A taxonomy of information flow monitors

N Bielova, T Rezk - Principles of Security and Trust: 5th International …, 2016 - Springer
We propose a rigorous comparison of information flow monitors with respect to two
dimensions: soundness and transparency. For soundness, we notice that the standard …

[HTML][HTML] Runtime enforcement of regular timed properties by suppressing and delaying events

Y Falcone, T Jéron, H Marchand, S Pinisetty - Science of Computer …, 2016 - Elsevier
Runtime enforcement is a verification/validation technique aiming at correcting possibly
incorrect executions of a system of interest. In this paper, we consider enforcement …

In the nick of time: Proactive prevention of obligation violations

D Basin, S Debois… - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
We present a system model, an enforcement mechanism, and a policy language for the
proactive enforcement of timed provisions and obligations. Our approach improves upon …

[PDF][PDF] A Theory and Tools for Applying Sandboxes Effectively.

M Maass - 2016 - cs.cmu.edu
It is more expensive and time consuming to build modern software without extensive supply
chains. Supply chains decrease these development risks, but typically at the cost of …

[图书][B] Analyzing and Securing Social Networks

B Thuraisingham, S Abrol, R Heatherly, M Kantarcioglu… - 2016 - books.google.com
Securing social networks and ensuring the privacy of participants has become a crucial
need. There are no books to date that address both social network analytics as well as …

Unruly Innovation: Distributed Ledgers, Blockchains and the Protection of Transactional Rents

K Elliott, F Massacci, CN Ngo… - Blockchains and the …, 2016 - papers.ssrn.com
We present a new conceptual model of disruptive innovation and apply it to distributed
ledger technology. Our analysis illustrates the new features of this technology and why there …

[PDF][PDF] Privacy with secondary use of personal information

S Wohlgemuth, K Takaragi… - MKWI Research-in …, 2016 - researchgate.net
Secondary use of personal information is of essential importance for the Internet of Things.
The main application is resilience. Biometrics is an example for support of resilience in times …

How powerful are run-time monitors with static information?

F Imanimehr, MS Fallah - The Computer Journal, 2016 - ieeexplore.ieee.org
Characterizing the security policies enforceable by run-time monitors has received great
attention in recent years. The research, however, has been limited to the monitors having no …

[PDF][PDF] In A Flash: An In-lined Monitoring Approach to Flash App Security

M Sridhar, A Mohanty, V Tendulkar, F Yilmaz… - utdallas.edu
The design and implementation of the first fully automated Adobe Flash binary code
transformation system that can guard major Flash vulnerability categories without modifying …

Web Services Orchestration's Monitor as a Web Service

I Hadded, M Langar, R Robbana - New Trends in Software …, 2016 - ebooks.iospress.nl
The Web services orchestration is a useful and complicated approach to integrate
heterogeneous systems. To verify the conformance of the orchestrated Web service against …