Runtime verification using policy-based approach to control information flow

Mohamed Sarrab*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)


Computer systems are monitored to check the performance or verified to check the correctness of the software systems with respect to security properties, such as integrity, availability and confidentiality. The more sensitive the information such as credit card information, military information or personal medical information being processed by the software, the more necessary and important to monitor and control the flow of the sensitive information. Monitoring and controlling untrusted program to ensure the information confidentiality during runtime in an environment, where confidential information is presented, is difficult and unnerving. The issue is how to monitor and control the flow of the confidential information at runtime of untrusted program. In this paper, we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with running program.

Original languageEnglish
Pages (from-to)212-230
Number of pages19
JournalInternational Journal of Security and Networks
Issue number4
Publication statusPublished - 2013


  • Information flow control
  • Information flow policy
  • Runtime monitoring
  • Runtime verification
  • Security policy

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Runtime verification using policy-based approach to control information flow'. Together they form a unique fingerprint.

Cite this