A run-time enforcement mechanism is a program in charge of ensuring that all the traces of a system satisfy a given security policy. Following Schneider\u27s seminal work, there have been several approaches defining what kind of policies can be automatically enforced, and in particular, non-safety properties cannot be correctly and transparently enforced. In this paper, we first propose to build an enforcement mechanism using an abstract notion of selector. We then propose to quantify the inexact enforcement of a non-safety property by an enforcement mechanism, by considering both the traces leading to a non-secure output by this mechanism and the secure traces not output, thus formalizing an intuitive notion of security/usability tradeoff....
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Runtime techniques bring new promises of accuracy and flexibility in enforcing security policies. Wh...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
Abstract. We revisit Schneider’s work on policy enforcement by ex-ecution monitoring. We overcome li...
Abstract. We introduce a formal framework to specify and enforce quantitative security policies. The...
Abstract. Runtime enforcement is a common mechanism for ensuring that program executions adhere to c...
Nowadays owners and users of software systems want their executions to be reliable and secure. Runti...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
This thesis proposes the MAP-REDUCE framework, a programmable framework, that can be used to constru...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
A precise characterization is given for the class of security policies enforceable with mechanisms t...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Runtime techniques bring new promises of accuracy and flexibility in enforcing security policies. Wh...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
Abstract. We revisit Schneider’s work on policy enforcement by ex-ecution monitoring. We overcome li...
Abstract. We introduce a formal framework to specify and enforce quantitative security policies. The...
Abstract. Runtime enforcement is a common mechanism for ensuring that program executions adhere to c...
Nowadays owners and users of software systems want their executions to be reliable and secure. Runti...
In many real enforcement systems, a security-relevant action must return a result before the applica...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
This thesis proposes the MAP-REDUCE framework, a programmable framework, that can be used to constru...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
A precise characterization is given for the class of security policies enforceable with mechanisms t...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Runtime techniques bring new promises of accuracy and flexibility in enforcing security policies. Wh...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...