Computability classes for enforcement mechanisms

@article{Hamlen2006ComputabilityCF,
  title={Computability classes for enforcement mechanisms},
  author={Kevin W. Hamlen and J. Gregory Morrisett and Fred B. Schneider},
  journal={ACM Trans. Program. Lang. Syst.},
  year={2006},
  volume={28},
  pages={175-205}
}
A precise characterization of those security policies enforceable by program rewriting is given. This also exposes and rectifies problems in prior work, yielding a better characterization of those security policies enforceable by execution monitors as well as a taxonomy of enforceable security policies. Some but not all classes can be identified with known classes from computational complexity theory. 

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 183 CITATIONS, ESTIMATED 25% COVERAGE

Enforcing security policies with runtime monitors

Raphaël Khoury
  • 2011
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Extending the enforcement power of truncation monitors using static analysis

  • Computers & Security
  • 2011
VIEW 11 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Formal Enforcement of Security Policies : An Algebraic Approach

VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Implementation and Application of Automata

  • Lecture Notes in Computer Science
  • 2012
VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Run-Time Enforcement of Nonsafety Policies

  • ACM Trans. Inf. Syst. Secur.
  • 2009
VIEW 7 EXCERPTS
CITES RESULTS & BACKGROUND
HIGHLY INFLUENCED

Algorithmic Verification Techniques for Mobile Code

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Runtime Failure Prevention and Reaction

  • Lectures on Runtime Verification
  • 2018
VIEW 4 EXCERPTS
CITES RESULTS, METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2004
2019

CITATION STATISTICS

  • 21 Highly Influenced Citations

  • Averaged 6 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

Enforceable security policies

VIEW 16 EXCERPTS
HIGHLY INFLUENTIAL

Flexible Policy-Directed Code Safety

  • IEEE Symposium on Security and Privacy
  • 1999
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Practical mostly-static information flow control

A. C. MYERS
  • Proceedings of the 26th ACM Symposium on Principles of Programming Languages. San Antonio, Texas, 228–241.
  • 1999
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Computer virus – antivirus coevolution

G. NECULA
  • Comm . ACM
  • 1997
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…