Specifying and analysing run-time security policies for time dependant services
暂无分享,去创建一个
[1] Philip W. L. Fong. Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[2] Nora Cuppens-Boulahia,et al. Security policy compliance with violation management , 2007, FMSE '07.
[3] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[4] Felix Klaedtke,et al. Runtime Monitoring of Metric First-order Temporal Properties , 2008, FSTTCS.
[5] Christian Schaefer,et al. Usage Control Enforcement: Present and Future , 2008, IEEE Security & Privacy.
[6] Felix Klaedtke,et al. Monitoring security policies with metric first-order temporal logic , 2010, SACMAT '10.
[7] Fabio Martinelli,et al. Through Modeling to Synthesis of Security Automata , 2007, STM.
[8] Nora Cuppens-Boulahia,et al. Nomad: a security model with non atomic actions and deadlines , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[9] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[10] Christian Schaefer,et al. A Policy Language for Distributed Usage Control , 2007, ESORICS.
[11] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[12] Kim G. Larsen,et al. A Tutorial on Uppaal , 2004, SFM.