This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
practical_enforcement_of_information_flow_properties [2013/05/13 18:20] fabio.massacci@unitn.it [Publications] |
practical_enforcement_of_information_flow_properties [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 48: | Line 48: | ||
==== Publications ==== | ==== Publications ==== | ||
- | + | * Ngo M., Massacci F., Milushev D., Piessens F.: Runtime Enforcement of Security Policies on Black Box Reactive Programs. //In Proc. of POPL 2015// {{:research_activities:enforcement:popl070-ngo.pdf|PDF}}. | |
- | * Ngo M., Massacci F., Gadyatskaya O.: MAP-REDUCE Runtime Enforcement of Information Flow Policies. Technical Report of the University of Trento. April 2013 (revised MAy 2013). Local copy available as PDF. Also available as [[http://arxiv.org/abs/1305.2136|ArXiv technical report]]. | + | * Ngo M., Massacci F.: Programmable Enforcement Framework of Information Flow Policies. // In Proc. of ICTCS 2014// {{:research_activities:enforcement:ngo-massacci-ictcs2014.pdf|PDF}}. |
+ | * Ngo M., Massacci F., Gadyatskaya O.: MAP-REDUCE Enforcement Framework of Information Flow Policies. // In Informal Proc. of FCS 2013// {{:research_activities:enforcement:ngo-mass-gady-fcs2013-ecg.pdf|PDF}}. | ||
+ | * Ngo M., Massacci F., Gadyatskaya O.: MAP-REDUCE Runtime Enforcement of Information Flow Policies. Technical Report of the University of Trento. April 2013 (revised MAy 2013). Local copy available as {{:research_activities:enforcement:Ngo-Mass-Gady-ArXiv-1305.2136v1.pdf|PDF}}. Also available as [[http://arxiv.org/abs/1305.2136|ArXiv technical report]]. | ||
* Bielova N., Devriese D.,Massacci F., Piessens F.: Reactive non-interference for a browser model. Proc. of NSS’11. p 97-104. IEEE 2011. {{:research_activities:enforcement:biel-etal-11-nss.pdf|PDF}}[[http://www.cs.kuleuven.be/publicaties/rapporten/cw/CW602.abs.html|Full version as Technical Report at K.U.Leuven]] | * Bielova N., Devriese D.,Massacci F., Piessens F.: Reactive non-interference for a browser model. Proc. of NSS’11. p 97-104. IEEE 2011. {{:research_activities:enforcement:biel-etal-11-nss.pdf|PDF}}[[http://www.cs.kuleuven.be/publicaties/rapporten/cw/CW602.abs.html|Full version as Technical Report at K.U.Leuven]] | ||
- | |||
* Bielova N., Massacci F.: Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. Proc. of POLICY’11. p. 89-96. IEEE 2011. {{:research_activities:enforcement:biel-mass-11-policy.pdf|PDF}} | * Bielova N., Massacci F.: Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. Proc. of POLICY’11. p. 89-96. IEEE 2011. {{:research_activities:enforcement:biel-mass-11-policy.pdf|PDF}} | ||
* Bielova N., Massacci F.: Do you really mean what you actually enforced? - Edited automata revisited. . //International Journal of Information Security// 10(4):239-254 (2011) {{:research_activities:enforcement:biel-mass-08-ijis.pdf|PDF}} | * Bielova N., Massacci F.: Do you really mean what you actually enforced? - Edited automata revisited. . //International Journal of Information Security// 10(4):239-254 (2011) {{:research_activities:enforcement:biel-mass-08-ijis.pdf|PDF}} |