MONPOLY: monitoring usage-control policies

  • Authors:
  • David Basin;Matúš Harvan;Felix Klaedtke;Eugen Zălinescu

  • Affiliations:
  • Computer Science Department, ETH Zurich, Switzerland;Computer Science Department, ETH Zurich, Switzerland;Computer Science Department, ETH Zurich, Switzerland;Computer Science Department, ETH Zurich, Switzerland

  • Venue:
  • RV'11 Proceedings of the Second international conference on Runtime verification
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Determining whether the usage of sensitive, digitally stored data complies with regulations and policies is a growing concern for companies, administrations, and end users alike. Classical examples of policies used for protecting and preventing the misuse of data are history-based access-control policies like the Chinese-wall policy and separation-of-duty constraints. Other policies from more specialized areas like banking involve retention, reporting, and transaction requirements. Simplified examples from this domain are that financial reports must be approved at most a week before they are published and that transactions over $10,000 must be reported within two days.