메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 87-100

A theory of runtime enforcement, with results

Author keywords

enforceability theory; Security models

Indexed keywords

ENFORCEABILITY THEORY; GENERAL MODEL; MECHANISM MODELING; OPERATIONAL SEMANTICS; RUNTIME ENFORCEMENTS; RUNTIMES; SECURITY MODELING; SIMPLE++;

EID: 78049404569     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_6     Document Type: Conference Paper
Times cited : (45)

References (19)
  • 13
    • 78049411430 scopus 로고    scopus 로고
    • A theory of runtime enforcement, with results
    • University of South Florida June
    • Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. Technical Report USF-CSE-SS-102809, University of South Florida (June 2010), http://www.cse.usf.edu/~ligatti/papers/mra-tr.pdf
    • (2010) Technical Report USF-CSE-SS-102809
    • Ligatti, J.1    Reddy, S.2
  • 15
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 17
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memory-limitation constraints
    • Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Information and Computation 206 (2-4), 158-184 (2008)
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.