Proceedings of the 15th ACM Symposium on Access Control Models and Technologies 2010
DOI: 10.1145/1809842.1809849
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring security policies with metric first-order temporal logic

Abstract: We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how a wide variety of security policies can be naturally formalized in this expressive logic, ranging from traditional policies like Chinese Wall and separation of duty to more specialized usage-control and compliance requirements. We also explain how these formalizations can be directly used for monitoring and experimentally evaluate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
72
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 54 publications
(72 citation statements)
references
References 36 publications
0
72
0
Order By: Relevance
“…To check α U I β, we wait until the upper limit of I is exceeded and then search backward. As an optimization, one may build conservative summary structures for future formulas, as in some prior work [5].…”
Section: Overview Of Temporal Mode Checkingmentioning
confidence: 99%
See 4 more Smart Citations
“…To check α U I β, we wait until the upper limit of I is exceeded and then search backward. As an optimization, one may build conservative summary structures for future formulas, as in some prior work [5].…”
Section: Overview Of Temporal Mode Checkingmentioning
confidence: 99%
“…Alternatively, an online program may monitor privacy-relevant events, check them against the prevailing privacy policy and report violations on the fly. Both approaches have been considered in literature: An algorithm for offline compliance checking has been proposed by a subset of the authors [4], whereas online monitoring has been the subject of extensive work by other researchers [5][6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations