ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Through Modeling to Synthesis of Security Automata
Electronic Notes in Theoretical Computer Science (ENTCS)
ConSpec – A formal language for policy specification
Science of Computer Programming
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
International Journal of Information Security
Foundations and Applications of Security Analysis
Electronic Notes in Theoretical Computer Science (ENTCS)
Fine grained access control with trust and reputation management for globus
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
On usage control for GRID systems
Future Generation Computer Systems
Trust-Driven Policy Enforcement through Gate Automata
IMIS '11 Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
A fine-grained and x.509-based access control system for globus
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
From qualitative to quantitative enforcement of security policy
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 0.09 |
Security and trust represent two different perspectives on the problem of guaranteeing the correct interaction among software components. Gate automata have been proposed as a formalism for the specification of both security and trust policies in the scope of the Security-by-Contract-with-Trust (SxCxT) framework. Indeed, they watch the execution of a target program, possibly modifying its behaviour, and produce a feedback for the trust management system. The level of trust changes the environment settings by dynamically activating/deactivating some of the defined gate automata. The goal of this paper is to present gate automata and to show a gate automata-driven strategy for the run-time enforcement in the SxCxT.