Scaling Up Proactive Enforcement Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/978-3-031-98682-6_19
Runtime enforcers receive events from a system and output commands ensuring the system’s policy compliance. Proactive enforcers extend traditional (reactive) enforcers by emitting commands at any time, rather only as a response to system actions. However, proactive enforcers have so far lacked support for many useful policy features. This, along with the existing tools’ poor performance, hinders their adoption. We present a performance-optimized, proactive enforcement algorithm for a rich policy language: metric first-order temporal logic with function applications, aggregations, and bindings. We have implemented this algorithm in EnfGuard , the first proactive enforcer tool that supports the above constructs. We evaluated our tool using a novel set of six benchmarks containing both real-world and synthetic policies and logs, demonstrating that it enforces realistic policies out-of-the-box and achieves the necessary performance to be used in real-time systems.
Related Topics
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-3-031-98682-6_19
- https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdf
- OA Status
- hybrid
- Cited By
- 1
- References
- 39
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412543516
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412543516Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-3-031-98682-6_19Digital Object Identifier
- Title
-
Scaling Up Proactive EnforcementWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
François Hublet, Leonardo Lima, David Basin, Srđan Krstić, Dmitriy TraytelList of authors in order
- Landing page
-
https://doi.org/10.1007/978-3-031-98682-6_19Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdfDirect OA link when available
- Concepts
-
Computer science, Scaling, Enforcement, Computer security, Mathematics, Political science, Geometry, LawTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
39Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412543516 |
|---|---|
| doi | https://doi.org/10.1007/978-3-031-98682-6_19 |
| ids.doi | https://doi.org/10.1007/978-3-031-98682-6_19 |
| ids.openalex | https://openalex.org/W4412543516 |
| fwci | 14.02499956 |
| type | book-chapter |
| title | Scaling Up Proactive Enforcement |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 392 |
| biblio.first_page | 370 |
| topics[0].id | https://openalex.org/T10142 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9983999729156494 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1703 |
| topics[0].subfield.display_name | Computational Theory and Mathematics |
| topics[0].display_name | Formal Methods in Verification |
| topics[1].id | https://openalex.org/T10639 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9976000189781189 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Advanced Software Engineering Methodologies |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.983299970626831 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list.value | 5000 |
| apc_list.currency | EUR |
| apc_list.value_usd | 5392 |
| apc_paid.value | 5000 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 5392 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8490041494369507 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C99844830 |
| concepts[1].level | 2 |
| concepts[1].score | 0.650077760219574 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q102441924 |
| concepts[1].display_name | Scaling |
| concepts[2].id | https://openalex.org/C2779777834 |
| concepts[2].level | 2 |
| concepts[2].score | 0.538881778717041 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4202277 |
| concepts[2].display_name | Enforcement |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.3254311680793762 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C33923547 |
| concepts[4].level | 0 |
| concepts[4].score | 0.056532829999923706 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[4].display_name | Mathematics |
| concepts[5].id | https://openalex.org/C17744445 |
| concepts[5].level | 0 |
| concepts[5].score | 0.05101534724235535 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[5].display_name | Political science |
| concepts[6].id | https://openalex.org/C2524010 |
| concepts[6].level | 1 |
| concepts[6].score | 0.035869598388671875 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[6].display_name | Geometry |
| concepts[7].id | https://openalex.org/C199539241 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[7].display_name | Law |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8490041494369507 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/scaling |
| keywords[1].score | 0.650077760219574 |
| keywords[1].display_name | Scaling |
| keywords[2].id | https://openalex.org/keywords/enforcement |
| keywords[2].score | 0.538881778717041 |
| keywords[2].display_name | Enforcement |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.3254311680793762 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/mathematics |
| keywords[4].score | 0.056532829999923706 |
| keywords[4].display_name | Mathematics |
| keywords[5].id | https://openalex.org/keywords/political-science |
| keywords[5].score | 0.05101534724235535 |
| keywords[5].display_name | Political science |
| keywords[6].id | https://openalex.org/keywords/geometry |
| keywords[6].score | 0.035869598388671875 |
| keywords[6].display_name | Geometry |
| language | en |
| locations[0].id | doi:10.1007/978-3-031-98682-6_19 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S106296714 |
| locations[0].source.issn | 0302-9743, 1611-3349 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0302-9743 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Lecture notes in computer science |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Lecture Notes in Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1007/978-3-031-98682-6_19 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5061322917 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5419-3125 |
| authorships[0].author.display_name | François Hublet |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | François Hublet |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5089854819 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1701-0435 |
| authorships[1].author.display_name | Leonardo Lima |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Leonardo Lima |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5025344654 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2952-939X |
| authorships[2].author.display_name | David Basin |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | David Basin |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5028440299 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-8314-2589 |
| authorships[3].author.display_name | Srđan Krstić |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Srđan Krstić |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5046106256 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-7982-2768 |
| authorships[4].author.display_name | Dmitriy Traytel |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Dmitriy Traytel |
| authorships[4].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Scaling Up Proactive Enforcement |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10142 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9983999729156494 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1703 |
| primary_topic.subfield.display_name | Computational Theory and Mathematics |
| primary_topic.display_name | Formal Methods in Verification |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-3-031-98682-6_19 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S106296714 |
| best_oa_location.source.issn | 0302-9743, 1611-3349 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0302-9743 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Lecture notes in computer science |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Lecture Notes in Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-3-031-98682-6_19 |
| primary_location.id | doi:10.1007/978-3-031-98682-6_19 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S106296714 |
| primary_location.source.issn | 0302-9743, 1611-3349 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0302-9743 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Lecture notes in computer science |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/978-3-031-98682-6_19.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Lecture Notes in Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1007/978-3-031-98682-6_19 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4322742170, https://openalex.org/W2972736528, https://openalex.org/W4389080807, https://openalex.org/W4323026836, https://openalex.org/W1989051781, https://openalex.org/W1988961870, https://openalex.org/W2267240189, https://openalex.org/W1599995366, https://openalex.org/W2025315843, https://openalex.org/W1483600339, https://openalex.org/W2006611045, https://openalex.org/W2312684484, https://openalex.org/W2899532715, https://openalex.org/W2977986977, https://openalex.org/W1606733447, https://openalex.org/W2056972503, https://openalex.org/W2087492381, https://openalex.org/W1975880448, https://openalex.org/W2110279509, https://openalex.org/W4205804273, https://openalex.org/W4296927657, https://openalex.org/W4400939384, https://openalex.org/W6893237883, https://openalex.org/W2111299652, https://openalex.org/W1540883472, https://openalex.org/W2734651385, https://openalex.org/W2068341689, https://openalex.org/W4393904820, https://openalex.org/W2010935983, https://openalex.org/W2155781848, https://openalex.org/W2104241409, https://openalex.org/W2296440678, https://openalex.org/W1973223152, https://openalex.org/W2591279143, https://openalex.org/W4390109145, https://openalex.org/W2756038395, https://openalex.org/W2036910349, https://openalex.org/W2963056188, https://openalex.org/W4226251688 |
| referenced_works_count | 39 |
| abstract_inverted_index., | 89 |
| abstract_inverted_index.a | 6, 31, 62, 68, 105 |
| abstract_inverted_index.We | 60, 82, 100 |
| abstract_inverted_index.as | 30 |
| abstract_inverted_index.at | 25 |
| abstract_inverted_index.be | 132 |
| abstract_inverted_index.by | 22 |
| abstract_inverted_index.in | 87, 134 |
| abstract_inverted_index.it | 121 |
| abstract_inverted_index.of | 108 |
| abstract_inverted_index.so | 40 |
| abstract_inverted_index.to | 33, 131 |
| abstract_inverted_index.and | 8, 80, 114, 117, 126 |
| abstract_inverted_index.any | 26 |
| abstract_inverted_index.far | 41 |
| abstract_inverted_index.for | 44, 67 |
| abstract_inverted_index.our | 102 |
| abstract_inverted_index.set | 107 |
| abstract_inverted_index.six | 109 |
| abstract_inverted_index.the | 12, 52, 90, 97, 128 |
| abstract_inverted_index.both | 112 |
| abstract_inverted_index.from | 5 |
| abstract_inverted_index.have | 39, 83 |
| abstract_inverted_index.many | 45 |
| abstract_inverted_index.only | 29 |
| abstract_inverted_index.poor | 55 |
| abstract_inverted_index.rich | 69 |
| abstract_inverted_index.that | 95, 120 |
| abstract_inverted_index.this | 85 |
| abstract_inverted_index.tool | 94, 103 |
| abstract_inverted_index.used | 133 |
| abstract_inverted_index.with | 51, 76 |
| abstract_inverted_index.This, | 49 |
| abstract_inverted_index.above | 98 |
| abstract_inverted_index.along | 50 |
| abstract_inverted_index.first | 91 |
| abstract_inverted_index.logic | 75 |
| abstract_inverted_index.logs, | 118 |
| abstract_inverted_index.novel | 106 |
| abstract_inverted_index.their | 58 |
| abstract_inverted_index.time, | 27 |
| abstract_inverted_index.using | 104 |
| abstract_inverted_index.events | 4 |
| abstract_inverted_index.extend | 18 |
| abstract_inverted_index.lacked | 42 |
| abstract_inverted_index.metric | 72 |
| abstract_inverted_index.output | 9 |
| abstract_inverted_index.policy | 14, 47, 70 |
| abstract_inverted_index.rather | 28 |
| abstract_inverted_index.system | 7, 34 |
| abstract_inverted_index.useful | 46 |
| abstract_inverted_index.Runtime | 1 |
| abstract_inverted_index.hinders | 57 |
| abstract_inverted_index.present | 61 |
| abstract_inverted_index.receive | 3 |
| abstract_inverted_index.support | 43 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.EnfGuard | 88 |
| abstract_inverted_index.However, | 36 |
| abstract_inverted_index.achieves | 127 |
| abstract_inverted_index.actions. | 35 |
| abstract_inverted_index.commands | 10, 24 |
| abstract_inverted_index.emitting | 23 |
| abstract_inverted_index.enforcer | 93 |
| abstract_inverted_index.enforces | 122 |
| abstract_inverted_index.ensuring | 11 |
| abstract_inverted_index.existing | 53 |
| abstract_inverted_index.function | 77 |
| abstract_inverted_index.policies | 116, 124 |
| abstract_inverted_index.response | 32 |
| abstract_inverted_index.supports | 96 |
| abstract_inverted_index.systems. | 136 |
| abstract_inverted_index.temporal | 74 |
| abstract_inverted_index.tools’ | 54 |
| abstract_inverted_index.Proactive | 16 |
| abstract_inverted_index.adoption. | 59 |
| abstract_inverted_index.algorithm | 66, 86 |
| abstract_inverted_index.bindings. | 81 |
| abstract_inverted_index.enforcers | 2, 17, 21, 38 |
| abstract_inverted_index.evaluated | 101 |
| abstract_inverted_index.features. | 48 |
| abstract_inverted_index.language: | 71 |
| abstract_inverted_index.necessary | 129 |
| abstract_inverted_index.proactive | 37, 64, 92 |
| abstract_inverted_index.real-time | 135 |
| abstract_inverted_index.realistic | 123 |
| abstract_inverted_index.synthetic | 115 |
| abstract_inverted_index.(reactive) | 20 |
| abstract_inverted_index.benchmarks | 110 |
| abstract_inverted_index.containing | 111 |
| abstract_inverted_index.real-world | 113 |
| abstract_inverted_index.system’s | 13 |
| abstract_inverted_index.compliance. | 15 |
| abstract_inverted_index.constructs. | 99 |
| abstract_inverted_index.enforcement | 65 |
| abstract_inverted_index.first-order | 73 |
| abstract_inverted_index.implemented | 84 |
| abstract_inverted_index.performance | 130 |
| abstract_inverted_index.traditional | 19 |
| abstract_inverted_index.performance, | 56 |
| abstract_inverted_index.aggregations, | 79 |
| abstract_inverted_index.applications, | 78 |
| abstract_inverted_index.demonstrating | 119 |
| abstract_inverted_index.out-of-the-box | 125 |
| abstract_inverted_index.performance-optimized, | 63 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.97238018 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |