2014
DOI: 10.1007/978-3-319-05302-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Evaluation of Enforcement Strategies

Abstract: In Security, monitors and enforcement mechanisms run in parallel with programs to check, and modify their run-time behaviour, respectively, in order to guarantee the satisfaction of a security policy. For the same policy, several enforcement strategies are possible. We provide a framework for quantitative monitoring and enforcement. Enforcement strategies are analysed according to user-defined parameters. This is done by extending the notion controller processes, that mimics the well-known edit automata, with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…The workflow we adopt is described in Figure 1. For the first time, we transfer the related know-how from the abstract realm of process calculi, and Crypto-CCS in particular, to a real-world specification language, namely The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013 and under grant no 257930 (Aniketos).…”
Section: Overviewmentioning
confidence: 99%
“…The workflow we adopt is described in Figure 1. For the first time, we transfer the related know-how from the abstract realm of process calculi, and Crypto-CCS in particular, to a real-world specification language, namely The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013 and under grant no 257930 (Aniketos).…”
Section: Overviewmentioning
confidence: 99%
“…A countermeasure (or controlling strategy) [3] is a runtime execution trace of a controller E that follows the behaviour of a target F step by step acting according to control rules in Tab. 1.…”
Section: Multi-criteria Classification Of Quantitative Countermeasuresmentioning
confidence: 99%
“…Definition 3.2. [3] Given an agent F , and a semiring K, a controller E2 is better than a controller E1 w.r.…”
Section: Multi-criteria Classification Of Quantitative Countermeasuresmentioning
confidence: 99%
“…Clearly, non-functional requirements, such as QoS, could be used to evaluate quantitative aspects on orchestrators. Non functional aspects, including the degree of security, can be formalised using semirings, as done in [10]. Therein, security is a boolean value, determined by the violation of a policy.…”
Section: Semiring-based Selection Of Orchestratorsmentioning
confidence: 99%
“…Non-functional requirements, such as QoS, could be used to evaluate quantitative aspects on both orchestrators and attackers. Non functional aspects, including the degree of security, can be formalised using semirings, as done in Ciancia, Martinelli, Matteucci, and Morisset (2013).…”
Section: Semiring-based Evaluationmentioning
confidence: 99%