Security policies enforcement using finite and pushdown edit automata

被引:10
|
作者
Beauquier, Daniele [1 ]
Cohen, Joelle [1 ]
Lanotte, Ruggero [2 ]
机构
[1] Univ Paris Est Creteil Val de Marne, LACL Equipe Accueil 4219, Paris, France
[2] Univ Insubria, DipSAT, Como, Italy
关键词
Edit automata; Security policies; Enforcement mechanisms;
D O I
10.1007/s10207-013-0195-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edit automata have been introduced by J.Ligatti et al. as a model for security enforcement mechanisms which work at run time. In a distributed interacting system, they play a role of a monitor that runs in parallel with a target program and transforms its execution sequence into a sequence that obeys the security property. In this paper, we characterize security properties which are enforceable by finite edit automata (i.e. edit automata with a finite set of states) and deterministic context-free edit automata (i.e. finite edit automata extended with a stack). We prove that the properties enforceable by finite edit automata are a sub-class of regular sets. Moreover, given a regular set , one can decide in time , whether is enforceable by a finite edit automaton (where is the number of states of the finite automaton recognizing ) and we give an algorithm to synthesize the controller. Moreover, we prove that safety policies are always enforced by a deterministic context-free edit automaton. We also prove that it is possible to check if a policy is a safety policy in . Finally, we give a topological condition on the deterministic automaton expressing a regular policy enforceable by a deterministic context-free edit automaton.
引用
收藏
页码:319 / 336
页数:18
相关论文
共 50 条
  • [1] Security policies enforcement using finite and pushdown edit automata
    Danièle Beauquier
    Joëlle Cohen
    Ruggero Lanotte
    [J]. International Journal of Information Security, 2013, 12 : 319 - 336
  • [2] Security Policies Enforcement Using Finite Edit Automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 229 (03) : 19 - 35
  • [3] Edit automata: Enforcement mechanisms for run-time security policies
    Ligatti J.
    Bauer L.
    Walker D.
    [J]. International Journal of Information Security, 2005, 4 (1-2) : 2 - 16
  • [4] Using Edit Automata for Rewriting-Based Security Enforcement
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 175 - +
  • [5] Edit Distance for Pushdown Automata
    Chatterjee, Krishnendu
    Henzinger, Thomas A.
    Ibsen-Jensen, Rasmus
    Otop, Jan
    [J]. AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2015, 9135 : 121 - 133
  • [6] EDIT DISTANCE FOR PUSHDOWN AUTOMATA
    Chatterjee, Krishnendu
    Henzinger, Thomas A.
    Ibsen-Jensen, Rasmus
    Otop, Jan
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2017, 13 (03)
  • [7] Input-driven pushdown automata for edit distance neighborhood
    Geffert, Viliam
    Bednarova, Zuzana
    Szabari, Alexander
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 918 : 105 - 122
  • [8] Input-Driven Pushdown Automata for Edit Distance Neighborhood
    Geffert, Viliam
    Bednarova, Zuzana
    Szabari, Alexander
    [J]. DEVELOPMENTS IN LANGUAGE THEORY, DLT 2019, 2019, 11647 : 113 - 126
  • [9] Edit distance neighbourhoods of input-driven pushdown automata
    Okhotin, Alexander
    Salomaa, Kai
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 777 : 417 - 430
  • [10] From Security Protocols to Pushdown Automata
    Chretien, Remy
    Cortier, Veronique
    Delaune, Stephanie
    [J]. AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2013, 7966 : 137 - 149