-
3
-
-
84880235899
-
-
Basin, D., Jugé, V., Klaedtke, F., Zălinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1) 3:1–3:26 (2013)
-
(2013)
Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1
, vol.1-3
, Issue.26
, pp. 3
-
-
Basin, D.1
Jugé, V.2
Klaedtke, F.3
Zălinescu, E.4
-
5
-
-
66849138438
-
Composing expressive runtime security policies
-
Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Trans. Softw. Eng. Methodol. 18(3), 1–43 (2009)
-
(2009)
ACM Trans. Softw. Eng. Methodol
, vol.18
, Issue.3
, pp. 1-43
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
6
-
-
67649909566
-
Security policies enforcement using finite edit automata
-
Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)
-
(2009)
Electron. Notes Theor. Comput. Sci
, vol.229
, Issue.3
, pp. 19-35
-
-
Beauquier, D.1
Cohen, J.2
Lanotte, R.3
-
8
-
-
84860496875
-
Iterative enforcement by suppression: towards practical enforcement theories
-
Bielova, N., Massacci, F.: Iterative enforcement by suppression: towards practical enforcement theories. J. Comput. Secur. 20(1), 51–79 (2012)
-
(2012)
J. Comput. Secur
, vol.20
, Issue.1
, pp. 51-79
-
-
Bielova, N.1
Massacci, F.2
-
10
-
-
84921065761
-
Security monitor inlining for multithreaded java
-
ECOOP: July
-
Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP), July 2009
-
Proceedings of the European Conference on Object-Oriented Programmin
, pp. 2009
-
-
Dam, M.1
Jacobs, B.2
Lundblad, A.3
Piessens, F.4
-
13
-
-
84861198050
-
A location-based policy-specification language for mobile devices. Pervasive Mob
-
Finnis, J., Saigal, N., Iamnitchi, A., Ligatti, J.: A location-based policy-specification language for mobile devices. Pervasive Mob. Comput. J. 8(3), 402–414 (June 2012)
-
(2012)
Comput.
, vol.8
, Issue.3
, pp. 402-414
-
-
Finnis, J.1
Saigal, N.2
Iamnitchi, A.3
Ligatti, J.4
-
15
-
-
33745329295
-
Computability classes for enforcement mechanisms. ACM Trans
-
Hamlen, K., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Progr. Lang. Syst. 28(1), 175–205 (Jan. 2006)
-
(2006)
Progr. Lang. Sys
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.1
Morrisett, G.2
Schneider, F.B.3
-
16
-
-
79952580008
-
-
Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011)
-
Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011). doi:10.1007/978-3-64219751-2_12
-
-
-
-
17
-
-
82955230066
-
An overview of AspectJ
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of AspectJ. In: European Conference on Object-oriented Programming. Springer (2001)
-
(2001)
European Conference on Object-oriented Programming. Springe
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
18
-
-
14844313206
-
Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor
-
Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswantathan M.: Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor. Comput. Sci. 70(4), 80–94 (2002). doi:10.1016/S1571-0661(04)80578-4
-
(2002)
Comput. Sc
, vol.70
, Issue.4
, pp. 80-94
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Viswantathan, M.5
-
20
-
-
60349103393
-
Run-time enforcement of nonsafety policies. ACM Trans
-
Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (Jan. 2009)
-
(2009)
Inf. Syst. Secu
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
22
-
-
79952798543
-
Usage control enforcement with data flow tracking for x11
-
Pretschner, A., Buechler, M., Harvan, M., Schaefer, C., Walter, T.: Usage control enforcement with data flow tracking for x11. In: Proceedings of 5th International Workshop on Security and Trust Management, pp. 124–137 (2009)
-
(2009)
Proceedings of 5th International Workshop on Security and Trust Managemen
, pp. 124-137
-
-
Pretschner, A.1
Buechler, M.2
Harvan, M.3
Schaefer, C.4
Walter, T.5
-
23
-
-
57849100172
-
Mechanisms for usage control
-
ACM Symposium on Information, Computer and Communications Security:
-
Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008)
-
(2008)
Proceedings of th
, pp. 2008
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
24
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
25
-
-
40149091526
-
Execution monitoring enforcement under memory-limitation constraints
-
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)
-
(2008)
Inf. Comput
, vol.206
, Issue.2-4
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
27
-
-
34548253921
-
Javascript instrumentation for browser security
-
Yu, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 237–249 (2007)
-
(2007)
Proceedings of the Symposium on Principles of Programming Language
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|