Skip to main content
Erschienen in: International Journal of Information Security 4/2013

01.08.2013 | Regular Contribution

Security policies enforcement using finite and pushdown edit automata

verfasst von: Danièle Beauquier, Joëlle Cohen, Ruggero Lanotte

Erschienen in: International Journal of Information Security | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Edit automata have been introduced by J.Ligatti et al. as a model for security enforcement mechanisms which work at run time. In a distributed interacting system, they play a role of a monitor that runs in parallel with a target program and transforms its execution sequence into a sequence that obeys the security property. In this paper, we characterize security properties which are enforceable by finite edit automata (i.e. edit automata with a finite set of states) and deterministic context-free edit automata (i.e. finite edit automata extended with a stack). We prove that the properties enforceable by finite edit automata are a sub-class of regular sets. Moreover, given a regular set \(P\), one can decide in time \(O(n^2)\), whether \(P\) is enforceable by a finite edit automaton (where \(n\) is the number of states of the finite automaton recognizing \(P\)) and we give an algorithm to synthesize the controller. Moreover, we prove that safety policies are always enforced by a deterministic context-free edit automaton. We also prove that it is possible to check if a policy is a safety policy in \(O(n^4)\). Finally, we give a topological condition on the deterministic automaton expressing a regular policy enforceable by a deterministic context-free edit automaton.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)MathSciNetCrossRef Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)MathSciNetCrossRef
2.
3.
Zurück zum Zitat Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: FLoC02 Workshop on Foundations of Computer, Security, pp. 95–104 (2002) Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: FLoC02 Workshop on Foundations of Computer, Security, pp. 95–104 (2002)
4.
Zurück zum Zitat Erlingsson, U., Schneider, F.B.: Irm enforcement of java stack inspection. In: IEEE Symposium on Security and Privacy, pp. 246–255 (2000) Erlingsson, U., Schneider, F.B.: Irm enforcement of java stack inspection. In: IEEE Symposium on Security and Privacy, pp. 246–255 (2000)
5.
Zurück zum Zitat Fong, P.W.L.: Access control by tracking shallow execution history. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 43–55. IEEE Computer Society Press, May (2004) Fong, P.W.L.: Access control by tracking shallow execution history. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 43–55. IEEE Computer Society Press, May (2004)
6.
Zurück zum Zitat Hamlen, Kevin W., Morrisett, Greg, Schneider, Fred B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. (TOPLAS) 28(1), 175–205 (2006)CrossRef Hamlen, Kevin W., Morrisett, Greg, Schneider, Fred B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. (TOPLAS) 28(1), 175–205 (2006)CrossRef
7.
Zurück zum Zitat Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2–16 (2005)CrossRef Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2–16 (2005)CrossRef
8.
Zurück zum Zitat Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: Computer Security—ESORICS 2005, vol. 3679 of Lecture Notes in Computer Sciences, pp. 353–373 (2005) Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: Computer Security—ESORICS 2005, vol. 3679 of Lecture Notes in Computer Sciences, pp. 353–373 (2005)
9.
Zurück zum Zitat Ligatti, Jay, Bauer, Lujo, Walker, David: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (January 2009) Ligatti, Jay, Bauer, Lujo, Walker, David: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (January 2009)
10.
Zurück zum Zitat Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS) (2010) Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS) (2010)
11.
Zurück zum Zitat Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. In: Proceedings of the Second International Workshop on Security and Trust Management (STM 2006), vol. 179 of, Electronic Notes in Theoretical Computer Science, pp. 31–46 (2007) Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. In: Proceedings of the Second International Workshop on Security and Trust Management (STM 2006), vol. 179 of, Electronic Notes in Theoretical Computer Science, pp. 31–46 (2007)
12.
Zurück zum Zitat Perrin, D., Pin, J.E.: Infinite Words, Automata, Semigroups, Logic and Games, vol. 141 of Pure and Applied Mathematics. Elsevier, Amsterdam (2004) Perrin, D., Pin, J.E.: Infinite Words, Automata, Semigroups, Logic and Games, vol. 141 of Pure and Applied Mathematics. Elsevier, Amsterdam (2004)
13.
Zurück zum Zitat Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)CrossRef Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)CrossRef
14.
Zurück zum Zitat Sandholm, A., Schwartzbach, M.: Distributed safety controllers for web services. In: Fundamental Approaches to Software Engineering, vol. 1382 of Lecture Notes in Computer Science, pp. 270–284. Springer, Berlin (1998) Sandholm, A., Schwartzbach, M.: Distributed safety controllers for web services. In: Fundamental Approaches to Software Engineering, vol. 1382 of Lecture Notes in Computer Science, pp. 270–284. Springer, Berlin (1998)
15.
Zurück zum Zitat Talhia, C., Tawbia, N., Debbabib, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. (2008) Talhia, C., Tawbia, N., Debbabib, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. (2008)
Metadaten
Titel
Security policies enforcement using finite and pushdown edit automata
verfasst von
Danièle Beauquier
Joëlle Cohen
Ruggero Lanotte
Publikationsdatum
01.08.2013
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 4/2013
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-013-0195-8

Weitere Artikel der Ausgabe 4/2013

International Journal of Information Security 4/2013 Zur Ausgabe