loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mahjoub Langar 1 ; Mohamed Mejri 1 and Kamel Adi 2

Affiliations: 1 Laval University, Canada ; 2 University of Quebec in Outaouais, Canada

Keyword(s): Language based security, Runtime verification, Concurrent systems, Process algebra, Formal verification.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Secure Software Development Methodologies ; Security Engineering ; Security in Distributed Systems ; Security in Information Systems ; Security Verification and Validation

Abstract: Program security enforcement is designed to ensure that a program respects a given security policy, which generally specifies the acceptable executions of that. In general, the enforcement is achieved by adding some controls (tests) inside the target program or process. The major drawback of existing techniques is either their lack of precision or their inefficiency, especially those dedicated for concurrent languages. This paper proposes an efficient algebraic and fully automatic approach for security program enforcement: given a concurrent program P and a security policy f, it automatically generates another program P′ that satisfies f and behaves like P, except that it stops when P tries to violate the security policy f.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.83.81.42

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Langar, M.; Mejri, M. and Adi, K. (2010). REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 66-74. DOI: 10.5220/0002996100660074

@conference{secrypt10,
author={Mahjoub Langar. and Mohamed Mejri. and Kamel Adi.},
title={REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={66-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002996100660074},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Langar, M.
AU - Mejri, M.
AU - Adi, K.
PY - 2010
SP - 66
EP - 74
DO - 10.5220/0002996100660074
PB - SciTePress