Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/en/node/22718' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/en/node/22718' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Quantitative evaluation of enforcement strategies | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

Quantitative evaluation of enforcement strategies

In Security, monitors and enforcement mechanisms run in parallel with programs to check, and modify their run-time behaviour, respectively, in order to guarantee the satisfaction of a security policy. For the same policy, several enforcement strategies are possible. We provide a framework for quantitative monitoring and enforcement. Enforcement strategies are analysed according to user-de ned parameters. This is done by extending the notion controller processes, that mimics the well-known edit  automata, with weights on transitions, valued in a C-semiring. C-semirings permit one to be  exible and general in the quantitative criteria. Furthermore, we provide some examples of orders on controllers that are evaluated under incomparable criteria.


2013

IIT authors:

Vincenzo Ciancia

Foto di VINCENZO CIANCIA

Charles Morisset

Foto di Charles Morisset

Type: TR Technical reports
Field of reference: Information Technology and Communication Systems
IIT TR-04/2013

File: TR-04-2013.pdf

Activity: Sicurezza di dispositivi mobili