메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Execution monitoring enforcement for limited-memory systems

Author keywords

bounded history automata; edit automata; enforcement mechanisms; execution monitoring; locally testable properties; security policies

Indexed keywords

AUTOMATA THEORY; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 85133871088     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1501434.1501480     Document Type: Conference Paper
Times cited : (5)

References (37)
  • 1
    • 14844332191 scopus 로고    scopus 로고
    • More enforceable security policies
    • Copenhagen, Denmark, 25-26 July. DIKU Technical Report
    • L. Bauer, J. Ligatti, and D. Walker. More enforceable security policies. In Foundations of Computer Security, pages 95-104, Copenhagen, Denmark, 25-26 July 2002. DIKU Technical Report.
    • (2002) Foundations of Computer Security , pp. 95-104
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 3
    • 33745267229 scopus 로고    scopus 로고
    • Composing security policies with polymer
    • L. Bauer, J. Ligatti, and D. Walker. Composing security policies with polymer. SIGPLAN Not., 40(6):305-314, 2005.
    • (2005) SIGPLAN Not. , vol.40 , Issue.6 , pp. 305-314
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 5
    • 0030108489 scopus 로고    scopus 로고
    • Local languages and the berry-sethi algorithm
    • J. Berstel and J. E. Pin. Local languages and the berry-sethi algorithm. Theoretical Comput. Sci., 155:439-446, 1996.
    • (1996) Theoretical Comput. Sci. , vol.155 , pp. 439-446
    • Berstel, J.1    Pin, J.E.2
  • 9
    • 0347269342 scopus 로고    scopus 로고
    • Families of locally testable languages
    • P. Caron. Families of locally testable languages. Theor. Comput. Sci., 242(1-2):361-376, 2000.
    • (2000) Theor. Comput. Sci. , vol.242 , Issue.1-2 , pp. 361-376
    • Caron, P.1
  • 11
    • 0033489650 scopus 로고    scopus 로고
    • Sasi enforcement of security policies: a retrospective
    • Caledon Hills, Ontario, Canada, ACM Press
    • U. Erlingsson and F. B. Schneider. Sasi enforcement of security policies: a retrospective. In Proceedings of the New Security Paradigms Workshop, pages 87-95. Caledon Hills, Ontario, Canada, ACM Press, 2000.
    • (2000) Proceedings of the New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 14
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • V. D. Gligor. A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng., 10(3):320-324, 1984.
    • (1984) IEEE Trans. Softw. Eng. , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 19
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, 1977.
    • (1977) IEEE Transactions of Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 20
    • 18944373357 scopus 로고    scopus 로고
    • Combining monitors for runtime system verification
    • In K. Havelund and G. Rosu, editors, Elsevier
    • J. Levy, H. Saidi, and T. E. Uribe. Combining monitors for runtime system verification. In K. Havelund and G. Rosu, editors, Electronic Notes in Theoretical Computer Science, volume 70. Elsevier, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.70
    • Levy, J.1    Saidi, H.2    Uribe, T.E.3
  • 21
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Feb. 2005. Published online 26 Oct
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, Feb. 2005. (Published online 26 Oct 2004.).
    • (2004) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 28
    • 0002230149 scopus 로고
    • Finite semigroups and recognizable languages: an introduction
    • In J. Fountain, editor, Kluwer academic publishers
    • J. E. Pin. Finite semigroups and recognizable languages: an introduction. In J. Fountain, editor, NATO Advanced Study Institute Semigroups, Formal Languages and Groups, pages 1-32. Kluwer academic publishers, 1995.
    • (1995) NATO Advanced Study Institute Semigroups, Formal Languages and Groups , pp. 1-32
    • Pin, J.E.1
  • 32
    • 0026243650 scopus 로고
    • A polynomial time algorithm for the local testability problem of deterministic finite automata
    • R. M. S. Kim, R. McNaughton. A polynomial time algorithm for the local testability problem of deterministic finite automata. IEEE Trans. Comput, 40:1087-1093, 1991.
    • (1991) IEEE Trans. Comput , vol.40 , pp. 1087-1093
    • Kim, R.M.S.1    McNaughton, R.2
  • 33
    • 0028743322 scopus 로고
    • Computing the order of a locally testable automaton
    • R. M. S. Kim. Computing the order of a locally testable automaton. SIAM Journal of Computing, 23:1193-1215, 1994.
    • (1994) SIAM Journal of Computing , vol.23 , pp. 1193-1215
    • Kim, R.M.S.1
  • 35
    • 84908308177 scopus 로고    scopus 로고
    • An algorithm to verify local threshold testability of deterministic finite automata
    • A. N. Trahtman. An algorithm to verify local threshold testability of deterministic finite automata. Lecture Notes in Computer Science, 2214:164+, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2214 , pp. 164
    • Trahtman, A.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.