loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mahjoub Langar 1 ; Mohamed Mejri 1 and Kamel Adi 2

Affiliations: 1 Laval University, Canada ; 2 University of Quebec in Outaouais, Canada

ISBN: 978-989-8425-18-8

Keyword(s): Language based security, Runtime verification, Concurrent systems, Process algebra, Formal verification.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Secure Software Development Methodologies ; Security Engineering ; Security in Distributed Systems ; Security in Information Systems ; Security Verification and Validation

Abstract: Program security enforcement is designed to ensure that a program respects a given security policy, which generally specifies the acceptable executions of that. In general, the enforcement is achieved by adding some controls (tests) inside the target program or process. The major drawback of existing techniques is either their lack of precision or their inefficiency, especially those dedicated for concurrent languages. This paper proposes an efficient algebraic and fully automatic approach for security program enforcement: given a concurrent program P and a security policy f, it automatically generates another program P′ that satisfies f and behaves like P, except that it stops when P tries to violate the security policy f.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.210.23.15

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Langar M.; Mejri M.; Adi K. and (2010). REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 66-74. DOI: 10.5220/0002996100660074

@conference{secrypt10,
author={Mahjoub Langar and Mohamed Mejri and Kamel Adi},
title={REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={66-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002996100660074},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach
SN - 978-989-8425-18-8
AU - Langar, M.
AU - Mejri, M.
AU - Adi, K.
PY - 2010
SP - 66
EP - 74
DO - 10.5220/0002996100660074

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.