Automating safety and security co-design through semantically rich architecture patterns

YG Dantas, V Nigam - ACM Transactions on Cyber-Physical Systems, 2023 - dl.acm.org
During the design of safety-critical systems, safety and security engineers make use of
architecture patterns, such as Watchdog and Firewall, to address identified failures and …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

A fully decentralized data usage control enforcement infrastructure

F Kelbert, A Pretschner - Applied Cryptography and Network Security: 13th …, 2015 - Springer
Distributed data usage control enables data owners to constrain how their data is used by
remote entities. However, many data usage policies refer to events happening within several …

Asynchronous wait-free runtime verification and enforcement of linearizability

A Castañeda, GV Rodríguez - Proceedings of the 2023 ACM Symposium …, 2023 - dl.acm.org
This paper studies the problem of verifying linearizability at runtime, where one seeks for a
concurrent algorithm for verifying that the current execution of a given concurrent shared …

Decentralized distributed data usage control

F Kelbert, A Pretschner - … Conference on Cryptology and Network Security, 2014 - Springer
Data usage control provides mechanisms for data owners to remain in control over how their
data is used after it is has been shared. Many data usage policies can only be enforced on a …

[PDF][PDF] A reactive approach for use-based privacy

E Birrell, FB Schneider - 2017 - ecommons.cornell.edu
Use-based privacy views privacy in terms of authorized uses, a philosophy well-suited for
data collection and data analysis applications that arise in networked information systems …

Matching of incomplete service specifications exemplified by privacy policy matching

MC Platenius, S Arifulina, R Petrlic… - European Conference on …, 2014 - Springer
Abstract Service matching approaches determine to what extent a provided service matches
a requester's requirements. This process is based on service specifications describing …

CliSeAu: securing distributed Java programs by cooperative dynamic enforcement

R Gay, J Hu, H Mantel - … , ICISS 2014, Hyderabad, India, December 16-20 …, 2014 - Springer
CliSeAu is a novel tool for hardening distributed Java programs. CliSeAu takes as input a
specification of the desired properties and a Java bytecode target program, ie the format in …

Towards a more sustainable re-engineering of heterogeneous distributed systems using cooperating run-time monitors

M Gehring, H Mantel - … Symposium on Leveraging Applications of Formal …, 2024 - Springer
We propose an approach to using run-time monitoring for the re-engineering of distributed
systems. Our re-engineering method MBRE consists of five steps that provide guidance …

Enforcing more with less: Formalizing target-aware run-time monitors

Y Mallios, L Bauer, D Kaynar, J Ligatti - … 2012, Pisa, Italy, September 13-14 …, 2013 - Springer
Run-time monitors ensure that untrusted software and system behavior adheres to a security
policy. This paper defines an expressive formal framework, based on I/O automata, for …