scispace - formally typeset
S

Sandra Rueda

Researcher at University of Los Andes

Publications -  33
Citations -  536

Sandra Rueda is an academic researcher from University of Los Andes. The author has contributed to research in topics: Access control & Mandatory access control. The author has an hindex of 12, co-authored 33 publications receiving 451 citations. Previous affiliations of Sandra Rueda include Pennsylvania State University.

Papers
More filters
Proceedings ArticleDOI

A logical specification and analysis for SELinux MLS policy

TL;DR: This work has modeled the SELinux MLS policy using a logical specification and implemented that specification in the Prolog language and developed some analyses for testing the properties of a given policy as well an algorithm to determine whether one policy is compliant with another.
Journal ArticleDOI

A logical specification and analysis for SELinux MLS policy

TL;DR: This work has modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language, and developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another.
Proceedings ArticleDOI

Flowfence: a denial of service defense system for software defined networking

TL;DR: FlowFence is a lightweight and fast denial of service detection and mitigation system for Software Defined Networking (SDN) that avoids users' starvation of network resources without adding much overhead in the network.
Proceedings Article

From trusted to secure: building and executing applications that enforce system security

TL;DR: This paper provides an architecture for an operating system service, called SIESTA, which handles applications developed in the security-typed language, Jif, running on the SELinux operating system.
Proceedings ArticleDOI

Integrity walls: finding attack surfaces from mandatory access control policies

TL;DR: The question is whether the program entry points accessible to adversaries can be found proactively, so defenses at these entry points can also be developed proactively.