Enforceable security policies
- 1 February 2000
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 3 (1), 30-50
- https://doi.org/10.1145/353323.353382
Abstract
A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed.Keywords
This publication has 16 references indexed in Scilit:
- Providing Policy-Neutral and Transparent Access Control in Extensible SystemsPublished by Springer Science and Business Media LLC ,1999
- History-based access control for mobile codePublished by Association for Computing Machinery (ACM) ,1998
- The design and implementation of a certifying compilerACM SIGPLAN Notices, 1998
- Proof-carrying codePublished by Association for Computing Machinery (ACM) ,1997
- Java security: present and near futureIEEE Micro, 1997
- The DIAMOND security policy for object-oriented databasesPublished by Association for Computing Machinery (ACM) ,1992
- Verifying temporal properties without temporal logicACM Transactions on Programming Languages and Systems, 1989
- Recognizing safety and livenessDistributed Computing, 1987
- Defining livenessInformation Processing Letters, 1985
- Guarded commands, nondeterminacy and formal derivation of programsCommunications of the ACM, 1975