dor_id: 45503

506.#.#.a: Público

590.#.#.d: Los artículos enviados a la revista "Journal of Applied Research and Technology", se juzgan por medio de un proceso de revisión por pares

510.0.#.a: Scopus, Directory of Open Access Journals (DOAJ); Sistema Regional de Información en Línea para Revistas Científicas de América Latina, el Caribe, España y Portugal (Latindex); Indice de Revistas Latinoamericanas en Ciencias (Periódica); La Red de Revistas Científicas de América Latina y el Caribe, España y Portugal (Redalyc); Consejo Nacional de Ciencia y Tecnología (CONACyT); Google Scholar Citation

561.#.#.u: https://www.icat.unam.mx/

650.#.4.x: Ingenierías

336.#.#.b: article

336.#.#.3: Artículo de Investigación

336.#.#.a: Artículo

351.#.#.6: https://jart.icat.unam.mx/index.php/jart

351.#.#.b: Journal of Applied Research and Technology

351.#.#.a: Artículos

harvesting_group: RevistasUNAM

270.1.#.p: Revistas UNAM. Dirección General de Publicaciones y Fomento Editorial, UNAM en revistas@unam.mx

590.#.#.c: Open Journal Systems (OJS)

270.#.#.d: MX

270.1.#.d: México

590.#.#.b: Concentrador

883.#.#.u: https://revistas.unam.mx/catalogo/

883.#.#.a: Revistas UNAM

590.#.#.a: Coordinación de Difusión Cultural

883.#.#.1: https://www.publicaciones.unam.mx/

883.#.#.q: Dirección General de Publicaciones y Fomento Editorial

850.#.#.a: Universidad Nacional Autónoma de México

856.4.0.u: https://jart.icat.unam.mx/index.php/jart/article/view/256/253

100.1.#.a: Ernesto, Buelna; Raúl, Monroy

524.#.#.a: Ernesto, Buelna, et al. (2013). Real-Time Verification of Integrity Policies for Distributed Systems. Journal of Applied Research and Technology; Vol. 11 Núm. 6. Recuperado de https://repositorio.unam.mx/contenidos/45503

245.1.0.a: Real-Time Verification of Integrity Policies for Distributed Systems

502.#.#.c: Universidad Nacional Autónoma de México

561.1.#.a: Instituto de Ciencias Aplicadas y Tecnología, UNAM

264.#.0.c: 2013

264.#.1.c: 2013-12-01

653.#.#.a: real-time policy verification; integrity policies; distributed systems; NET code injection; information security

506.1.#.a: La titularidad de los derechos patrimoniales de esta obra pertenece a las instituciones editoras. Su uso se rige por una licencia Creative Commons BY-NC-SA 4.0 Internacional, https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es, para un uso diferente consultar al responsable jurídico del repositorio por medio del correo electrónico gabriel.ascanio@icat.unam.mx

884.#.#.k: https://jart.icat.unam.mx/index.php/jart/article/view/256

001.#.#.#: 074.oai:ojs2.localhost:article/256

041.#.7.h: eng

520.3.#.a: We introduce a mechanism for the verification of real-time integrity policies about the operation of a distributedsystem. Our mechanism is based on Microsoft .NET technologies. Unlike rival competitors, it is not intrusive, as ithardly modifies the source code of any component of the system to be monitored. Our mechanism consists of fourmodules the specification module, which comes with a security policy specification language, geared towards thecapture of integrity policies; the monitoring module, which includes a code injector, whereby the mechanism observeshow specific methods of the system, referred to by some policy, are invoked; the verifier module, which examines theoperation of the distributed system in order to determine whether is policy compliant or not; and, the reporter module,which notifies the system is policy compliant, or sends an alert upon the occurrence of a contingency, indicating policyviolation. We argue that our mechanism can be framed within the Clark and Wilson security model, and, thus, used torealise information integrity. We illustrate the workings and the power of our mechanism on a simple, but industrialstrength,case study.

773.1.#.t: Journal of Applied Research and Technology; Vol. 11 Núm. 6

773.1.#.o: https://jart.icat.unam.mx/index.php/jart

022.#.#.a: ISSN electrónico: 2448-6736; ISSN: 1665-6423

310.#.#.a: Bimestral

264.#.1.b: Instituto de Ciencias Aplicadas y Tecnología, UNAM

doi: https://doi.org/10.1016/S1665-6423(13)71589-X

harvesting_date: 2023-11-08 13:10:00.0

856.#.0.q: application/pdf

last_modified: 2024-03-19 14:00:00

license_url: https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es

license_type: by-nc-sa

_deleted_conflicts: 2-83c9133ca30e0b0331855eacc0a8c021

No entro en nada

No entro en nada 2

Artículo

Real-Time Verification of Integrity Policies for Distributed Systems

Ernesto, Buelna; Raúl, Monroy

Instituto de Ciencias Aplicadas y Tecnología, UNAM, publicado en Journal of Applied Research and Technology, y cosechado de Revistas UNAM

Licencia de uso

Procedencia del contenido

Cita

Ernesto, Buelna, et al. (2013). Real-Time Verification of Integrity Policies for Distributed Systems. Journal of Applied Research and Technology; Vol. 11 Núm. 6. Recuperado de https://repositorio.unam.mx/contenidos/45503

Descripción del recurso

Autor(es)
Ernesto, Buelna; Raúl, Monroy
Tipo
Artículo de Investigación
Área del conocimiento
Ingenierías
Título
Real-Time Verification of Integrity Policies for Distributed Systems
Fecha
2013-12-01
Resumen
We introduce a mechanism for the verification of real-time integrity policies about the operation of a distributedsystem. Our mechanism is based on Microsoft .NET technologies. Unlike rival competitors, it is not intrusive, as ithardly modifies the source code of any component of the system to be monitored. Our mechanism consists of fourmodules the specification module, which comes with a security policy specification language, geared towards thecapture of integrity policies; the monitoring module, which includes a code injector, whereby the mechanism observeshow specific methods of the system, referred to by some policy, are invoked; the verifier module, which examines theoperation of the distributed system in order to determine whether is policy compliant or not; and, the reporter module,which notifies the system is policy compliant, or sends an alert upon the occurrence of a contingency, indicating policyviolation. We argue that our mechanism can be framed within the Clark and Wilson security model, and, thus, used torealise information integrity. We illustrate the workings and the power of our mechanism on a simple, but industrialstrength,case study.
Tema
real-time policy verification; integrity policies; distributed systems; NET code injection; information security
Idioma
eng
ISSN
ISSN electrónico: 2448-6736; ISSN: 1665-6423

Enlaces