메뉴 건너뛰기




Volumn 14, Issue 1, 2015, Pages 47-60

Modeling runtime enforcement with mandatory results automata

Author keywords

Enforceability theory; Models of enforcement; Monitoring; Runtime enforcement; Security automata

Indexed keywords

AUTOMATA THEORY; MONITORING; SEMANTICS;

EID: 84921069010     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-014-0239-8     Document Type: Article
Times cited : (49)

References (27)
  • 8
    • 84860496875 scopus 로고    scopus 로고
    • Iterative enforcement by suppression: towards practical enforcement theories
    • Bielova, N., Massacci, F.: Iterative enforcement by suppression: towards practical enforcement theories. J. Comput. Secur. 20(1), 51–79 (2012)
    • (2012) J. Comput. Secur , vol.20 , Issue.1 , pp. 51-79
    • Bielova, N.1    Massacci, F.2
  • 13
    • 84861198050 scopus 로고    scopus 로고
    • A location-based policy-specification language for mobile devices. Pervasive Mob
    • Finnis, J., Saigal, N., Iamnitchi, A., Ligatti, J.: A location-based policy-specification language for mobile devices. Pervasive Mob. Comput. J. 8(3), 402–414 (June 2012)
    • (2012) Comput. , vol.8 , Issue.3 , pp. 402-414
    • Finnis, J.1    Saigal, N.2    Iamnitchi, A.3    Ligatti, J.4
  • 15
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms. ACM Trans
    • Hamlen, K., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Progr. Lang. Syst. 28(1), 175–205 (Jan. 2006)
    • (2006) Progr. Lang. Sys , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.1    Morrisett, G.2    Schneider, F.B.3
  • 16
    • 79952580008 scopus 로고    scopus 로고
    • Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011)
    • Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011). doi:10.1007/978-3-64219751-2_12
  • 18
    • 14844313206 scopus 로고    scopus 로고
    • Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor
    • Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswantathan M.: Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor. Comput. Sci. 70(4), 80–94 (2002). doi:10.1016/S1571-0661(04)80578-4
    • (2002) Comput. Sc , vol.70 , Issue.4 , pp. 80-94
    • Kim, M.1    Kannan, S.2    Lee, I.3    Sokolsky, O.4    Viswantathan, M.5
  • 20
    • 60349103393 scopus 로고    scopus 로고
    • Run-time enforcement of nonsafety policies. ACM Trans
    • Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (Jan. 2009)
    • (2009) Inf. Syst. Secu , vol.12 , Issue.3 , pp. 1-41
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 23
    • 57849100172 scopus 로고    scopus 로고
    • Mechanisms for usage control
    • ACM Symposium on Information, Computer and Communications Security:
    • Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008)
    • (2008) Proceedings of th , pp. 2008
    • Pretschner, A.1    Hilty, M.2    Basin, D.3    Schaefer, C.4    Walter, T.5
  • 24
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 25
    • 40149091526 scopus 로고    scopus 로고
    • Execution monitoring enforcement under memory-limitation constraints
    • Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)
    • (2008) Inf. Comput , vol.206 , Issue.2-4 , pp. 158-184
    • Talhi, C.1    Tawbi, N.2    Debbabi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.