Enforceable security policies

@article{Schneider2003EnforceableSP,
  title={Enforceable security policies},
  author={Fred B. Schneider},
  journal={Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]},
  year={2003},
  pages={117-137}
}
A precise characterization is given for the class of security policies that can be enforced using mechanisms that work by monitoring system execution, and a class of automata is introduced for specifying those security policies. Techniques to enforce security policies specified by such automata are also discussed. READERS NOTE: A substantially revised version of this document is available at http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR99-1759 

Similar Papers

Figures from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 905 CITATIONS

Enforcing security policies with runtime monitors

VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Runtime enforcement monitors: composition, synthesis, and enforcement abilities

VIEW 14 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Runtime verification of cryptographic protocols

  • Computers & Security
  • 2010
VIEW 5 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

Comparison of the Expressive Power of Language-Based Access Control Models

  • IEICE Transactions
  • 2009
VIEW 16 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Specifying and analyzing security automata using CSP-OZ

VIEW 23 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Runtime Failure Prevention and Reaction

  • Lectures on Runtime Verification
  • 2018
VIEW 9 EXCERPTS
CITES RESULTS & BACKGROUND
HIGHLY INFLUENCED

Self-Adaptive Automata

  • 2018 IEEE/ACM 6th International FME Workshop on Formal Methods in Software Engineering (FormaliSE)
  • 2018
VIEW 4 EXCERPTS
CITES RESULTS, METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2000
2019

CITATION STATISTICS

  • 160 Highly Influenced Citations

  • Averaged 26 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 35 REFERENCES

Proof-Carrying Code

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Proving the Correctness of Multiprocess Programs

  • IEEE Transactions on Software Engineering
  • 1977
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Java security: present and near future

  • IEEE Micro
  • 1997
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Defining Liveness

  • Inf. Process. Lett.
  • 1984
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

SASI enforcement of security policies: a retrospective

  • Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
  • 2000
VIEW 1 EXCERPT