-
3
-
-
67649909566
-
Security policies enforcement using finite edit automata
-
BEAUQUIER, D., COHEN, J., AND LANOTTE, R. 2009. Security policies enforcement using finite edit automata. Electron. Notes Theoret. Comput. Sci. 229, 3, 19-35.
-
(2009)
Electron. Notes Theoret. Comput. Sci.
, vol.229
, Issue.3
, pp. 19-35
-
-
Beauquier, D.1
Cohen, J.2
Lanotte, R.3
-
4
-
-
80051669929
-
Do you really mean what you actually enforced? Intern
-
BIELOVA, N. AND MASSACCI, F. 2011a. Do you really mean what you actually enforced? Intern. J. Inform. Secur. 10, 4, 1-16.
-
(2011)
J. Inform. Secur.
, vol.10
, Issue.4
, pp. 1-16
-
-
Bielova, N.1
Massacci, F.2
-
5
-
-
84878538756
-
Iterative enforcement by suppression: Towards practical enforcement theories
-
BIELOVA, N. AND MASSACCI, F. 2011b. Iterative enforcement by suppression: Towards practical enforcement theories. J. Comput. Secur. To appear.
-
(2011)
J. Comput. Secur. to Appear
-
-
Bielova, N.1
Massacci, F.2
-
11
-
-
2342544079
-
The safety-progress classification
-
F. Bauer, W. Brauer, and H. Schwichtenberg Eds., Springer-Verlag
-
CHANG, E., MANNA, Z., AND PNUELI, A. 1991. The safety-progress classification. In Logic and Algebra of Specifications, F. Bauer, W. Brauer, and H. Schwichtenberg Eds., Springer-Verlag, 143-202.
-
(1991)
Logic and Algebra of Specifications
, pp. 143-202
-
-
Chang, E.1
Manna, Z.2
Pnueli, A.3
-
16
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
HAMLEN, K.W.,MORRISETT, G., AND SCHNEIDER, F. 2006. Computability classes for enforcement mechanisms. ACM Trans. Prog. Lang. Syst. 28, 1, 175-205.
-
(2006)
ACM Trans. Prog. Lang. Syst.
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.3
-
18
-
-
79951525297
-
Policy monitoring and a finite state automata model
-
JUN, P., XINGYUAN, C., BEI, W., XIANGDONG, D., AND YONGLIANG, W. 2008. Policy monitoring and a finite state automata model. In Proceedings of the International Conference on Computer Science and Software Engineering (CSSE). 646-649.
-
(2008)
Proceedings of the International Conference on Computer Science and Software Engineering (CSSE)
, pp. 646-649
-
-
Jun, P.1
Xingyuan, C.2
Bei, W.3
Xiangdong, D.4
Yongliang, W.5
-
21
-
-
14844313206
-
Computational analysis of run-time monitoring-fundamentals of java-mac
-
KIM, M., KANNAN, S., LEE, I., SOKOLSKY, O., AND VISWANATHAN, M. 2002. Computational analysis of run-time monitoring-fundamentals of java-mac. Electr. Notes Theor. Comput. Sci. 70, 4.
-
(2002)
Electr. Notes Theor. Comput. Sci.
, vol.70
, Issue.4
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Viswanathan, M.5
-
23
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
LIGATTI, J., BAUER, L., AND WALKER, D. 2004. Edit automata: Enforcement mechanisms for run-time security policies. Intern. J. Inform. Secur. 4, 1-2, 2-16.
-
(2004)
Intern. J. Inform. Secur.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
25
-
-
60349103393
-
Run-time enforcement of nonsafety policies
-
LIGATTI, J., BAUER, L., AND WALKER, D. 2009. Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12, 3, 1-41.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
27
-
-
78049442327
-
A method for synthesizing sequential circuits
-
MEALY, G. H. 1955. A method for synthesizing sequential circuits. Bell System Tech. J. 34, 5, 1045-1079.
-
(1955)
Bell System Tech. J.
, vol.34
, Issue.5
, pp. 1045-1079
-
-
Mealy, G.H.1
-
29
-
-
84881225236
-
Enforceable security policies
-
SCHNEIDER, F. 2000. Enforceable security policies. Inf. Syst. Secur. 3, 1, 30-50.
-
(2000)
Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
32
-
-
40149091526
-
Execution monitoring enforcement under memorylimitations constraints
-
TALHI, C., TAWBI, N., AND DEBBABI, M. 2008. Execution monitoring enforcement under memorylimitations constraints. Inf. Comput. 206, 1, 158-184.
-
(2008)
Inf. Comput.
, vol.206
, Issue.1
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
35
-
-
84856592980
-
-
Tech. rep 06-101, Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa
-
ZHU, G., TYAGI, A., AND ROOP, P. 2006. Stream automata as run-time monitors for open system security policies. Tech. rep. 06-101, Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa.
-
(2006)
Stream Automata As Run-time Monitors for Open System Security Policies
-
-
Zhu, G.1
Tyagi, A.2
Roop, P.3
|