spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Consortium arrow ATX Software SA

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications



@article{mm07a,
  author    = {Fabio Martinelli and
               Ilaria Matteucci},
  title     = {Through Modeling to Synthesis of Security Automata},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {179},
  year      = {2007},
  pages     = {31-46},
  ee        = {http://dx.doi.org/10.1016/j.entcs.2006.08.029},
  bibsource = {DBLP, http://dblp.uni-trier.de},
  status = {public},
  partner= {ISTI},
  task = {T3.3},
  abstract = {We define a set of process algebra operators, that we call controller operators, able to mimic the behavior of security automata introduced by Schneider in [Schneider, F. B., Enforceable security policies, ACM Transactions on Information and System Security 3 (2000), pp. 30\u201350] and by Ligatti and al. in [Bauer, L., J. Ligatti and D. Walker, More enforceable security policies, in: I. Cervesato, editor, Foundations of Computer Security: proceedings of the FLoC\'02 workshop on Foundations of Computer Security (2002), pp. 95\u2013104]. Security automata are mechanisms for enforcing security policies that specify acceptable executions of programs.
Here we give the semantics of four controllers that act by monitoring possible un-trusted component of a system in order to enforce certain security policies. Moreover, exploiting satisfiability results for temporal logic, we show how to automatically build these controllers for a given security policy.}
}





Members

  • Carlos Matos
  • Georgios Koutsoukos
  • Rui Correia
spacer

The Sensoria Project Website
2005 - 2010
spacer