLEAN, J.1
  • 45
    • 84918597829 scopus 로고
    • Synthesis of communicating behaviour
    • Mathematical Foundations of Computer Science
    • MILNER, R. 1978. Synthesis of communicating behaviour. In Mathematical Foundations of Computer Science. Lecture Notes in Computer Science, vol. 64. 71-83.
    • (1978) Lecture Notes in Computer Science , vol.64 , pp. 71-83
    • MILNER, R.1
  • 46
    • 0018708023 scopus 로고    scopus 로고
    • @PAXTON, W. H. 1979. A client-based transaction system to maintain data integrity. In Proceedings of the 7th ACM Symposium on Operating Systems Principles (OSP'79). ACM Press, 18-23.
    • @PAXTON, W. H. 1979. A client-based transaction system to maintain data integrity. In Proceedings of the 7th ACM Symposium on Operating Systems Principles (OSP'79). ACM Press, 18-23.
  • 48
    • 60349091144 scopus 로고
    • Decomposing properties into safety and liveness using predicate logic
    • 87-874, Cornell University
    • SCHNEIDER, F. B. 1987. Decomposing properties into safety and liveness using predicate logic. Tech. rep. TR 87-874, Cornell University.
    • (1987) Tech. rep. TR
    • SCHNEIDER, F.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.