메뉴 건너뛰기




Volumn 15, Issue 2, 2012, Pages

Corrective enforcement: A new paradigm of security policy enforcement by monitors

Author keywords

Dynamic analysis; Monitoring; Program transformation; Runtime monitors; Security policies enforcement

Indexed keywords

ENFORCEMENT MECHANISMS; PROGRAM TRANSFORMATIONS; RUNTIME MONITORING; RUNTIME MONITORS; SECURITY POLICY; SECURITY POLICY ENFORCEMENT; SECURITY PROPERTIES; UNTRUSTED CODE;

EID: 84878587195     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2240276.2240281     Document Type: Article
Times cited : (19)

References (35)
  • 4
    • 80051669929 scopus 로고    scopus 로고
    • Do you really mean what you actually enforced? Intern
    • BIELOVA, N. AND MASSACCI, F. 2011a. Do you really mean what you actually enforced? Intern. J. Inform. Secur. 10, 4, 1-16.
    • (2011) J. Inform. Secur. , vol.10 , Issue.4 , pp. 1-16
    • Bielova, N.1    Massacci, F.2
  • 5
    • 84878538756 scopus 로고    scopus 로고
    • Iterative enforcement by suppression: Towards practical enforcement theories
    • BIELOVA, N. AND MASSACCI, F. 2011b. Iterative enforcement by suppression: Towards practical enforcement theories. J. Comput. Secur. To appear.
    • (2011) J. Comput. Secur. to Appear
    • Bielova, N.1    Massacci, F.2
  • 11
    • 2342544079 scopus 로고
    • The safety-progress classification
    • F. Bauer, W. Brauer, and H. Schwichtenberg Eds., Springer-Verlag
    • CHANG, E., MANNA, Z., AND PNUELI, A. 1991. The safety-progress classification. In Logic and Algebra of Specifications, F. Bauer, W. Brauer, and H. Schwichtenberg Eds., Springer-Verlag, 143-202.
    • (1991) Logic and Algebra of Specifications , pp. 143-202
    • Chang, E.1    Manna, Z.2    Pnueli, A.3
  • 23
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • LIGATTI, J., BAUER, L., AND WALKER, D. 2004. Edit automata: Enforcement mechanisms for run-time security policies. Intern. J. Inform. Secur. 4, 1-2, 2-16.
    • (2004) Intern. J. Inform. Secur. , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 27
    • 78049442327 scopus 로고
    • A method for synthesizing sequential circuits
    • MEALY, G. H. 1955. A method for synthesizing sequential circuits. Bell System Tech. J. 34, 5, 1045-1079.
    • (1955) Bell System Tech. J. , vol.34 , Issue.5 , pp. 1045-1079
    • Mealy, G.H.1
  • 29
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • SCHNEIDER, F. 2000. Enforceable security policies. Inf. Syst. Secur. 3, 1, 30-50.
    • (2000) Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 32
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memorylimitations constraints
    • TALHI, C., TAWBI, N., AND DEBBABI, M. 2008. Execution monitoring enforcement under memorylimitations constraints. Inf. Comput. 206, 1, 158-184.
    • (2008) Inf. Comput. , vol.206 , Issue.1 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.