메뉴 건너뛰기




Volumn 55, Issue 8, 2012, Pages 979-994

A performance-oriented monitoring system for security properties in cloud computing applications

Author keywords

cloud computing; dynamic verification; event sequence language; monitoring rules; security properties

Indexed keywords

COMPUTING APPLICATIONS; DYNAMIC SECURITY MONITORING; DYNAMIC VERIFICATIONS; EVENT-SEQUENCE LANGUAGE; MONITORING ENGINES; MONITORING SYSTEM; SECURITY MEASURE; SECURITY PROPERTIES;

EID: 84864644859     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxs042     Document Type: Conference Paper
Times cited : (24)

References (53)
  • 1
    • 84944202148 scopus 로고    scopus 로고
    • Rule-based runtime verification
    • Verification, Model Checking, and Abstract Interpretation
    • Barringer, H., Goldberg, A., Havelund, K. and Sen, K. (2004) Rule-Based Runtime Verification. 5th Int. Conf. on Verification, Model Checking and Abstract Interpretation, LNCS 2937, Springer, pp. 44-57. (Pubitemid 38131366)
    • (2003) Lecture Notes in Computer Science , Issue.2937 , pp. 44-57
    • Barringer, H.1    Goldberg, A.2    Havelund, K.3    Sen, K.4
  • 2
    • 84877292372 scopus 로고    scopus 로고
    • Event-based runtime verification of java programs
    • St. Louis, MO. . ACM Press, NY.
    • d'Amorim, M. and Havelund, K. (2005) Event-based Runtime Verification of Java Programs. Proc. 3rd Int. Workshop on Dynamic Analysis, St. Louis, MO. pp. 1-7. ACM Press, NY.
    • (2005) Proc. 3rd Int. Workshop on Dynamic Analysis , pp. 1-7
    • D'amorim, M.1    Havelund, K.2
  • 3
    • 11144354549 scopus 로고    scopus 로고
    • An overview of the runtime verification tool Java PathExplorer
    • Havelund, K. and Rosu, G. (2004) An overview of the runtime verification tool Java PathExplorer. Methods in System Design, 24, 189-215.
    • (2004) Methods in System Design , vol.24 , pp. 189-215
    • Havelund, K.1    Rosu, G.2
  • 6
    • 18944375047 scopus 로고    scopus 로고
    • Towards monitoring-oriented programming: A paradigm combining specification and implementation
    • Elsevier
    • Chen, F. and Rosu. (2003) Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation. Electronic Notes in Theoretical Computer Science 89, No. 2, Elsevier.
    • (2003) Electronic Notes in Theoretical Computer Science , vol.89 , Issue.2
    • Chen, F.1    Rosu2
  • 8
    • 85047040703 scopus 로고
    • The temporal logic of programs
    • Los Alamitos, CA. . IEEE Computer Society.
    • Pnueli. A. (1977) The Temporal Logic of Programs. Proc. 18th IEEE Symp. Foundations of Computer Science, Los Alamitos, CA. pp. 46-77. IEEE Computer Society.
    • (1977) Proc. 18th IEEE Symp. Foundations of Computer Science , pp. 46-77
    • Pnueli, A.1
  • 9
    • 84947290593 scopus 로고    scopus 로고
    • The temporal rover and theatg rover
    • Havelund, K., Penix, J. andVisser,W. (eds) LNCS 1885. Springer.
    • Drusinsky, D. (2000) The Temporal Rover and theATG Rover. In Havelund, K., Penix, J. andVisser,W. (eds) SPIN Model Checking and Software Verification, LNCS 1885, pp. 323-330. Springer.
    • (2000) SPIN Model Checking and Software Verification , pp. 323-330
    • Drusinsky, D.1
  • 10
    • 0027969856 scopus 로고
    • Compositional verification of real-time systems
    • Paris (France). . IEEE Computer Society Press.
    • Chang, E., Pnueli, A. and Manna, Z. (1994) Compositional Verification of Real-Time Systems. Proc. 9th IEEE Symp. Logic in Computer Science, Paris (France). pp. 458-465. IEEE Computer Society Press.
    • (1994) Proc. 9th IEEE Symp. Logic in Computer Science , pp. 458-465
    • Chang, E.1    Pnueli, A.2    Manna, Z.3
  • 11
    • 80455164429 scopus 로고    scopus 로고
    • Generating optimal monitors for extended regular expressions
    • Boulder, CO, USA. . Elsevier Science.
    • Sen, K. and Rosu, G. (2003) Generating Optimal Monitors for Extended Regular Expressions. Proc. 3rd Int. Workshop on Runtim Verification, Boulder, CO, USA. pp. 162-181. Elsevier Science.
    • (2003) Proc. 3rd Int. Workshop on Runtim Verification , pp. 162-181
    • Sen, K.1    Rosu, G.2
  • 12
    • 0009902282 scopus 로고    scopus 로고
    • Monitoring java programs with java pathexplorer
    • Paris (France). . Elsevier Science.
    • Havelund, K. and Rosu, G. (2001) Monitoring Java Programs with Java PathExplorer. 1st Int. Workshop on Runtime Verification, Paris (France). pp. 97-114. Elsevier Science.
    • (2001) 1st Int. Workshop on Runtime Verification , pp. 97-114
    • Havelund, K.1    Rosu, G.2
  • 13
    • 85116922800 scopus 로고    scopus 로고
    • Monitoring programs using rewriting
    • San Diego, USA. . Institute of Electrical and Electronics Engineers. Institue of Electrical and Electronics Engineers.
    • Havelund, K. and Rosu, G. (2001). Monitoring Programs using Rewriting. Proc. Int. Conf. on Automated Software Engineering (ASE'01), San Diego, USA. pp. 135-143. Institute of Electrical and Electronics Engineers. Institue of Electrical and Electronics Engineers.
    • (2001) Proc. Int. Conf. on Automated Software Engineering (ASE'01) , pp. 135-143
    • Havelund, K.1    Rosu, G.2
  • 16
    • 72849125151 scopus 로고    scopus 로고
    • Automata-based verification of temporal properties on running programs
    • Coronado Island, CA. ENTCS. IEEE Computer Society.
    • Giannakopoulou, D. and Havelund, K. (2001) Automata-Based Verification of Temporal Properties on Running Programs. Proc. Int. Conf. on Automated Software Engineering, Coronado Island, CA. pp. 412-416. ENTCS. IEEE Computer Society.
    • (2001) Proc. Int. Conf. on Automated Software Engineering , pp. 412-416
    • Giannakopoulou, D.1    Havelund, K.2
  • 20
    • 1642497296 scopus 로고    scopus 로고
    • Artificial Intelligence Today, LNAI 1600. Springer-Verlag.
    • Shanahan, M. (1999) The Event Calculus Explained. Artificial Intelligence Today, LNAI 1600, pp. 409-430. Springer-Verlag.
    • (1999) The Event Calculus Explained , pp. 409-430
    • Shanahan, M.1
  • 22
    • 84948681435 scopus 로고    scopus 로고
    • Monitoring software requirements using instrumented code
    • Big Island (Hawaii)
    • Robinson. W. (2002) Monitoring Software Requirements using Instrumented Code. Proc. Hawaii Int. Conf. on Systems Sciences, Big Island (Hawaii).
    • (2002) Proc. Hawaii Int. Conf. on Systems Sciences
    • Robinson, W.1
  • 25
    • 24644441365 scopus 로고    scopus 로고
    • Fault diagnosis using timed automata
    • Foundations of Software Science and Computational Structures - 8th Int. Conference, FOSSACS 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proc.
    • Bouyer, P., Chevalier, F. and D'Souza, D. (2005) Fault Diagnosis using Timed Automata. Proc. 8th Int. Conf. on Foundations of Software Science and Computations Structures, Edinburg (UK). LNCS 3441, pp. 219-233. Springer. (Pubitemid 41273709)
    • (2005) Lecture Notes in Computer Science , vol.3441 , pp. 219-233
    • Bouyer, P.1    Chevalier, F.2    D'Souza, D.3
  • 27
    • 16244391819 scopus 로고    scopus 로고
    • A formal framework for the decentralised diagnosis of large scale discrete event systems & its application to telecommunication networks
    • Pencolé, Y. and Cordier, M. (2005) A formal framework for the decentralised diagnosis of large scale discrete event systems & its application to telecommunication networks. Artif. Intell., 164, 121-180.
    • (2005) Artif. Intell. , vol.164 , pp. 121-180
    • Pencolé, Y.1    Cordier, M.2
  • 33
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Oakland (USA) . IEEE Society Press.
    • Ko, C., Ruschitzka, M. and Levitt, K. (1997) Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. IEEE Symp. on Security and Privacy, Oakland (USA). pp. 175-187. IEEE Society Press.
    • (1997) IEEE Symp. on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 35
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • Alpern, B. and Schneider, F.B. (1987) Recognizing safety and liveness. Distrib. Comput., 2, 117-126.
    • (1987) Distrib. Comput. , vol.2 , pp. 117-126
    • Alpern, B.1    Schneider, F.B.2
  • 36
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • DOI 10.1007/s10207-004-0046-8
    • Ligatti, J., Bauer, L. and Walker, D. (2005) Edit Automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur., 4, 2-16. (Pubitemid 40347198)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 37
    • 84856202162 scopus 로고    scopus 로고
    • Using event calculus to formalise policy specification and analysis
    • POLICY, Lake Como (Italy) . IEEE Computer Society.
    • Bandara, A.K., Lupu, E.C. and Russo, A. (2003) Using Event Calculus to Formalise Policy Specification and Analysis. Proc. Policies for Distributed Systems and Networks, POLICY, Lake Como (Italy). pp. 26-39. IEEE Computer Society.
    • (2003) Proc. Policies for Distributed Systems and Networks , pp. 26-39
    • Bandara, A.K.1    Lupu, E.C.2    Russo, A.3
  • 40
    • 18944370080 scopus 로고    scopus 로고
    • The programming language tempura
    • Moszkowski, B. (1996) The programming language Tempura. J. Symb. Comput., 22, 730-733.
    • (1996) J. Symb. Comput. , vol.22 , pp. 730-733
    • Moszkowski, B.1
  • 41
    • 84864718743 scopus 로고    scopus 로고
    • Appeared inWorkshop on Security, Middleware, and Languages, Stockholm
    • Brisset, P. (2000) A Case Study in Java Software Verification. Appeared inWorkshop on Security, Middleware, and Languages, Stockholm.
    • (2000) A Case Study in Java Software Verification
    • Brisset, P.1
  • 45
    • 0242579167 scopus 로고    scopus 로고
    • Carisma: Context aware reflective middleware system for mobile applications
    • Capra, L., Emmerich, W. and Mascolo, C. (2003) CARISMA: context aware reflective middleware system for mobile applications. IEEE Trans. Softw. Eng., 29, 929-945.
    • (2003) IEEE Trans. Softw. Eng. , vol.29 , pp. 929-945
    • Capra, L.1    Emmerich, W.2    Mascolo, C.3
  • 46
    • 0036282017 scopus 로고    scopus 로고
    • XMIDDLE: A data-sharing middleware for mobile computing
    • DOI 10.1023/A:1015584805733
    • Mascolo, C., Capra, L., Zachariadis, S. and Emmerich,W. (2002) XMIDDLE:A Data-Sharing Middleware for Mobile Computing. Int. J. Wirel. Pers. Commun., 21, pp. 77-103. Kluwer Academic Publisher. (Pubitemid 34630509)
    • (2002) Wireless Personal Communications , vol.21 , Issue.1 , pp. 77-103
    • Mascolo, C.1    Capra, L.2    Zachariadis, S.3    Emmerich, W.4
  • 47
    • 29844451140 scopus 로고    scopus 로고
    • Jassda trace assertions, runtime checking the dynamic of java programs
    • Schieferdecker, I., König, H. and Wolisz, A. (eds) . Berlin, Germany.
    • Brörkens, M. and Möller, M. (2002) Jassda Trace Assertions, Runtime Checking the Dynamic of Java Programs. In Schieferdecker, I., König, H. and Wolisz, A. (eds) Trends in Testing Communicating Systems, pp. 39-48. Berlin, Germany.
    • (2002) Trends in Testing Communicating Systems , pp. 39-48
    • Brörkens, M.1    Möller, M.2
  • 49
    • 0347807097 scopus 로고    scopus 로고
    • Formal Techniques for Java-like Programs.Technical Reports from ETH Zurich 408. ETH Zurich, Switzerland
    • Goldberg, A. and Havelund, K. (2003) Instrumentation of Java Bytecode for Runtime Analysis. Formal Techniques for Java-like Programs.Technical Reports from ETH Zurich 408. ETH Zurich, Switzerland.
    • (2003) Instrumentation of Java Bytecode for Runtime Analysis
    • Goldberg, A.1    Havelund, K.2
  • 51
    • 0141641166 scopus 로고    scopus 로고
    • Technical Report CMU-CS-96-165. Carnegie Mellon University, Noviembre
    • Necula, G. and Lee, P. (1996) Proof-Carrying Code. Technical Report CMU-CS-96-165. Carnegie Mellon University, Noviembre.
    • (1996) Proof-Carrying Code
    • Necula, G.1    Lee, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.