메뉴 건너뛰기




Volumn 6258 LNCS, Issue , 2010, Pages 139-154

Using equivalence relations for corrective enforcement of security policies

Author keywords

Inlined reference monitors; Monitoring; Program transformation; Security policy enforcement

Indexed keywords

EQUIVALENCE RELATIONS; INPUT AND OUTPUTS; PRIORI KNOWLEDGE; PROGRAM TRANSFORMATIONS; REFERENCE MONITORS; RUNTIMES; SECURITY POLICY; SECURITY POLICY ENFORCEMENT;

EID: 78649280596     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14706-7_11     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 1
    • 0023558367 scopus 로고
    • RECOGNIZING SAFETY and LIVENESS
    • Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distributed Computing 2, 17-126 (1987) (Pubitemid 18536927)
    • (1987) Distributed Computing , vol.2 , Issue.3 , pp. 117-126
    • Alpern, B.1    Schneider Fred, B.2
  • 3
    • 85016422463 scopus 로고    scopus 로고
    • Monitoring of real-time properties
    • Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. Springer, Heidelberg
    • Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 260-272. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4337 , pp. 260-272
    • Bauer, A.1    Leucker, M.2    Schallhart, C.3
  • 5
    • 78649245628 scopus 로고    scopus 로고
    • Towards practical enforcement theories
    • Knapskog, S.J. (ed.) NordSec 2009. Springer, Heidelberg
    • Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: Knapskog, S.J. (ed.) NordSec 2009. LNCS, vol. 5838, pp. 239-254. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5838 , pp. 239-254
    • Bielova, N.1    Massacci, F.2    Micheletti, A.3
  • 7
    • 78650741234 scopus 로고    scopus 로고
    • Generating in-line monitors for Rabin automata
    • Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. Springer, Heidelberg
    • Chabot, H., Khoury, R., Tawbi, N.: Generating in-line monitors for Rabin automata. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 287-301. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5838 , pp. 287-301
    • Chabot, H.1    Khoury, R.2    Tawbi, N.3
  • 11
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering 3(2), 125-143 (1977)
    • (1977) IEEE Transactions on Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 12
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • DOI 10.1007/s10207-004-0046-8
    • Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policie. International Journal of Information Security (2004) (Pubitemid 40347198)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 13
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 355-373
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 17
    • 84875422408 scopus 로고    scopus 로고
    • Mathematics of multisets
    • Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. Springer, Heidelberg
    • Syropoulos, A.: Mathematics of multisets. In: Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. LNCS, vol. 2235, pp. 347-358. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2235 , pp. 347-358
    • Syropoulos, A.1
  • 18
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memory-limitations constraints
    • Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitations constraints. Information and Computation 206(1), 158-184 (2008)
    • (2008) Information and Computation , vol.206 , Issue.1 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.