메뉴 건너뛰기




Volumn 6561 LNCS, Issue , 2011, Pages 176-190

Corrective enforcement of security policies

Author keywords

Monitors; Program Transformation; Security Policies Enforcement

Indexed keywords

KEY ELEMENTS; MALICIOUS SOFTWARE; MONITORS; PARTIAL ORDER; PROGRAM TRANSFORMATIONS; SECURITY POLICIES ENFORCEMENT; SECURITY POLICY; SECURITY POLICY ENFORCEMENT; SECURITY PROPERTIES;

EID: 79952580008     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19751-2_12     Document Type: Conference Paper
Times cited : (6)

References (14)
  • 3
    • 78649245628 scopus 로고    scopus 로고
    • Towards practical enforcement theories
    • Jøsang, A., Maseng, T., Knapskog, S.J. (eds.), Springer, Heidelberg
    • Bielova, N.,Massacci, F.,Micheletti, A.: Towards practical enforcement theories. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 239-254. Springer, Heidelberg (2009)
    • (2009) NordSec 2009. LNCS , vol.5838 , pp. 239-254
    • Bielova, N.1    Massacci, F.2    Micheletti, A.3
  • 6
    • 78650741234 scopus 로고    scopus 로고
    • Generating in-line monitors for rabin automata
    • Jøsang, A., Maseng, T., Knapskog, S.J. (eds.), Springer, Heidelberg
    • Chabot, H., Khoury, R., Tawbi, N.: Generating in-line monitors for rabin automata. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 287- 301. Springer, Heidelberg (2009)
    • (2009) NordSec 2009. LNCS , vol.5838 , pp. 287-301
    • Chabot, H.1    Khoury, R.2    Tawbi, N.3
  • 14
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memorylimitations constraints
    • Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memorylimitations constraints. Information and Computation 206(1), 158-184 (2008)
    • (2008) Information and Computation , vol.206 , Issue.1 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.