2012
DOI: 10.1016/j.cosrev.2012.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Which security policies are enforceable by runtime monitors? A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…Since Schneider's seminal work [12], runtime enforcement of policy using security automata has been a well-studied subject in the literature, such as [9][10][11]5]. We do not detail here all these approaches, and we refer to [7] for an extensive survey. However, to the best of our knowledge, our approach is the first one to deal with the problem of cost of enforcement.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since Schneider's seminal work [12], runtime enforcement of policy using security automata has been a well-studied subject in the literature, such as [9][10][11]5]. We do not detail here all these approaches, and we refer to [7] for an extensive survey. However, to the best of our knowledge, our approach is the first one to deal with the problem of cost of enforcement.…”
Section: Discussionmentioning
confidence: 99%
“…However, to the best of our knowledge, our approach is the first one to deal with the problem of cost of enforcement. Recent research has argued that the original definition of effective enforcement [9] is inadequate because it does not sufficiently constrain the behaviour of the monitor when it is faced with a possible violation of the security policy [7]. Researchers have revisited the notion of enforcement by a monitor have proposed alternative ones.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, it can also be exploited to know a-priori if a set of enforcers are compatible, instead of lately discovering it at run-time, once their interference or the lack of application of some enforcers may have serious consequences for the health of the system. A body of work formally studied the classes of properties that can be enforced using different models and languages, with an emphasis on security policies [33,26,27,17,23]. Interestingly these approaches should be complemented with appropriate analysis routines to check that the result of the enforcement is in line with what the enforcers are expected to achieve.…”
Section: Related Workmentioning
confidence: 99%
“…This distinction makes it easier to study the interaction between the target program, the monitor and the system. A thorough survey of the question of enforceable properties by monitors is provided in [17].…”
Section: Related Workmentioning
confidence: 99%
“…This method of ensuring the security of code is rapidly gaining acceptance in practice and several implementations exist [17]. One question seems to recur frequently in multiple studies: exactly which set of properties are monitorable, in the sense that they are enforceable by monitors.…”
Section: Introductionmentioning
confidence: 99%