Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A modular pipeline for enforcement of security properties at runtime
Runtime enforcement ensures the respect of a user-specified security policy by a program
by providing a valid replacement for any misbehaving sequence of events that may occur …
by providing a valid replacement for any misbehaving sequence of events that may occur …
From qualitative to quantitative enforcement of security policy
The problem of enforcing a security policy has been particularly well studied over the last
decade, following Schneider's seminal work on security automata. We first present in this …
decade, following Schneider's seminal work on security automata. We first present in this …
A modular runtime enforcement model using multi-traces
Runtime enforcement seeks to provide a valid replacement to any misbehaving sequence of
events of a running system so that the correct sequence complies with a user-defined …
events of a running system so that the correct sequence complies with a user-defined …
Tally kee**-LTL: An LTL semantics for quantitative evaluation of LTL specifications
When monitoring a trace using an LTL specification, the verdict returned by the monitor can
often be insufficiently informative to be actionable. In this paper, we propose a …
often be insufficiently informative to be actionable. In this paper, we propose a …
Quantitative evaluation of enforcement strategies: Position paper
A security enforcement mechanism runs in parallel with a system to check and modify its run-
time behaviour, so that it satisfies some security policy. For each policy, several enforcement …
time behaviour, so that it satisfies some security policy. For each policy, several enforcement …
Probabilistic cost enforcement of security policies
This paper presents a formal framework for run-time enforcement mechanisms, or monitors,
based on probabilistic input/output automata [Task-structured probabilistic I/O automata …
based on probabilistic input/output automata [Task-structured probabilistic I/O automata …
A multi-trace model for runtime enforcement and verification under uncertainty
R Taleb - 2024 - constellation.uqac.ca
Runtime Verification (RV) or Runtime Monitoring has gained increasing interest in recent
years [99]. It can be defined as the process of observing the behavior of a running system …
years [99]. It can be defined as the process of observing the behavior of a running system …
On security countermeasures ranking through threat analysis
Security analysis and design are key activities for the protection of critical systems and
infrastructures. Traditional approaches consist first in applying a qualitative threat …
infrastructures. Traditional approaches consist first in applying a qualitative threat …
A theory of gray security policies
D Ray, J Ligatti - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
This paper generalizes traditional models of security policies, from specifications of whether
programs are secure, to specifications of how secure programs are. This is a generalization …
programs are secure, to specifications of how secure programs are. This is a generalization …
A unifying framework for dynamic monitoring and a taxonomy of optimizations
Reducing the performance overhead of run-time monitoring is crucial for making it affordable
to enforce more complex requirements than simple security or safety properties …
to enforce more complex requirements than simple security or safety properties …