-
2
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
DOI 10.1007/s10207-004-0046-8
-
Bauer, L., Ligatti, J., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. of Inform. Sec. 4(1-2), 2-16 (2005) (Pubitemid 40347198)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
3
-
-
78649245628
-
Towards practical enforcement theories
-
Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. Springer, Heidelberg
-
Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 239-254. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5838
, pp. 239-254
-
-
Bielova, N.1
Massacci, F.2
Micheletti, A.3
-
4
-
-
41549167799
-
Synthesising monitors from high-level policies for the safe execution of untrusted software
-
Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
-
Brown, A., Ryan, M.: Synthesising monitors from high-level policies for the safe execution of untrusted software. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 233-247. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4991
, pp. 233-247
-
-
Brown, A.1
Ryan, M.2
-
7
-
-
43049166949
-
Security-by-contract on the .net platform
-
Desmet, L., Joosen, W., Massacci, F., Philippaerts, P., Piessens, F., Siahaan, I., Vanoverberghe, D.: Security-by-contract on the .net platform. Information Security Technical Report 13(1), 25-32 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.1
, pp. 25-32
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Philippaerts, P.4
Piessens, F.5
Siahaan, I.6
Vanoverberghe, D.7
-
9
-
-
70549102701
-
Enforcement monitoring wrt. the safety-progress classification of properties
-
ACM Press, New York
-
Falcone, Y., Fernandez, J.-C., Mounier, L.: Enforcement monitoring wrt. the safety-progress classification of properties. In: Proc. of 24th ACM Symp. on Applied Computing - Software Verif. and Test. Track, pp. 593-600. ACM Press, New York (2009)
-
(2009)
Proc. of 24th ACM Symp. on Applied Computing - Software Verif. and Test. Track
, pp. 593-600
-
-
Falcone, Y.1
Fernandez, J.-C.2
Mounier, L.3
-
10
-
-
84943596290
-
xESB: An enterprise service bus for access and usage control policy enforcement
-
IFIPTM 2010. Springer, Heidelberg
-
Gheorghe, G., Neuhaus, S., Crispo, B.: xESB: An enterprise service bus for access and usage control policy enforcement. In: IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol. 321, pp. 63-78. Springer, Heidelberg (2010)
-
(2010)
IFIP Advances in Information and Communication Technology
, vol.321
, pp. 63-78
-
-
Gheorghe, G.1
Neuhaus, S.2
Crispo, B.3
-
11
-
-
78649280596
-
Using Equivalence Relations for Corrective Enforcement of Security Policies
-
Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. Springer, Heidelberg
-
Khoury, R., Tawbi, N.: Using Equivalence Relations for Corrective Enforcement of Security Policies. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 139-154. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6258
, pp. 139-154
-
-
Khoury, R.1
Tawbi, N.2
-
12
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10(8), 707-710 (1966);
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
14
-
-
60349103393
-
Run-time enforcement of nonsafety policies
-
Ligatti, J., Bauer, L.,Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. on Inform. and Sys. Security 12(3), 1-41 (2009)
-
(2009)
ACM Trans. on Inform. and Sys. Security
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
15
-
-
78049404569
-
A theory of runtime enforcement, with results
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87-100. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 87-100
-
-
Ligatti, J.1
Reddy, S.2
-
18
-
-
77952327855
-
Lightweight self-protecting javascript
-
ACM Press, New York
-
Phung, P.H., Sands, D., Chudnov, A.: Lightweight self-protecting javascript. In: Proc. of ACM Symp. on Inform. Comp. and Comm. Security, pp. 47-60. ACM Press, New York (2009)
-
(2009)
Proc. of ACM Symp. on Inform. Comp. and Comm. Security
, pp. 47-60
-
-
Phung, P.H.1
Sands, D.2
Chudnov, A.3
-
19
-
-
57849100172
-
Mechanisms for usage control
-
ACM Press, New York
-
Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proc. of ACM Symp. on Inform. Comp. and Comm. Security, pp. 240- 244. ACM Press, New York (2008)
-
(2008)
Proc. of ACM Symp. on Inform. Comp. and Comm. Security
, pp. 240-244
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
21
-
-
40149091526
-
Execution monitoring enforcement under memory-limitation constraints
-
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inform. and Comp. 206(2-4), 158-184 (2007)
-
(2007)
Inform. and Comp.
, vol.206
, Issue.2-4
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
22
-
-
34548253921
-
Javascript instrumentation for browser security
-
ACM Press, New York
-
Yun, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proc. of the 34th ACM SIGPLAN-SIGACT Symp. on Princ. of Prog. Lang., pp. 237-249. ACM Press, New York (2007)
-
(2007)
Proc. of the 34th ACM SIGPLAN-SIGACT Symp. on Princ. of Prog. Lang.
, pp. 237-249
-
-
Yun, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|