Edit automata: enforcement mechanisms for run-time security policies
Top Cited Papers
- 1 February 2005
- journal article
- Published by Springer Nature in International Journal of Information Security
- Vol. 4 (1-2) , 2-16
- https://doi.org/10.1007/s10207-004-0046-8
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Computability classes for enforcement mechanismsACM Transactions on Programming Languages and Systems, 2006
- Access control by tracking shallow execution historyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Flexible policy-directed code safetyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Formally specified monitoring of temporal propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Computational Analysis of Run-time MonitoringElectronic Notes in Theoretical Computer Science, 2002
- An Overview of AspectJPublished by Springer Nature ,2001
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- Enforcing trace properties by program transformationPublished by Association for Computing Machinery (ACM) ,2000
- Recognizing safety and livenessDistributed Computing, 1987
- Proving the Correctness of Multiprocess ProgramsIEEE Transactions on Software Engineering, 1977