Proceedings of the 1998 workshop on New security paradigms
Enforcing trace properties by program transformation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A type system for expressive security policies
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
SASI enforcement of security policies: a retrospective
Proceedings of the 1999 workshop on New security paradigms
History-based access control for mobile code
Secure Internet programming
An access control language for web services
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
ACM Transactions on Computer Systems (TOCS)
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Policy-Carrying, Policy-Enforcing Digital Objects
ECDL '00 Proceedings of the 4th European Conference on Research and Advanced Technology for Digital Libraries
ECDL '02 Proceedings of the 6th European Conference on Research and Advanced Technology for Digital Libraries
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
SAS '99 Proceedings of the 6th International Symposium on Static Analysis
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
A propositional policy algebra for access control
ACM Transactions on Information and System Security (TISSEC)
Secure Composition of Insecure Components
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Security Function Interactions
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Approaching a Formal Definition of Fairness in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Empowering mobile code using expressive security policies
Proceedings of the 2002 workshop on New security paradigms
Fundamenta Informaticae - Concurrency specification and programming
MAPbox: using parameterized behavior classes to confine untrusted applications
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Synthesizing fast intrusion prevention/detection systems from high-level specifications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language
ICTAC'04 Proceedings of the First international conference on Theoretical Aspects of Computing
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P'2002), Part 1
Hi-index | 0.00 |
A precise characterization is given for the class of security policies that can be enforced using mechanisms that work by monitoring system execution, and a class of automata is introduced for specifying those security policies. Techniques to enforce security policies specified by such automata are also discussed. READERS NOTE: A substantially revised version of this document is available at http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR99-1759