Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and their results. The operational semantics of MRAs is simple and enables straightforward definitions of concrete MRAs. Moreover, the definitions of policies and enforcement with MRAs are simple and expressive. Putting all of these features together, we argue that MRAs make good general models of runtime mechanisms, upon which a theory of runtime enforcement can be based. We develop some enforceability theory by characterizing the policies deterministic and nondeterministic MRAs can and cannot enforce
Abstract. Runtime enforcement is a common mechanism for ensuring that program executions adhere to c...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract Runtime enforcement is a powerful technique to ensure that a running system satisfies some ...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
Runtime enforcement is a verification/validation technique aiming at correcting (possibly incorrect)...
Nowadays owners and users of software systems want their executions to be reliable and secure. Runti...
Runtime enforcement is a powerful technique to ensure that a program will respect a given set of pro...
Runtime enforcement refers to the theories, techniques, and tools for enforcing correct behavior wit...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
<p>Run-time monitors ensure that untrusted software and system behavior adheres to a security policy...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract: Runtime enforcement (RE) is a technique where a so-called monitor modifies the execution o...
Abstract. Runtime enforcement is a common mechanism for ensuring that program executions adhere to c...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract Runtime enforcement is a powerful technique to ensure that a running system satisfies some ...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
Runtime enforcement is a verification/validation technique aiming at correcting (possibly incorrect)...
Nowadays owners and users of software systems want their executions to be reliable and secure. Runti...
Runtime enforcement is a powerful technique to ensure that a program will respect a given set of pro...
Runtime enforcement refers to the theories, techniques, and tools for enforcing correct behavior wit...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
<p>Run-time monitors ensure that untrusted software and system behavior adheres to a security policy...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract: Runtime enforcement (RE) is a technique where a so-called monitor modifies the execution o...
Abstract. Runtime enforcement is a common mechanism for ensuring that program executions adhere to c...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract Runtime enforcement is a powerful technique to ensure that a running system satisfies some ...