Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Weaving rewrite-based access control policies
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Misbehaviors detection to ensure availability in OLSR
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
HiPoLDS: a security policy language for distributed systems
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
Information Security Tech. Report
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Hi-index | 0.00 |
Information systems are more and more victim of denial of service attacks. Thus, availability is a critical property which is more and more difficult to achieve. In this paper, we devise a new approach to design programs that enforce availability requirements. This approach is based on a formal security model called Nomad which combines deontic and temporal logics. We show how to use this model to specify availability requirements. Our proposal is then based on aspect programming. For this purpose, availability requirements expressed in the Nomad model are transformed into availability aspects. Using aspect programming languages such as AspectJ, we can then weave these availability aspects to transform an insecure program into a secure one.