Abstract A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed. 1 Introduction A security policy defines execution that, for one reason or another, has been deemed unacceptable. For example, a security policy might concern * access control, and restrict what operations principals can perform o
AbstractRecently, attention has been given to formally characterize security policies that are enfor...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
A precise characterization is given for the class of security policies enforceable with mechanisms t...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract. We revisit Schneider’s work on policy enforcement by ex-ecution monitoring. We overcome li...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
AbstractWe define a set of process algebra operators, that we call controller operators, able to mim...
<p>Run-time monitors ensure that untrusted software and system behavior adheres to a security policy...
A precise characterization of those security policies enforceable by program rewriting is given. T...
In this paper we introduce the notion of gate au-tomata for describing security policies. This new k...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
We analyze the space of security policies that can be enforced by monitoring and modifying programs ...
AbstractRecently, attention has been given to formally characterize security policies that are enfor...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...
A precise characterization is given for the class of security policies enforceable with mechanisms t...
In the domain of security policy enforcement, the concerns of application developers are almost comp...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract. We revisit Schneider’s work on policy enforcement by ex-ecution monitoring. We overcome li...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
AbstractWe define a set of process algebra operators, that we call controller operators, able to mim...
<p>Run-time monitors ensure that untrusted software and system behavior adheres to a security policy...
A precise characterization of those security policies enforceable by program rewriting is given. T...
In this paper we introduce the notion of gate au-tomata for describing security policies. This new k...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
We analyze the space of security policies that can be enforced by monitoring and modifying programs ...
AbstractRecently, attention has been given to formally characterize security policies that are enfor...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
AbstractSecurity policies define who may use what information in a computer system. Protection mecha...