-
1
-
-
0039413220
-
-
31 USC 5311-5332 and 31 CFR 103
-
Bank Secrecy Act of 1970. 31 USC 5311-5332 and 31 CFR 103 (1970)
-
(1970)
Bank Secrecy Act of 1970
-
-
-
2
-
-
34547417210
-
-
Public Law 107-56, HR 3162 RDS
-
USA Patriot Act of 2001. Public Law 107-56, HR 3162 RDS (2001)
-
(2001)
USA Patriot Act of 2001
-
-
-
3
-
-
0003928313
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley Longman Publishing Co., Inc., Boston (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
4
-
-
51549096502
-
Logics and models of real time: A survey
-
Huizing, C., de Bakker, J.W., Rozenberg, G., de Roever, W.-P. (eds.) REX 1991. Springer, Heidelberg
-
Alur, R., Henzinger, T.A.: Logics and models of real time: A survey. In: Huizing, C., de Bakker, J.W., Rozenberg, G., de Roever, W.-P. (eds.) REX 1991. LNCS, vol. 600, pp. 74-106. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.600
, pp. 74-106
-
-
Alur, R.1
Henzinger, T.A.2
-
5
-
-
33745289988
-
The CQL continuous query language: Semantic foundations and query execution
-
DOI 10.1007/s00778-004-0147-z
-
Arasu, A., Babu, S., Widom, J.: The CQL continuous query language: semantic foundations and query execution. VLDB Journal 15(2), 121-142 (2006) (Pubitemid 43938935)
-
(2006)
VLDB Journal
, vol.15
, Issue.2
, pp. 121-142
-
-
Arasu, A.1
Babu, S.2
Widom, J.3
-
6
-
-
84944202148
-
Rule-based runtime verification
-
Steffen, B., Levi, G. (eds.) VMCAI 2004. Springer, Heidelberg
-
Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44-57. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2937
, pp. 44-57
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
8
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
IEEE Computer Society, Los Alamitos
-
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: Proc. of the 2006 IEEE Symposium on Security and Privacy, pp. 184-198. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proc. of the 2006 IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
10
-
-
84880195884
-
Runtime monitoring of metric first-order temporal properties
-
Basin, D., Klaedtke, F., Müller, S., Pfitzmann, B.: Runtime monitoring of metric first-order temporal properties. In: Proc. of the 28th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), Dagstuhl Seminar Proc., pp. 49-60 (2008)
-
(2008)
Proc. of the 28th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), Dagstuhl Seminar Proc.
, pp. 49-60
-
-
Basin, D.1
Klaedtke, F.2
Müller, S.3
Pfitzmann, B.4
-
11
-
-
85016422463
-
Monitoring of real-time properties
-
Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. Springer, Heidelberg
-
Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 260-272. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 260-272
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
12
-
-
10844261656
-
Finite presentations of infinite structures: Automata and interpretations
-
Blumensath, A., Grädel, E.: Finite presentations of infinite structures: Automata and interpretations. Theory Comput. Syst. 37(6), 641-674 (2004)
-
(2004)
Theory Comput. Syst.
, vol.37
, Issue.6
, pp. 641-674
-
-
Blumensath, A.1
Grädel, E.2
-
13
-
-
84976843391
-
Efficient checking of temporal integrity constraints using bounded history encoding
-
Chomicki, J.: Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst. 20(2), 149-186 (1995)
-
(1995)
ACM Trans. Database Syst.
, vol.20
, Issue.2
, pp. 149-186
-
-
Chomicki, J.1
-
14
-
-
84944043577
-
Monitors for history-based policies
-
Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. Springer, Heidelberg
-
Chomicki, J., Lobo, J.: Monitors for history-based policies. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 57-72. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1995
, pp. 57-72
-
-
Chomicki, J.1
Lobo, J.2
-
15
-
-
0029530231
-
On the feasibility of checking temporal integrity constraints
-
Chomicki, J., Niwiński, D.: On the feasibility of checking temporal integrity constraints. J. Comput. Syst. Sci. 51(3), 523-535 (1995)
-
(1995)
J. Comput. Syst. Sci.
, vol.51
, Issue.3
, pp. 523-535
-
-
Chomicki, J.1
Niwiński, D.2
-
16
-
-
85037030721
-
Design and synthesis of synchronization skeletons using branching-time temporal logic
-
Kozen, D. (ed.) Logic of Programs 1981. Springer, Heidelberg
-
Clarke, E.M., Emerson, E.A.: Design and synthesis of synchronization skeletons using branching-time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52-71. Springer, Heidelberg (1982)
-
(1982)
LNCS
, vol.131
, pp. 52-71
-
-
Clarke, E.M.1
Emerson, E.A.2
-
17
-
-
26444539487
-
Efficient monitoring of ω-languages
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
d'Amorim, M., Roşu, G.: Efficient monitoring of ω-languages. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 364-378. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 364-378
-
-
D'Amorim, M.1
Roşu, G.2
-
18
-
-
38149030121
-
LOLA: Runtime monitoring of synchronous systems
-
IEEE Computer Society, Los Alamitos
-
D'Angelo, B., Sankaranarayanan, S., Sánchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: Runtime monitoring of synchronous systems. In: Proc. of the 12th International Symposium on Temporal Representation and Reasoning (TIME), pp. 166-174. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proc. of the 12th International Symposium on Temporal Representation and Reasoning (TIME)
, pp. 166-174
-
-
D'Angelo, B.1
Sankaranarayanan, S.2
Sánchez, C.3
Robinson, W.4
Finkbeiner, B.5
Sipma, H.B.6
Mehrotra, S.7
Manna, Z.8
-
19
-
-
57049105761
-
Checking traces for regulatory conformance
-
Leucker, M. (ed.) RV 2008. Springer, Heidelberg
-
Dinesh, N., Joshi, A., Lee, I., Sokolsky, O.: Checking traces for regulatory conformance. In: Leucker, M. (ed.) RV 2008. LNCS, vol. 5289, pp. 86-103. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5289
, pp. 86-103
-
-
Dinesh, N.1
Joshi, A.2
Lee, I.3
Sokolsky, O.4
-
20
-
-
38049083819
-
Obligations and their interaction with programs
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Obligations and their interaction with programs. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 375-389. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 375-389
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
21
-
-
33745754678
-
On-line monitoring of metric temporal logic with time-series constraints using alternating finite automata
-
Drusinsky, D.: On-line monitoring of metric temporal logic with time-series constraints using alternating finite automata. Journal of Universal Computer Science 12(5), 482-498 (2006)
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.5
, pp. 482-498
-
-
Drusinsky, D.1
-
22
-
-
0020191157
-
Horn clauses and database dependencies
-
Fagin, R.: Horn clauses and database dependencies. J. ACM 29(4), 952-985 (1982)
-
(1982)
J. ACM
, vol.29
, Issue.4
, pp. 952-985
-
-
Fagin, R.1
-
24
-
-
84944105044
-
Regulations expressed as logical models (REALM)
-
Proc. of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX). IOS Press, Amsterdam
-
Giblin, C., Liu, A.Y., Müller, S., Pfitzmann, B., Zhou, X.: Regulations expressed as logical models (REALM). In: Proc. of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX). Frontiers Artificial Intelligence Appl., vol. 134, pp. 37-48. IOS Press, Amsterdam (2005)
-
(2005)
Frontiers Artificial Intelligence Appl.
, vol.134
, pp. 37-48
-
-
Giblin, C.1
Liu, A.Y.2
Müller, S.3
Pfitzmann, B.4
Zhou, X.5
-
26
-
-
70350243073
-
Browser-based enforcement of interface contracts in web applications with BeepBeep
-
Bouajjani, A., Maler, O. (eds.) CAV 2009. Springer, Heidelberg
-
Hallé, S., Villemaire, R.: Browser-based enforcement of interface contracts in web applications with BeepBeep. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 648-653. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5643
, pp. 648-653
-
-
Hallé, S.1
Villemaire, R.2
-
28
-
-
33646071594
-
On obligations
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Hilty, M., Basin, D., Pretschner, A.: On obligations. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 98-117. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
29
-
-
38049040380
-
A policy language for distributed usage control
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531-546. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
30
-
-
84896693302
-
Generating online test oracles from temporal logic specifications
-
Håkansson, J., Jonsson, B., Lundqvist, O.: Generating online test oracles from temporal logic specifications. Int. J. Softw. Tools Technol. Trans. 4(4), 456-471 (2003)
-
(2003)
Int. J. Softw. Tools Technol. Trans.
, vol.4
, Issue.4
, pp. 456-471
-
-
Håkansson, J.1
Jonsson, B.2
Lundqvist, O.3
-
31
-
-
34548016799
-
A note on the formalisation of UCON
-
ACM Press, New York
-
Janicke, H., Cau, A., Zedan, H.: A note on the formalisation of UCON. In: Proc. of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 163-168. ACM Press, New York (2007)
-
(2007)
Proc. of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 163-168
-
-
Janicke, H.1
Cau, A.2
Zedan, H.3
-
32
-
-
84957650553
-
Automatic presentations of structures
-
Leivant, D. (ed.) LCC 1994. Springer, Heidelberg
-
Khoussainov, B., Nerode, A.: Automatic presentations of structures. In: Leivant, D. (ed.) LCC 1994. LNCS, vol. 960, pp. 367-392. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.960
, pp. 367-392
-
-
Khoussainov, B.1
Nerode, A.2
-
33
-
-
0001601021
-
Specifying real-time properties with metric temporal logic
-
Koymans, R.: Specifying real-time properties with metric temporal logic. Real-Time Syst. 2(4), 255-299 (1990)
-
(1990)
Real-Time Syst.
, vol.2
, Issue.4
, pp. 255-299
-
-
Koymans, R.1
-
34
-
-
18244404714
-
Runtime verification of timed LTL using disjunctive normalized equation systems
-
Kristoffersen, K.J., Pedersen, C., Andersen, H.R.: Runtime verification of timed LTL using disjunctive normalized equation systems. Elec. Notes Theo. Comput. Sci. 89(2), 1-16 (2003)
-
(2003)
Elec. Notes Theo. Comput. Sci.
, vol.89
, Issue.2
, pp. 1-16
-
-
Kristoffersen, K.J.1
Pedersen, C.2
Andersen, H.R.3
-
36
-
-
85035040046
-
The glory of the past
-
Parikh, R. (ed.) Logic of Programs 1985. Springer, Heidelberg
-
Lichtenstein, O., Pnueli, A., Zuck, L.D.: The glory of the past. In: Parikh, R. (ed.) Logic of Programs 1985. LNCS, vol. 193, pp. 196-218. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.193
, pp. 196-218
-
-
Lichtenstein, O.1
Pnueli, A.2
Zuck, L.D.3
-
37
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1-2), 2-16 (2005)
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
38
-
-
0023532648
-
Monitoring dynamic integrity constraints based on temporal logic
-
Lipeck, U.W., Saake, G.: Monitoring dynamic integrity constraints based on temporal logic. Information Systems 12(3), 255-269 (1987)
-
(1987)
Information Systems
, vol.12
, Issue.3
, pp. 255-269
-
-
Lipeck, U.W.1
Saake, G.2
-
39
-
-
33750335531
-
From MITL to timed automata
-
Asarin, E., Bouyer, P. (eds.) FORMATS 2006. Springer, Heidelberg
-
Maler, O., Nickovic, D., Pnueli, A.: From MITL to timed automata. In: Asarin, E., Bouyer, P. (eds.) FORMATS 2006. LNCS, vol. 4202, pp. 274-289. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4202
, pp. 274-289
-
-
Maler, O.1
Nickovic, D.2
Pnueli, A.3
-
40
-
-
38149086757
-
AMT: A property-based monitoring tool for analog systems
-
Raskin, J.-F., Thiagarajan, P.S. (eds.) FORMATS 2007. Springer, Heidelberg
-
Nickovic, D., Maler, O.: AMT: A property-based monitoring tool for analog systems. In: Raskin, J.-F., Thiagarajan, P.S. (eds.) FORMATS 2007. LNCS, vol. 4763, pp. 304-319. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4763
, pp. 304-319
-
-
Nickovic, D.1
Maler, O.2
-
41
-
-
26444570266
-
The Orchids intrusion detection tool
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
Olivain, J., Goubault-Larrecq, J.: The Orchids intrusion detection tool. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 286-290. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 286-290
-
-
Olivain, J.1
Goubault-Larrecq, J.2
-
44
-
-
17444417374
-
Rewriting-based techniques for runtime verification
-
Roşu, G., Havelund, K.: Rewriting-based techniques for runtime verification. Automat. Softw. Eng. 12(2), 151-197 (2005)
-
(2005)
Automat. Softw. Eng.
, vol.12
, Issue.2
, pp. 151-197
-
-
Roşu, G.1
Havelund, K.2
-
47
-
-
33646578742
-
Run-time checking of dynamic properties
-
Sokolsky, O., Sammapun, U., Lee, I., Kim, J.: Run-time checking of dynamic properties. Elec. Notes Theo. Comput. Sci. 144(4), 91-108 (2006)
-
(2006)
Elec. Notes Theo. Comput. Sci.
, vol.144
, Issue.4
, pp. 91-108
-
-
Sokolsky, O.1
Sammapun, U.2
Lee, I.3
Kim, J.4
-
48
-
-
77952935871
-
Temporal assertions with parameterized propositions
-
to appear
-
Stolz, V.: Temporal assertions with parameterized propositions. J. Logic Comput. (to appear)
-
J. Logic Comput.
-
-
Stolz, V.1
-
49
-
-
11344251138
-
Monitoring algorithms for metric temporal logic specifications
-
Thati, P., Roşu, G.: Monitoring algorithms for metric temporal logic specifications. Elec. Notes Theo. Comput. Sci. 113, 145-162 (2005)
-
(2005)
Elec. Notes Theo. Comput. Sci.
, vol.113
, pp. 145-162
-
-
Thati, P.1
Roşu, G.2
-
50
-
-
59149092460
-
From philosophical to industrial logics
-
Ramanujam, R., Sarukkai, S. (eds.) ICLA 2009. Springer, Heidelberg
-
Vardi, M.Y.: From philosophical to industrial logics. In: Ramanujam, R., Sarukkai, S. (eds.) ICLA 2009. LNCS (LNAI), vol. 5378, pp. 89-115. Springer, Heidelberg (2009)
-
(2009)
LNCS (LNAI)
, vol.5378
, pp. 89-115
-
-
Vardi, M.Y.1
-
51
-
-
33745450500
-
Formal model and policy specification of usage control
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inform. Syst. Secur. 8(4), 351-387 (2005)
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|