• Firmato

  • Referenced in 12 articles [sw10595]
  • unified form, global knowledge of the security policy and of the network topology...
  • Fable

  • Referenced in 6 articles [sw23081]
  • Language for Enforcing User-defined Security Policies. This paper presents Fable, a core formalism ... language in which programmers may specify security policies and reason that these policies are properly ... enforced. In Fable, security policies can be expressed by associating security labels with the data ... implement a wide variety of security policies, including access control, information flow, provenance, and security...
  • Paragon

  • Referenced in 8 articles [sw13306]
  • programming with information-flow control. Conventional security policies for software applications are adequate for managing ... needed to manage the end-to-end security properties of applications.par In this paper ... static checking of information flow control policies. Paragon policies are specified in a logic-based...
  • FoCaLiZe

  • Referenced in 8 articles [sw12384]
  • multivariate polynomial rings, a library of security policies and various examples contributed by FoCaLiZe users...
  • MetaKlaim

  • Referenced in 5 articles [sw01810]
  • code fragments), dynamic checking of security policies at administrative boundaries and `traditional’ computational activities ... parameterised mobile components and to enforce security policies dynamically: types are metadata that are extracted...
  • Flow Caml

  • Referenced in 6 articles [sw08923]
  • integrity policy. In Flow Caml, standard ML types are annotated with security levels chosen ... legal with regard to the security policy specified by the programmer. Technically speaking, Flow Caml...
  • SPY

  • Referenced in 6 articles [sw22152]
  • logical assertions on message payloads and security policies, supported by third-party plugins. Our demonstration...
  • Laminar

  • Referenced in 3 articles [sw23077]
  • heap-allocated objects. Programmers express security policies by labeling data with secrecy and integrity labels ... scoped security regions. Laminar enforces the security policies specified by the labels at runtime. Laminar ... limit dynamic security checks, allowing us to retrofit DIFC policies on four application case ... studies. Replacing the applications’ ad-hoc security policies changes less than 10% of the code...
  • LoPSiL

  • Referenced in 4 articles [sw02068]
  • LoPSiL: A location-based policy-specification language This paper describes the design of LoPSiL ... language for specifying location-dependent security and privacy policies. Policy- specification languages like LoPSiL ... tasks of specifying and enforcing sound security policies on untrusted (i.e., potentially insecure) software...
  • ASASP

  • Referenced in 4 articles [sw06350]
  • ASASP: automated symbolic analysis of security policies. We describe asasp, a symbolic reachability procedure ... access control policies. The tool represents access policies and their administrative actions as formulae ... uses a symbolic reachability procedure to solve security analysis problems. Checks for fix-point-reduced...
  • Cryptyc

  • Referenced in 3 articles [sw12834]
  • ensure they do not violate the security policies...
  • Rocksalt

  • Referenced in 3 articles [sw23353]
  • machine-code analysis to enforce a security policy. But for complicated architectures such...
  • Network Security Policy Verification

  • Referenced in 1 article [sw32204]
  • Network security policy verification: We present a unified theory for verifying network security policies ... security policy is represented as directed graph. To check high-level security goals, security invariants ... repaired by tightening the policy iff the security invariants hold for the deny ... policy. An algorithm to compute a security policy. A formalization of stateful connection semantics...
  • CRePE

  • Referenced in 2 articles [sw21577]
  • research work for enforcing security policies on smartphones considered coarse-grained policies, e.g. either...
  • EAdroid

  • Referenced in 1 article [sw13648]
  • government institutions) need to customize the security policy of their Android devices according to their ... capability. This paper proposed an environment adaptive security mechanism for Android platform called EAdroid, which ... third party institutions to customize the security policy of their Android devices. EAdroid reforms ... Android system and synthetically applies Smack security module of Linux. At the same time...
  • MILENIO

  • Referenced in 1 article [sw02265]
  • agent and authority, and a dynamic security policy that allows to modify the security permissions...
  • MultiUbic

  • Referenced in 1 article [sw22199]
  • handle both transitive and intransitive security policies...
  • RAppArmor

  • Referenced in 1 article [sw22048]
  • RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux. The increasing availability ... systems and web services. However some important security concerns need to be addressed before this...
  • CardKt

  • Referenced in 1 article [sw01599]
  • Java card using a security policy encoded in multi-modal logic. In particular, modal logic ... permissions and obligations, we can turn the security check into an on-board theorem proving...
  • Aglet

  • Referenced in 4 articles [sw13305]
  • programming within dependently typed programming. Several recent security-typed programming languages, such as Aura, PCML5 ... information flow policies. In this paper, we show that security-typed programming can be embedded ... accounts for the major features of existing security-typed programming languages, such as decentralized access ... typed proof-carrying authorization, ephemeral and dynamic policies, authentication, spatial distribution, and information flow...