Specification and runtime enforcement of security policies

被引:1
作者
Jin, Ying [1 ]
Zhang, Jing [1 ]
Zheng, Xiaojuan [2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, 2699 Qianjin St, Changchun 130012, Peoples R China
[2] Northeast Normal Univ, Sch Software, Changchun 130117, Peoples R China
来源
2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS | 2007年
基金
美国国家科学基金会;
关键词
D O I
10.1109/NPC.2007.105
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth in mobile and wireless communications entails serious problem of security. Formal methods can be used to help building secure mobile computing environment. Tabular expressions have proved to be useful and practical in formulating precise and complete documentation for computer systems. In this paper a framework for specification and runtime enforcement of security policies is proposed basing on the use of tabular expressions. A security policy can be specified with a tabular expression, and checking whether an application adheres to a given policy can be achieved by evaluating the tabular expression with respect to information intercepted at runtime. The advantages of our approach includes: (1)providing precise and readable specification of security policies; (2)developing a general policy enforcement engine rather than one policy enforcement engine for each security policy; (3)achieving low overheads by simplifying tabular expressions with static information of mobile code.
引用
收藏
页码:244 / +
页数:2
相关论文
共 13 条
  • [1] [Anonymous], P INT C INF TECHN CO
  • [2] [Anonymous], SECURITY ISSUES MOBI
  • [3] BALABAN A, 2006, MATH MODEL TABULAR E
  • [4] CACERES R, 2006, P IFIP WORKSH SEC PR
  • [5] DEVANBY PT, 2000, FUTURE SOFTWARE ENG
  • [6] HOAGLANDDDD, 1999, SPECIFYING SECURITY
  • [7] JANICKI R, 1995, PROC INT CONF SOFTW, P231, DOI 10.1145/225014.225036
  • [8] JANICKI R, 1997, RELATIONAL METHODS C
  • [9] PARNAS DL, 1992, 260 CRL
  • [10] RASTOGI P, 1998, 360 CRL