International audienceRuntime enforcement is a powerful technique to ensure that a program will respect a given security policy. We extend previous works on this topic in several directions. Firstly, we propose a generic notion of enforcement monitors based on a memory device and finite sets of control states and enforcement operations. Moreover, we specify their enforcement abilities w.r.t. the general safety-progress classification of properties. It allows a fine-grain characterization of the space of enforceable properties. Finally, we propose a systematic technique to produce an enforcement monitor from the Streett automaton recognizing a given safety, guarantee, obligation or response security property
Abstract. The underlying property, its definition and representation play a major role when monitori...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
In many real enforcement systems, a security-relevant action must return a result before the applica...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
Runtime enforcement is a powerful technique to ensure that a program will respect a given set of pro...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Abstract. The underlying property, its definition and representation play a major role when monitori...
The underlying property, its definition and representation play a major role when monitoring a syste...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
International audienceThe underlying property, its definition and representation play a major role w...
A precise characterization is given for the class of security policies that can be enforced using me...
International audienceRuntime enforcement is a verification/validation technique aiming at correctin...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
In many real enforcement systems, a security-relevant action must return a result before the applica...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Abstract. Runtime enforcement is a powerful technique to ensure that a program will respect a given ...
Runtime enforcement is a powerful technique to ensure that a program will respect a given set of pro...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Abstract. The underlying property, its definition and representation play a major role when monitori...
The underlying property, its definition and representation play a major role when monitoring a syste...
Abstract. We consider the enforcement powers of program monitors, which intercept security-sensitive...
International audienceThe underlying property, its definition and representation play a major role w...
A precise characterization is given for the class of security policies that can be enforced using me...
International audienceRuntime enforcement is a verification/validation technique aiming at correctin...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract This paper presents a theory of runtime enforcement based on mechanism models called MRAs (...
Abstract. The underlying property, its definition and representation play a major role when monitori...
Abstract A precise characterization is given for the class of security policies enforceable with mec...
In many real enforcement systems, a security-relevant action must return a result before the applica...