TY - JOUR
T1 - Runtime verification using policy-based approach to control information flow
AU - Sarrab, Mohamed
PY - 2013
Y1 - 2013
N2 - Computer systems are monitored to check the performance or verified to check the correctness of the software systems with respect to security properties, such as integrity, availability and confidentiality. The more sensitive the information such as credit card information, military information or personal medical information being processed by the software, the more necessary and important to monitor and control the flow of the sensitive information. Monitoring and controlling untrusted program to ensure the information confidentiality during runtime in an environment, where confidential information is presented, is difficult and unnerving. The issue is how to monitor and control the flow of the confidential information at runtime of untrusted program. In this paper, we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with running program.
AB - Computer systems are monitored to check the performance or verified to check the correctness of the software systems with respect to security properties, such as integrity, availability and confidentiality. The more sensitive the information such as credit card information, military information or personal medical information being processed by the software, the more necessary and important to monitor and control the flow of the sensitive information. Monitoring and controlling untrusted program to ensure the information confidentiality during runtime in an environment, where confidential information is presented, is difficult and unnerving. The issue is how to monitor and control the flow of the confidential information at runtime of untrusted program. In this paper, we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with running program.
KW - Information flow control
KW - Information flow policy
KW - Runtime monitoring
KW - Runtime verification
KW - Security policy
UR - http://www.scopus.com/inward/record.url?scp=84890305350&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84890305350&partnerID=8YFLogxK
U2 - 10.1504/IJSN.2013.058153
DO - 10.1504/IJSN.2013.058153
M3 - Article
AN - SCOPUS:84890305350
SN - 1747-8405
VL - 8
SP - 212
EP - 230
JO - International Journal of Security and Networks
JF - International Journal of Security and Networks
IS - 4
ER -