2009
DOI: 10.1145/1552309.1552313
|View full text |Cite
|
Sign up to set email alerts
|

Local policies for resource usage analysis

Abstract: An extension of the λ-calculus is proposed, to study resource usage analysis and verification. It features usage policies with a possibly nested, local scope, and dynamic creation of resources. We define a type and effect system that, given a program, extracts a history expression, that is, a sound overapproximation to the set of histories obtainable at runtime. After a suitable transformation, history expressions are model-checked for validity. A program is resource-safe if its history expression is verified … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 40 publications
(50 citation statements)
references
References 46 publications
0
50
0
Order By: Relevance
“…Security policies are expressed as formulae of CSL S predicates over CTMCs. We plan to integrate our quantitative security policies in the language-based security framework of [12,11,10,9]. In this approach programs are typed as functions with a side effect that abstractly describes the possible run-time executions of the program.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Security policies are expressed as formulae of CSL S predicates over CTMCs. We plan to integrate our quantitative security policies in the language-based security framework of [12,11,10,9]. In this approach programs are typed as functions with a side effect that abstractly describes the possible run-time executions of the program.…”
Section: Discussionmentioning
confidence: 99%
“…A language-based framework for managing security issues in a distributed contexts has been proposed in [12,11,10,9].…”
Section: Stochastic History Expressionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, policies composition techniques must be included in any proposed framework. Local policies [3] represent a viable direction for allowing several actors to define their own security policies, apply them to a local scope and compose global security rules efficiently. Also, since our proposal is based on mobile devices technology, specific security solutions for mobile OSes must be considered.…”
Section: Related Workmentioning
confidence: 99%
“…Usage automata are a variant of nondeterministic finite state automata, parameterized over system resources. More details and the formal definition are in [6,7].…”
Section: Introductionmentioning
confidence: 99%