Which security policies are enforceable by runtime monitors? A survey
From MaRDI portal
(Redirected from Publication:465692)
Research exposition (monographs, survey articles) pertaining to computer science (68-02) Formal languages and automata (68Q45) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Specification and verification (program logics, model checking, etc.) (68Q60)
Recommendations
Cites work
- scientific article; zbMATH DE number 3497806 (Why is no real title available?)
- scientific article; zbMATH DE number 2081053 (Why is no real title available?)
- scientific article; zbMATH DE number 1472161 (Why is no real title available?)
- scientific article; zbMATH DE number 2206109 (Why is no real title available?)
- A polynomial time algorithm for the local testability problem of deterministic finite automata
- Computing the Order of a Locally Testable Automaton
- Defining liveness
- Execution monitoring enforcement under memory-limitation constraints
- Languages and scanners
- Monitoring of Real-Time Properties
- On Locally Checkable Properties
- Proving the Correctness of Multiprocess Programs
- Recognizing safety and liveness
- Security policies enforcement using finite edit automata
Cited in
(11)- Runtime enforcement of security policies on black box reactive programs
- On bidirectional runtime enforcement
- Runtime enforcement with reordering, healing, and suppression
- Survey on JavaScript security policies and their enforcement mechanisms in a web browser
- Provably correct runtime monitoring
- Bidirectional Runtime Enforcement of First-Order Branching-Time Properties
- Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
- There are two sides to every question. Controller versus attacker
- Runtime enforcement of timed properties using games
- Enforcing non-safety security policies with program monitors
- scientific article; zbMATH DE number 1962746 (Why is no real title available?)
This page was built for publication: Which security policies are enforceable by runtime monitors? A survey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q465692)