TY - JOUR
T1 - Iterative enforcement by suppression
T2 - Towards practical enforcement theories
AU - Bielova, N.
AU - Massacci, F.
PY - 2012
Y1 - 2012
N2 - Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be "good" but not how far the bad execution should be changed. So we cannot formally distinguish between an enforcement mechanism that makes a small change and one that drops the whole execution. In this paper we explore a set of policies called iterative properties that revises the notion of good executions in terms of repeated iterations. We propose an enforcement mechanism that can deal with bad executions (and not only the good ones) in a more predictable way by eliminating bad iterations. © 2012 - IOS Press and the authors. All rights reserved.
AB - Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforcement mechanism should leave good executions without changes (transparency) and make sure that the bad ones got amended (soundness). From the theory side, a number of papers (Hamlen et al., Ligatti et al., Talhi et al.) provide the precise characterization of good executions that can be captured by a security policy and thus enforced by mechanisms like security automata or edit automata. Unfortunately, transparency and soundness do not distinguish what happens when an execution is actually bad (the practical case). They only tell that the outcome of enforcement mechanism should be "good" but not how far the bad execution should be changed. So we cannot formally distinguish between an enforcement mechanism that makes a small change and one that drops the whole execution. In this paper we explore a set of policies called iterative properties that revises the notion of good executions in terms of repeated iterations. We propose an enforcement mechanism that can deal with bad executions (and not only the good ones) in a more predictable way by eliminating bad iterations. © 2012 - IOS Press and the authors. All rights reserved.
UR - https://www.scopus.com/pages/publications/84860496875
UR - https://www.scopus.com/inward/citedby.url?scp=84860496875&partnerID=8YFLogxK
U2 - 10.3233/JCS-2011-0431
DO - 10.3233/JCS-2011-0431
M3 - Article
SN - 0926-227X
VL - 20
SP - 51
EP - 79
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 1
ER -