메뉴 건너뛰기




Volumn 5645 LNCS, Issue , 2009, Pages 175-190

Using edit automata for rewriting-based security enforcement

Author keywords

Edit automata; Execution monitoring; Program rewriting; Security properties

Indexed keywords

EDIT AUTOMATA; EXECUTION MONITORING; PROGRAM REWRITING; PROGRAM STATE; SECURITY AUTOMATA; SECURITY ENFORCEMENT; SECURITY MECHANISM; SECURITY PROPERTIES;

EID: 70350352545     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03007-9_12     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 3
    • 0033489650 scopus 로고    scopus 로고
    • Sasi enforcement of security policies: A retrospective
    • Caledon Hills, Ontario, Canada, pp, ACM Press, New York
    • Erlingsson, U., Schneider, F.B.: Sasi enforcement of security policies: a retrospective. In: Proceedings of the New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, pp. 87-95. ACM Press, New York (2000)
    • (2000) Proceedings of the New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 5
    • 70350415220 scopus 로고    scopus 로고
    • Viswanathan, M, Foundations for the Run-time Analysis of Software Systems. PhD thesis, University of Pennsylvania
    • Viswanathan, M.: Foundations for the Run-time Analysis of Software Systems. PhD thesis, University of Pennsylvania (2000)
    • (2000)
  • 6
    • 33646066871 scopus 로고    scopus 로고
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 355-373. Springer, Heidelberg (2005)
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
  • 7
    • 13444275220 scopus 로고    scopus 로고
    • Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4(1-2), 2-16 (2005) (published online 26 October 2004)
    • Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4(1-2), 2-16 (2005) (published online 26 October 2004)
  • 8
    • 14844332191 scopus 로고    scopus 로고
    • More enforceable security policies
    • Copenhagen, Denmark, July 25-26, pp
    • Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Foundations of Computer Security, Copenhagen, Denmark, July 25-26, pp. 95-104 (2002)
    • (2002) Foundations of Computer Security , pp. 95-104
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 9
    • 33646067678 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • Technical Report TR-720-05, Princeton University January
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. Technical Report TR-720-05, Princeton University (January 2005)
    • (2005)
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 10
    • 35248828504 scopus 로고    scopus 로고
    • Aspect-oriented programming
    • Akşit, M, Matsuoka, S, eds, ECOOP 1997, Springer, Heidelberg
    • Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1241 , pp. 220-242
    • Kiczales, G.1    Lamping, J.2    Menhdhekar, A.3    Maeda, C.4    Lopes, C.5    Loingtier, J.M.6    Irwin, J.7
  • 11
    • 82955230066 scopus 로고    scopus 로고
    • An overview of aspect J
    • Knudsen, J.L, ed, ECOOP 2001, Springer, Heidelberg
    • Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of aspect J. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, p. 327. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2072 , pp. 327
    • Kiczales, G.1    Hilsdale, E.2    Hugunin, J.3    Kersten, M.4    Palm, J.5    Griswold, W.6
  • 12
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering 3(2), 125-143 (1977)
    • (1977) IEEE Transactions of Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 13
    • 70350405846 scopus 로고    scopus 로고
    • Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University (2003); To appear in ACM Transactions on Programming Languages and Systems
    • Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University (2003); To appear in ACM Transactions on Programming Languages and Systems
  • 14
    • 0030685617 scopus 로고    scopus 로고
    • Necula, G.C.: Proof-carrying code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1997, pp. 106-119 (1997)
    • Necula, G.C.: Proof-carrying code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1997, pp. 106-119 (1997)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.