given. This also exposes and rectifies problems in prior work, yielding a better
characterization of those security policies enforceable by execution monitors as well as a
taxonomy of enforceable security policies. Some but not all classes can be identified with
known classes from computational complexity theory.