2008
DOI: 10.1016/j.entcs.2007.10.013
|View full text |Cite
|
Sign up to set email alerts
|

ConSpec – A Formal Language for Policy Specification

Abstract: The paper presents ConSpec, an automata based policy specification language. The language trades off clean semantics to language expressiveness; a formal semantics for the language is provided as security automata. ConSpec specifications can be used at different stages of the application lifecycle, rendering possible the formalization of various policy enforcement techniques.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(38 citation statements)
references
References 16 publications
0
38
0
Order By: Relevance
“…JavaMOP supports several other logics, via a plugin mechanism, and slices are assigned categories, which can be match/fail or taken from some other set. Because slices are analyzed independently, it not possible to express examples such as (1) and (4), which use an unbounded number of register assignments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…JavaMOP supports several other logics, via a plugin mechanism, and slices are assigned categories, which can be match/fail or taken from some other set. Because slices are analyzed independently, it not possible to express examples such as (1) and (4), which use an unbounded number of register assignments.…”
Section: Related Workmentioning
confidence: 99%
“…1 In the latter case, we aspire to reason at runtime about particular shapes of dynamically allocated data-structures irrespectively of their size. For example, checking "the shape of the list should not contain cycles" (1) for lists of any size and in a finite way, requires two activities. First, being able to change the value of the variables in the specification while traversing the list (re-binding).…”
Section: Introductionmentioning
confidence: 99%
“…In particular, we present here a possible extension of our framework for treating parameterized systems; we have developed a synthesis tool in the objective language O'caml 11, which given as input both a system and a security property, automatically generates a controller program. In addition, we have developed a translator from our internal representation to ConSpec 12, the security policy language used in the ambit of the S3MS European project 13. There exists a run‐time framework for enforcing security policies (controller programs in our context) for execution monitoring of Java applications on mobile devices.…”
Section: Introductionmentioning
confidence: 99%
“…We have also implemented a further, prototypical refinement supporting the ConSpec language [AN08], which is not an advanced-dispatching language as such but rather a language for policy enforcement. Table 1 shows the different concrete entities we implemented while mapping the different languages (AspectJ, CaesarJ, JPred, Compose*, and ConSpec) to LIAM, as well as their usage in the different language mappings.…”
Section: Existing (General-purpose) Languagesmentioning
confidence: 99%
“…In particular, the call-back can be used to integrate legacy language frontends that generate a proprietary intermediate representation of advanced-dispatching concepts, which can then be transformed to the LIAM-based intermediate representation by the importer. We have implemented two such importers: one for the AspectJ language that processes bytecode and the annotations added by the AspectJ compiler, and one for the ConSpec language [AN08] that directly processes ConSpec source code. The language developer is thus flexible with respect to the importer's inputs.…”
Section: Factorymentioning
confidence: 99%