{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:55:56Z","timestamp":1725562556973},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_11","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"139-154","source":"Crossref","is-referenced-by-count":7,"title":["Using Equivalence Relations for Corrective Enforcement of Security Policies"],"prefix":"10.1007","author":[{"given":"Rapha\u00ebl","family":"Khoury","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadia","family":"Tawbi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF01782772","volume":"2","author":"B. Alpern","year":"1987","unstructured":"Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distributed Computing\u00a02, 17\u2013126 (1987)","journal-title":"Distributed Computing"},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","volume":"21","author":"B. Alpern","year":"1985","unstructured":"Alpern, B., Schneider, F.: Defining liveness. Information Processing Letters\u00a021(4), 181\u2013185 (1985)","journal-title":"Information Processing Letters"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11944836_25","volume-title":"FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science","author":"A. Bauer","year":"2006","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol.\u00a04337, pp. 260\u2013272. Springer, Heidelberg (2006)"},{"key":"11_CR4","unstructured":"Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Proceedings of the Foundations of Computer Security Workshop (July 2002)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: Knapskog, S.J. (ed.) NordSec 2009. LNCS, vol.\u00a05838, pp. 239\u2013254. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04766-4_17"},{"key":"11_CR6","unstructured":"Chabot, H.: S\u00e9curisation de code bas\u00e9e sur la combinaison d\u2019analyse statique et dynamique, g\u00e9n\u00e9ration de moniteur partir d\u2019un automate de Rabin. Master\u2019s thesis, Laval University (2008)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-642-04766-4_20","volume-title":"NordSec 2009","author":"H. Chabot","year":"2009","unstructured":"Chabot, H., Khoury, R., Tawbi, N.: Generating in-line monitors for Rabin automata. In: J\u00f8sang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol.\u00a05838, pp. 287\u2013301. Springer, Heidelberg (2009)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Falcone, Y., Fernandez, J.C., Mounier, L.: Enforcement monitoring wrt. the safety-progress classification of properties. In: Proceedings of the ACM Symposium on Applied Computing (SAC), pp. 593\u2013600. ACM Press, New York (March 2009)","DOI":"10.1145\/1529282.1529408"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Fong, P.: Access control by tracking shallow execution history. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy (May 2004)","DOI":"10.1109\/SECPRI.2004.1301314"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TSE.1977.229904","volume":"3","author":"L. Lamport","year":"1977","unstructured":"Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering\u00a03(2), 125\u2013143 (1977)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policie. International Journal of Information Security (2004)","DOI":"10.1007\/s10207-004-0046-8"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11555827_21","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 355\u2013373. Springer, Heidelberg (2005)"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J. Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Transactions on Information and System Security\u00a012(3), 1\u201341 (2009)","journal-title":"ACM Transactions on Information and System Security"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. Tech. Rep. USF-CSE-SS-102809, University of South Florida (April 2010)","DOI":"10.1007\/978-3-642-15497-3_6"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"Information and System Security"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/3-540-45523-X_17","volume-title":"Multiset Processing","author":"A. Syropoulos","year":"2001","unstructured":"Syropoulos, A.: Mathematics of multisets. In: Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. LNCS, vol.\u00a02235, pp. 347\u2013358. Springer, Heidelberg (2001)"},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ic.2007.07.009","volume":"206","author":"C. Talhi","year":"2008","unstructured":"Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitations constraints. Information and Computation\u00a0206(1), 158\u2013184 (2008)","journal-title":"Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T16:14:30Z","timestamp":1636042470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}