Enforceable Security Policies
Title | Enforceable Security Policies |
Publication Type | Journal Article |
Year of Publication | 2000 |
Authors | Schneider, Fred B. |
Journal | ACM Trans. Inf. Syst. Secur. |
Volume | 3 |
Pagination | 30–50 |
ISSN | 1094-9224 |
Keywords | EM security policies, inlined reference monitors, proof carrying code, safety properties, SASI, Science of Security Significant Paper, security automata, security policies |
Abstract | A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed. |
Notes | This article was identified by the SoS Best Scientific Cybersecurity Paper Competition Distinguished Experts as a Science of Security Significant Paper. The Science of Security Paper Competition was developed to recognize and honor recently published papers that advance the science of cybersecurity. During the development of the competition, members of the Distinguished Experts group suggested that listing papers that made outstanding contributions, empirical or theoretical, to the science of cybersecurity in earlier years would also benefit the research community. |
URL | http://www.cs.cornell.edu/fbs/publications/EnfSecPols.pdf |
DOI | 10.1145/353323.353382 |
Citation Key | Schneider:2000:ESP:353323.353382 |