메뉴 건너뛰기




Volumn 70, Issue 4, 2002, Pages 112-127

Combining monitors for runtime system verification

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; DISTRIBUTED COMPUTER SYSTEMS; GENERAL PURPOSE COMPUTERS; MONITORING; SERVERS;

EID: 18944373357     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)80580-2     Document Type: Conference Paper
Times cited : (17)

References (25)
  • 6
    • 0022514018 scopus 로고
    • 'Sometime' and 'not never' revisited: On branching time versus linear time
    • Emerson E.A., Halpern J.Y. 'Sometime' and 'not never' revisited: On branching time versus linear time. Journal of the ACM. 33:1986;151-178
    • (1986) Journal of the ACM , vol.33 , pp. 151-178
    • Emerson, E.A.1    Halpern, J.Y.2
  • 7
    • 11344253696 scopus 로고    scopus 로고
    • On the construction of monitors for temporal logic properties
    • RV'01 - First Workshop on Runtime Verification
    • Geilen M. On the construction of monitors for temporal logic properties. Electronic Notes in Theoretical Computer Science. 55:2001;. RV'01 - First Workshop on Runtime Verification
    • (2001) Electronic Notes in Theoretical Computer Science , vol.55
    • Geilen, M.1
  • 13
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security critical programs in distributed systems: A specification-based approach
    • Ko C., M. Ruschitzka and K. Levitt, Execution monitoring of security critical programs in distributed systems: A specification-based approach, in: IEEE Symposium on Security and Privacy, 1997, pp. 175-187
    • (1997) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 16
    • 84995731256 scopus 로고
    • Temporal verification diagrams
    • International Symposium on Theoretical Aspects of Computer Software (TACS'94)
    • Manna Z. and A. Pnueli., Temporal verification diagrams, in: International Symposium on Theoretical Aspects of Computer Software (TACS'94), LNCS 789 (1994), pp. 726-765
    • (1994) LNCS , vol.789 , pp. 726-765
    • Manna, Z.1    Pnueli, A.2
  • 18
    • 8644227174 scopus 로고    scopus 로고
    • ida Security Advisory AL20010717, eEye Digital Security
    • Permeh R. and M. Maiffret, ida "Code Red" worm, Security Advisory AL20010717, eEye Digital Security (2001), http://www.eeye.com/html/ Research/Advisories/AL20010717.html
    • (2001) "Code Red" Worm
    • Permeh, R.1    Maiffret, M.2
  • 25
    • 18944393517 scopus 로고    scopus 로고
    • Ph.D. thesis, Department of Electrical and Computer Engineering, University of Toronto
    • Zakinthinos A., "On the Composition of Security Properties," Ph.D. thesis, Department of Electrical and Computer Engineering, University of Toronto (1996)
    • (1996) On the Composition of Security Properties
    • Zakinthinos, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.