Security-policy monitoring and enforcement with JavaMOP

  title={Security-policy monitoring and enforcement with JavaMOP},
  author={Soha Hussein and Patrick O'Neil Meredith and Grigore Rosu},
Software security attacks represent an ever growing problem. One way to make software more secure is to use Inlined Reference Monitors (IRMs), which allow security specifications to be inlined inside a target program to ensure its compliance with the desired security specifications. The IRM approach has been developed primarily by the security community. Runtime Verification (RV), on the other hand, is a software engineering approach, which is intended to formally encode system specifications… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 13 extracted citations

Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors

2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS) • 2015
View 7 Excerpts
Highly Influenced

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications

2013 International Conference on Availability, Reliability and Security • 2013
View 4 Excerpts
Highly Influenced

PAD: Programming third-party web advertisement censorship

2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 11 references

Composing security policies with polymer

View 18 Excerpts
Highly Influenced

The Chinese Wall Security Policy

IEEE Symposium on Security and Privacy • 1989
View 8 Excerpts
Highly Influenced

Enforceable security policies

ACM Trans. Inf. Syst. Secur. • 2000
View 4 Excerpts
Highly Influenced

Computability classes for enforcement mechanisms

ACM Trans. Program. Lang. Syst. • 2006
View 3 Excerpts
Highly Influenced

Policy Enforcement via Program Monitoring

J. A. Ligatti
PhD thesis, Princeton University, • 2006
View 4 Excerpts
Highly Influenced

Edit automata: enforcement mechanisms for run-time security policies

International Journal of Information Security • 2004
View 4 Excerpts
Highly Influenced

The Ponder Policy Specification Language

N. Damianou, N. Dulay, E. Lupu, M. Sloman
Workshop on Policies for Distributed Systems and Networks (POLICY’01), pages 18–38. Springer, • 2001
View 3 Excerpts
Highly Influenced

IRM Enforcement of Java Stack Inspection

IEEE Symposium on Security and Privacy • 2000
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…