Entry Basin:2013:ESP from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Basin:2013:ESP,
  author =       "David Basin and Vincent Jug{\'e} and Felix Klaedtke
                 and Eugen Zalinescu",
  title =        "Enforceable Security Policies Revisited",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jun,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2487222.2487225",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Jun 14 19:25:26 MDT 2013",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We revisit Schneider's work on policy enforcement by
                 execution monitoring. We overcome limitations of
                 Schneider's setting by distinguishing between system
                 actions that are controllable by an enforcement
                 mechanism and those actions that are only observable,
                 that is, the enforcement mechanism sees them but cannot
                 prevent their execution. For this refined setting, we
                 give necessary and sufficient conditions on when a
                 security policy is enforceable. To state these
                 conditions, we generalize the standard notion of safety
                 properties. Our classification of system actions also
                 allows one, for example, to reason about the
                 enforceability of policies that involve timing
                 constraints. Furthermore, for different specification
                 languages, we investigate the decision problem of
                 whether a given policy is enforceable. We provide
                 complexity results and show how to synthesize an
                 enforcement mechanism from an enforceable policy.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries