SASI enforcement of security policies: A retrospective

被引:0
|
作者
Department of Computer Science, Cornell University, Ithaca, NY 14853, United States [1 ]
机构
来源
关键词
D O I
Proceedings of the New Security Paradigm Workshop
中图分类号
学科分类号
摘要
Security systems
引用
收藏
相关论文
共 50 条
  • [21] Dynamic Security Policies Enforcement and Adaptation using Aspects
    Idrees, Muhammad Sabir
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1374 - 1379
  • [22] Achieving dynamicity in security policies enforcement using aspects
    Samiha Ayed
    Muhammad Sabir Idrees
    Nora Cuppens
    Frederic Cuppens
    International Journal of Information Security, 2018, 17 : 83 - 103
  • [23] On Asynchronous Enforcement of Security Policies in "Nomadic" Storage Facilities
    You, Ilsun
    Catuogno, Luigi
    Castiglione, Aniello
    Cattaneo, Giuseppe
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2013,
  • [24] Automatic Enforcement of Expressive Security Policies using Enclaves
    Gollamudi, Anitha
    Chong, Stephen
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 494 - 513
  • [25] Compile-time enforcement of dynamic security policies
    Eyers, David M.
    Srinivasan, Sriram
    Moody, Ken
    Bacon, Jean
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 119 - 126
  • [26] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77
  • [27] Semantic Security: Specification and Enforcement of Semantic Policies for Security-driven Collaborations
    Sinnott, R. O.
    Doherty, T.
    Gray, N.
    Lusted, J.
    HEALTHGRID RESEARCH, INNOVATION AND BUSINESS CASE, 2009, 147 : 201 - +
  • [28] Adding Support for Automatic Enforcement of Security Policies in NFV Networks
    Basile, Cataldo
    Valenza, Fulvio
    Lioy, Antonio
    Lopez, Diego R.
    Pastor Perales, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) : 707 - 720
  • [29] Runtime Enforcement of Security Policies on Black Box Reactive Programs
    Ngo, Minh
    Massacci, Fabio
    Milushev, Dimiter
    Piessens, Frank
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 43 - 54
  • [30] Efficient enforcement of security policies based on tracking of mobile users
    Atluri, Vijayalakshmi
    Shin, Heechang
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 237 - 251