메뉴 건너뛰기




Volumn 6542 LNCS, Issue , 2011, Pages 73-86

Predictability of enforcement

Author keywords

[No Author keywords available]

Indexed keywords

CURRENT THEORIES; EHEALTH; ENFORCEMENT MECHANISMS; INDUSTRIAL CASE STUDY; RUNTIMES; E HEALTH; REAL FUNCTIONS; RUNTIME ENFORCEMENTS;

EID: 79551553839     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19125-1_6     Document Type: Conference Paper
Times cited : (35)

References (22)
  • 2
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • DOI 10.1007/s10207-004-0046-8
    • Bauer, L., Ligatti, J., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. of Inform. Sec. 4(1-2), 2-16 (2005) (Pubitemid 40347198)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 3
    • 78649245628 scopus 로고    scopus 로고
    • Towards practical enforcement theories
    • Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. Springer, Heidelberg
    • Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 239-254. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5838 , pp. 239-254
    • Bielova, N.1    Massacci, F.2    Micheletti, A.3
  • 4
    • 41549167799 scopus 로고    scopus 로고
    • Synthesising monitors from high-level policies for the safe execution of untrusted software
    • Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
    • Brown, A., Ryan, M.: Synthesising monitors from high-level policies for the safe execution of untrusted software. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 233-247. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4991 , pp. 233-247
    • Brown, A.1    Ryan, M.2
  • 5
    • 79551568224 scopus 로고    scopus 로고
    • Expressiveness and closure properties for quantitative languages
    • abs/1007.4018
    • Chatterjee, K., Doyen, L., Henzinger, T.A.: Expressiveness and closure properties for quantitative languages. Comp. Research Repository, abs/1007.4018 (2010)
    • (2010) Comp. Research Repository
    • Chatterjee, K.1    Doyen, L.2    Henzinger, T.A.3
  • 10
    • 84943596290 scopus 로고    scopus 로고
    • xESB: An enterprise service bus for access and usage control policy enforcement
    • IFIPTM 2010. Springer, Heidelberg
    • Gheorghe, G., Neuhaus, S., Crispo, B.: xESB: An enterprise service bus for access and usage control policy enforcement. In: IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol. 321, pp. 63-78. Springer, Heidelberg (2010)
    • (2010) IFIP Advances in Information and Communication Technology , vol.321 , pp. 63-78
    • Gheorghe, G.1    Neuhaus, S.2    Crispo, B.3
  • 11
    • 78649280596 scopus 로고    scopus 로고
    • Using Equivalence Relations for Corrective Enforcement of Security Policies
    • Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. Springer, Heidelberg
    • Khoury, R., Tawbi, N.: Using Equivalence Relations for Corrective Enforcement of Security Policies. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 139-154. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6258 , pp. 139-154
    • Khoury, R.1    Tawbi, N.2
  • 12
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10(8), 707-710 (1966);
    • (1966) Soviet Physics Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.I.1
  • 15
    • 78049404569 scopus 로고    scopus 로고
    • A theory of runtime enforcement, with results
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87-100. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 87-100
    • Ligatti, J.1    Reddy, S.2
  • 21
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memory-limitation constraints
    • Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inform. and Comp. 206(2-4), 158-184 (2007)
    • (2007) Inform. and Comp. , vol.206 , Issue.2-4 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.