Which security policies are enforceable by runtime monitors? A survey
DOI10.1016/J.COSREV.2012.01.001zbMATH Open1298.68064OpenAlexW2099064219MaRDI QIDQ465692FDOQ465692
Authors: Raphaël Khoury, Nadia Tawbi
Publication date: 24 October 2014
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cosrev.2012.01.001
Recommendations
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Formal languages and automata (68Q45) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Specification and verification (program logics, model checking, etc.) (68Q60)
Cites Work
- Title not available (Why is that?)
- Monitoring of Real-Time Properties
- Title not available (Why is that?)
- Languages and scanners
- Defining liveness
- Proving the Correctness of Multiprocess Programs
- Recognizing safety and liveness
- On Locally Checkable Properties
- Execution monitoring enforcement under memory-limitation constraints
- Computing the Order of a Locally Testable Automaton
- Title not available (Why is that?)
- Title not available (Why is that?)
- Security policies enforcement using finite edit automata
- A polynomial time algorithm for the local testability problem of deterministic finite automata
Cited In (11)
- Runtime enforcement of security policies on black box reactive programs
- On bidirectional runtime enforcement
- Runtime enforcement with reordering, healing, and suppression
- Survey on JavaScript security policies and their enforcement mechanisms in a web browser
- Provably correct runtime monitoring
- Bidirectional Runtime Enforcement of First-Order Branching-Time Properties
- Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
- There are two sides to every question. Controller versus attacker
- Enforcing non-safety security policies with program monitors
- Runtime enforcement of timed properties using games
- Title not available (Why is that?)
Uses Software
This page was built for publication: Which security policies are enforceable by runtime monitors? A survey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q465692)