Sciweavers

58 search results - page 1 / 12
» Requirement enforcement by transformation automata
Sort
View
FOAL
2007
ACM
13 years 8 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
CAV
2008
Springer
80views Hardware» more  CAV 2008»
13 years 6 months ago
Ranking Automata and Games for Prioritized Requirements
Requirements of reactive systems are usually specified by classifying system executions as desirable and undesirable. To specify prioritized requirements, we propose to associate a...
Rajeev Alur, Aditya Kanade, Gera Weiss
ESORICS
2010
Springer
13 years 5 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
CCS
2007
ACM
13 years 10 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
CCS
2008
ACM
13 years 6 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...