Iterative enforcement by suppression: Towards practical enforcement theories

نویسندگان

  • Nataliia Bielova
  • Fabio Massacci
چکیده

Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be “good” but not how far the bad execution should be changed. So we cannot ∗A preliminary, much shorter version of this paper appears in the proceedings of NordSec’09 [6].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Practical Enforcement Theories

Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes and make sure that the bad ones got amended. From the theory side, a number of papers [6, 10, 12] provide the precise characterization of good executions that c...

متن کامل

Cauer transform based passivity enforcement : Laguerre expansion vs. Talbot quadrature

We introduce two new non-iterative approaches towards passivity enforcement for scalar rational transfer functions. The first is based on the projection of the Herglotz-Cauer representation of the transfer function on the orthonormal Laguerre basis. The second is based on the rational approximation by means of Talbot-Gauss quadrature of a pertinent integral related to the Cauer transform kernel.

متن کامل

Strategies and Design Principles for Compliance and Enforcement

Compliance and enforcement activities are essential to effective implementation of environmental legislation. Despite, or perhaps because of, the decades of experience government agencies have had in designing and deploying a wide range of compliance and enforcement techniques, there exists no unified theory of environmental compliance and enforcement. Instead, a variety of theories and program...

متن کامل

Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies

The enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area has considered the efficient enforcement of temporal and geo-spatial access control policies, and asymptotic results for the time and space complexity of efficient enforcement schem...

متن کامل

Tax Enforcement and Tax Havens under Formula Apportionment

In this paper, we consider optimal tax enforcement policy in the presence of pro…t shifting towards tax havens. We show that, under separate accounting, tax enforcement levels may be too high due to negative …scal externalities. In contrast, under formula apportionment, tax enforcement is likely to be too low due to positive externalities of tax enforcement. Our results challenge recent contrib...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2012