• Firmato

  • Referenced in 12 articles [sw10595]
  • unified form, global knowledge of the security policy and of the network topology...
  • Fable

  • Referenced in 6 articles [sw23081]
  • Language for Enforcing User-defined Security Policies. This paper presents Fable, a core formalism ... language in which programmers may specify security policies and reason that these policies are properly ... enforced. In Fable, security policies can be expressed by associating security labels with the data ... implement a wide variety of security policies, including access control, information flow, provenance, and security...
  • Paragon

  • Referenced in 8 articles [sw13306]
  • programming with information-flow control. Conventional security policies for software applications are adequate for managing ... needed to manage the end-to-end security properties of applications.par In this paper ... static checking of information flow control policies. Paragon policies are specified in a logic-based...
  • FoCaLiZe

  • Referenced in 8 articles [sw12384]
  • multivariate polynomial rings, a library of security policies and various examples contributed by FoCaLiZe users...
  • MetaKlaim

  • Referenced in 5 articles [sw01810]
  • code fragments), dynamic checking of security policies at administrative boundaries and `traditional’ computational activities ... parameterised mobile components and to enforce security policies dynamically: types are metadata that are extracted...
  • Flow Caml

  • Referenced in 6 articles [sw08923]
  • integrity policy. In Flow Caml, standard ML types are annotated with security levels chosen ... legal with regard to the security policy specified by the programmer. Technically speaking, Flow Caml...
  • SPY

  • Referenced in 6 articles [sw22152]
  • logical assertions on message payloads and security policies, supported by third-party plugins. Our demonstration...
  • Laminar

  • Referenced in 3 articles [sw23077]
  • heap-allocated objects. Programmers express security policies by labeling data with secrecy and integrity labels ... scoped security regions. Laminar enforces the security policies specified by the labels at runtime. Laminar ... limit dynamic security checks, allowing us to retrofit DIFC policies on four application case ... studies. Replacing the applications’ ad-hoc security policies changes less than 10% of the code...
  • LoPSiL

  • Referenced in 4 articles [sw02068]
  • LoPSiL: A location-based policy-specification language This paper describes the design of LoPSiL ... language for specifying location-dependent security and privacy policies. Policy- specification languages like LoPSiL ... tasks of specifying and enforcing sound security policies on untrusted (i.e., potentially insecure) software...
  • ASASP

  • Referenced in 4 articles [sw06350]
  • ASASP: automated symbolic analysis of security policies. We describe asasp, a symbolic reachability procedure ... access control policies. The tool represents access policies and their administrative actions as formulae ... uses a symbolic reachability procedure to solve security analysis problems. Checks for fix-point-reduced...
  • Cryptyc

  • Referenced in 3 articles [sw12834]
  • ensure they do not violate the security policies...
  • Rocksalt

  • Referenced in 3 articles [sw23353]
  • machine-code analysis to enforce a security policy. But for complicated architectures such...
  • Network Security Policy Verification

  • Referenced in 1 article [sw32204]
  • Network security policy verification: We present a unified theory for verifying network security policies ... security policy is represented as directed graph. To check high-level security goals, security invariants ... repaired by tightening the policy iff the security invariants hold for the deny ... policy. An algorithm to compute a security policy. A formalization of stateful connection semantics...
  • CRePE

  • Referenced in 2 articles [sw21577]
  • research work for enforcing security policies on smartphones considered coarse-grained policies, e.g. either...
  • Caja

  • Referenced in 2 articles [sw35851]
  • wide range of flexible security policies, so that your website can effectively control what embedded...
  • EAdroid

  • Referenced in 1 article [sw13648]
  • government institutions) need to customize the security policy of their Android devices according to their ... capability. This paper proposed an environment adaptive security mechanism for Android platform called EAdroid, which ... third party institutions to customize the security policy of their Android devices. EAdroid reforms ... Android system and synthetically applies Smack security module of Linux. At the same time...
  • BreakApp

  • Referenced in 1 article [sw35853]
  • compartmentalization of legacy applications and enforce security policies, enhancing reliability and security. It transparently spawns ... their original behavior. Optional high-level policies decouple security assumptions made during development from requirements ... These policies allow fine-tuning trade-offs such as security and performance based on changing...
  • MILENIO

  • Referenced in 1 article [sw02265]
  • agent and authority, and a dynamic security policy that allows to modify the security permissions...
  • MultiUbic

  • Referenced in 1 article [sw22199]
  • handle both transitive and intransitive security policies...
  • RAppArmor

  • Referenced in 1 article [sw22048]
  • RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux. The increasing availability ... systems and web services. However some important security concerns need to be addressed before this...