Professional Documents
Culture Documents
Execution Monitoring
Execution Monitoring
Policies
Rahul
Gera
Brief overview
Security policies and Execution
Monitoring.
Policies that can be enforced using EM.
An automata based formalism for
specifying those security policies.
Mechanisms for enforcing policies defined
by the automata.
Security Policy
Execution Monitoring.
Non EM mechanisms
CHARACTERIZING EM
ENFORCEMENT MECHANISMS
Definition is terms of
10
Safety Property
11
Safety Property
12
13
14
Security Automata
15
16
Principals p
Rights r
Objects o
Oper(p,o,r)
AddRight(p,p,o,r)
RmvRight(p,p,o,r)
AddP(p,p)
RmvP(p,p)
AddO(p,o)
RmvO(p,o)
Enforceable Security Policies
by Fred Schneider
17
18
This however does not have the power to specify guaranteed service after payment.
19
20
1.
2.
21
Implicit Assumptions
Bounded memory.
Target Control. This is not always possible
like in the case of Real Time Availability if
MWT is in seconds.
Enforcement Mechanism Integrity
(isolation).
22
23
24
Beyond EM
25
26
QUESTIONS???
27