Edit automata: Enforcement mechanisms for run-time security policies

J Ligatti, L Bauer, D Walker - International Journal of Information Security, 2005 - Springer
We analyze the space of security policies that can be enforced by monitoring and modifying
programs at run time. Our program monitors, called edit automata, are abstract machines …

[图书][B] Mona version 1.4: User manual

N Klarlund, A Møller - 2001 - brics.dk
It has been known since 1960 that the class of regular languages1 is linked to decidability
questions in formal logics. In particular, WS1S (Weak monadic Second-order theory of 1 …

[PDF][PDF] More enforceable security policies

L Bauer, J Ligatti, D Walker - … of the Workshop on Foundations of …, 2002 - cs.princeton.edu
We analyze the space of security policies that can be enforced by monitoring programs at
runtime. Our program monitors are automata that examine the sequence of program actions …

A type system for expressive security policies

D Walker - Proceedings of the 27th ACM SIGPLAN-SIGACT …, 2000 - dl.acm.org
Certified code is a general mechanism for enforcing security properties. In this paradigm,
untrusted mobile code carries annotations that allow a host to verify its trustworthiness …

MONA implementation secrets

N Klarlund, A Møller… - International Journal of …, 2002 - World Scientific
The MONA tool provides an implementation of automaton-based decision procedures for the
logics WS1S and WS2S. It has been used for numerous applications, and it is remarkably …

The project

C Brabrand, A Møller, MI Schwartzbach - ACM Transactions on Internet …, 2002 - dl.acm.org
We present the results of the project, which aims to design and implement a high-level
domain-specific language for programming interactive Web services. A fundamental aspect …

Growing languages with metamorphic syntax macros

C Brabrand, MI Schwartzbach - Proceedings of the 2002 ACM SIGPLAN …, 2002 - dl.acm.org
" From now on, a main goal in designing a language should be to plan for growth." Guy
Steele: Growing a Language, OOPSLA'98 invited talk. We present our experiences with a …

Powerforms: Declarative client-side form field validation

C Brabrand, A Møller, M Ricky, MI Schwartzbach - World Wide Web, 2000 - Springer
All uses of HTML forms may benefit from validation of the specified input field values. Simple
validation matches individual values against specified formats, while more advanced …

MONA implementation secrets

N Klarlund, A Møller, MI Schwartzbach - … July 24–25, 2000 Revised Papers …, 2001 - Springer
The Mona tool provides an implementation of the decision procedures for the logics WS1S
and WS2S. It has been used for numerous applications, and it is remarkably efficient in …

Decentralized access control framework

AD Chowdhury, N Chaturvedi… - US Patent …, 2012 - Google Patents
The goal of authorization in access control is usually to specify and evaluate/look-up a set of
policies that control the access of users to resources, ie, making decisions about denying or …