Modeling runtime enforcement with mandatory results automata
- 24 April 2014
- journal article
- Published by Springer Science and Business Media LLC in International Journal of Information Security
- Vol. 14 (1), 47-60
- https://doi.org/10.1007/s10207-014-0239-8
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- A location-based policy-specification language for mobile devicesPervasive and Mobile Computing, 2012
- Security Policies Enforcement Using Finite Edit AutomataElectronic Notes in Theoretical Computer Science, 2009
- Composing expressive runtime security policiesACM Transactions on Software Engineering and Methodology, 2009
- Run-Time Enforcement of Nonsafety PoliciesACM Transactions on Information and System Security, 2009
- Execution monitoring enforcement under memory-limitation constraintsInformation and Computation, 2008
- JavaScript instrumentation for browser securityACM SIGPLAN Notices, 2007
- Computability classes for enforcement mechanismsACM Transactions on Programming Languages and Systems, 2006
- Computational Analysis of Run-time Monitoring: Fundamentals of Java-MaCElectronic Notes in Theoretical Computer Science, 2002
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- Defining livenessInformation Processing Letters, 1985