메뉴 건너뛰기




Volumn 10, Issue 4, 2011, Pages 239-254

Do you really mean what you actually enforced?

Author keywords

Formal models for security; Resource and access control; Trust and reputation; Validation Analysis tools and techniques

Indexed keywords

ENFORCEMENT MECHANISMS; FORMAL MODEL; RESOURCE AND ACCESS CONTROL; SAFETY PROPERTY; SECURITY ENFORCEMENT MECHANISMS; SECURITY POLICY; TRUST AND REPUTATION; VALIDATION/ANALYSIS TOOLS AND TECHNIQUES;

EID: 80051669929     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-011-0137-2     Document Type: Article
Times cited : (30)

References (22)
  • 2
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: enforcement mechanisms for run-time security policies
    • Bauer L., Ligatti J., Walker D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1-2), 2-16 (2005).
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.1-2 , pp. 2-16
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 7
    • 80051668536 scopus 로고    scopus 로고
    • CNET Networks: Channel 4's 4od: Tv on demand, at a price. Crave Webzine
    • CNET Networks: Channel 4's 4od: Tv on demand, at a price. Crave Webzine (2007).
    • (2007)
  • 17
    • 67349190826 scopus 로고    scopus 로고
    • Matching midlet's security claims with a platform security policy using automata modulo theory
    • (NordSec'07)
    • Massacci, F., Siahaan., I.: Matching midlet's security claims with a platform security policy using automata modulo theory. In: Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec'07) (2007).
    • (2007) Proceedings of the 12th Nordic Workshop on Secure IT Systems
    • Massacci, F.1    Siahaan, I.2
  • 20
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider F.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000).
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 22
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memory-limitation constraints
    • Talhi C., Tawbi N., Debbabi M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4), 158-184 (2007).
    • (2007) Inf. Comput. , vol.206 , Issue.2-4 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.