Title :
A Model of Execution Monitoring Enforcement Mechanism
Author :
Liu, Chenhong ; Lin, Bogang
Author_Institution :
Coll. of Math. & Comput. Sci., Fuzhou Univ., Fuzhou, China
Abstract :
Execution monitoring (EM) is a ubiquitous way for monitoring untrusted applications. In this paper, we concern the characterization of security policies which was seldom concerned before. We define security policy as a security predicate which is a conjunction of two different sub-predicates: sequences predicate and states predicate. This work proves that different implementations of security policies specify different properties. Under this new definition of security policies, a model of EM enforcement mechanism is designed to describe the relations between the power of EM enforcement mechanism and the requirement of security policies.
Keywords :
security of data; system monitoring; ubiquitous computing; EM enforcement mechanism; execution monitoring enforcement mechanism; security policy; security predicate; sequences predicate; Automata; Computational modeling; Concrete; History; Monitoring; Safety; Security; Enforcement Mechanism; Execution Monitoring; Properties; Security Automata; Security Policies;
Conference_Titel :
Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on
Conference_Location :
Nanning
Print_ISBN :
978-1-4244-8649-6
Electronic_ISBN :
978-0-7695-4260-7
DOI :
10.1109/ICCIIS.2010.49