Iterative enforcement by suppression: Towards practical enforcement theories
نویسندگان
چکیده
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be “good” but not how far the bad execution should be changed. So we cannot ∗A preliminary, much shorter version of this paper appears in the proceedings of NordSec’09 [6].
منابع مشابه
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes and make sure that the bad ones got amended. From the theory side, a number of papers [6, 10, 12] provide the precise characterization of good executions that c...
متن کاملCauer transform based passivity enforcement : Laguerre expansion vs. Talbot quadrature
We introduce two new non-iterative approaches towards passivity enforcement for scalar rational transfer functions. The first is based on the projection of the Herglotz-Cauer representation of the transfer function on the orthonormal Laguerre basis. The second is based on the rational approximation by means of Talbot-Gauss quadrature of a pertinent integral related to the Cauer transform kernel.
متن کاملStrategies and Design Principles for Compliance and Enforcement
Compliance and enforcement activities are essential to effective implementation of environmental legislation. Despite, or perhaps because of, the decades of experience government agencies have had in designing and deploying a wide range of compliance and enforcement techniques, there exists no unified theory of environmental compliance and enforcement. Instead, a variety of theories and program...
متن کاملPractical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies
The enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area has considered the efficient enforcement of temporal and geo-spatial access control policies, and asymptotic results for the time and space complexity of efficient enforcement schem...
متن کاملTax Enforcement and Tax Havens under Formula Apportionment
In this paper, we consider optimal tax enforcement policy in the presence of pro t shifting towards tax havens. We show that, under separate accounting, tax enforcement levels may be too high due to negative scal externalities. In contrast, under formula apportionment, tax enforcement is likely to be too low due to positive externalities of tax enforcement. Our results challenge recent contrib...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2012