2009
DOI: 10.1007/978-3-642-00945-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking Usage Policies

Abstract: We propose a model for specifying, analysing and enforcing safe usage of resources. Our usage policies allow for parametricity over resources, and they can be enforced through finite state automata. The patterns of resource access and creation are described through a basic calculus of usages. In spite of the augmented flexibility given by resource creation and by policy parametrization, we devise an efficient (polynomial-time) model-checking technique for deciding when a usage is resource-safe, i.e. when it co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…if ϕ says "never α" from the validity of α and of ϕ[β] it does not follow αβ |= ϕ. As a matter of fact, the validity of H is established through model-checking in polynomial time [8].…”
Section: Definition 2 (Validity Of History Expressions)mentioning
confidence: 99%
“…if ϕ says "never α" from the validity of α and of ϕ[β] it does not follow αβ |= ϕ. As a matter of fact, the validity of H is established through model-checking in polynomial time [8].…”
Section: Definition 2 (Validity Of History Expressions)mentioning
confidence: 99%
“…E.g., a file usage policy file-usage(x) might require that before reading or writing a file x, that file must have been opened, and not yet closed. A usage policy gives rise to an finite state automaton (FSA) when the formal parameters are instantiated to actual resources (see [8] for further details). These automata will be exploited in Sec.…”
Section: Policiesmentioning
confidence: 99%
“…, R k ), to be used in recognizing those traces respecting the policy. Roughly, the transformation into a FSA amounts to: (i) instantiating x i to R i , while respecting the conditions in the when clauses, (ii) maintaining Z i = R for R static, and (iii) adding self-loops for all the events not explicitly mentioned in the policy (see [8] …”
Section: Definition 1 Usage Policiesmentioning
confidence: 99%
See 2 more Smart Citations