This dissertation generalizes traditional models of security policies, from specifications of whether programs are secure, to specifications of how secure programs are. This is a generalization from qualitative, black-and-white policies to quantitative, gray policies. Included are generalizations from traditional definitions of safety and liveness policies to definitions of gray-safety and gray-liveness policies. These generalizations preserve key properties of safety and liveness, including that the intersection of safety and liveness is a unique allow-all policy and that every policy can be written as the conjunction of a single safety and a single liveness policy. It is argued that the generalization provides several benefits, including ...
We study automated intrusion prevention using reinforcement learning. In a novel approach, we formul...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
This dissertation generalizes traditional models of security policies, from specifications of whethe...
Abstract. This paper generalizes traditional models of security poli-cies, from specifications of wh...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
Computer security policies often are stated informally in terms of confidentiality, integrity, and av...
Policy engineering for access-control security has traditionally focused on specification and verifi...
Policy design is an important part of software development. As security breaches increase in variety...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
Computer security policies often are stated informally in terms of confidential-ity, integrity, and ...
Computer Security has been a pressing issue that affects our society in multiple ways. Although a pl...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
We study automated intrusion prevention using reinforcement learning. In a novel approach, we formul...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
This dissertation generalizes traditional models of security policies, from specifications of whethe...
Abstract. This paper generalizes traditional models of security poli-cies, from specifications of wh...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
Computer security policies often are stated informally in terms of confidentiality, integrity, and av...
Policy engineering for access-control security has traditionally focused on specification and verifi...
Policy design is an important part of software development. As security breaches increase in variety...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
Computer security policies often are stated informally in terms of confidential-ity, integrity, and ...
Computer Security has been a pressing issue that affects our society in multiple ways. Although a pl...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
We study automated intrusion prevention using reinforcement learning. In a novel approach, we formul...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...