R Taleb, S Hallé, R Khoury - … Symposium on Foundations and Practice of …, 2021 - Springer
Runtime enforcement seeks to provide a valid replacement to any misbehaving sequence of events of a running system so that the correct sequence complies with a user-defined …
R Khoury, N Tawbi - … Network Security: 5th International Conference on …, 2010 - Springer
In this paper, we present a new framework of runtime security policy enforcement. Building on previous studies, we examine the enforcement power of monitors able to transform their …
R Khoury, N Tawbi - International Journal of Information …, 2015 - inderscienceonline.com
Runtime monitoring is a widely used approach for the enforcement of security policies. It allows the safe execution of untrusted code by observing the execution and reacting if …
Characterizing the security policies enforceable by run-time monitors has received great attention in recent years. The research, however, has been limited to the monitors having no …
R Khoury, N Tawbi - ACM Transactions on Information and System …, 2012 - dl.acm.org
Runtime monitoring is an increasingly popular method to ensure the safe execution of untrusted codes. Monitors observe and transform the execution of these codes, responding …
Despite soaring investments in IT infrastructure, the state of operational network security continues to be abysmal. We argue that this is because existing enterprise security …
N Bielova, F Massacci, A Micheletti - Identity and Privacy in the Internet …, 2009 - Springer
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement …
Dynamic information-flow enforcement systems automatically protect applications against confidentiality and integrity threats. Unfortunately, existing solutions cause undesirable side …
On Next Generation Network Security Page 1 IEEE Network • March/April 2017 2 In several of my earlier Editor’s Notes, I mentioned security to be a key aspect of various network-related …