메뉴 건너뛰기




Volumn 38, Issue 3, 2011, Pages 223-262

Runtime enforcement monitors: Composition, synthesis, and enforcement abilities

Author keywords

Composition; Monitor; Monitor synthesis; Runtime enforcement; Safety progress classification

Indexed keywords

CONTROL STATE; ENFORCEMENT MECHANISMS; FINITE SET; MEMORY DEVICE; MONITOR; MONITOR SYNTHESIS; RESPONSE PROPERTIES; RUNTIMES; SAFETY-PROGRESS CLASSIFICATION;

EID: 79960012024     PISSN: 09259856     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10703-011-0114-4     Document Type: Article
Times cited : (130)

References (27)
  • 1
    • 84885619076 scopus 로고    scopus 로고
    • Verify your runs
    • Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, Revised Selected Papers and Discussions, Zurich, Switzerland, October 10-13, 2005
    • Havelund K, Goldberg A (2008) Verify your runs. In: Verified software: theories, tools, experiments: first IFIP TC 2/WG 2.3 conference, revised selected papers and discussions, VSTTE 2005, Zurich, Switzerland, October 10-13, 2005, pp 374-383
    • (2008) VSTTE 2005 , pp. 374-383
    • Havelund, K.1    Goldberg, A.2
  • 2
    • 67349182373 scopus 로고    scopus 로고
    • A brief account of runtime verification
    • Leucker M, Schallhart C (2009) A brief account of runtime verification. J Log Algebr Program 78:293-303
    • (2009) J Log Algebr Program , vol.78 , pp. 293-303
    • Leucker, M.1    Schallhart, C.2
  • 5
    • 0008574347 scopus 로고    scopus 로고
    • PhD thesis, University of Pennsylvania, Philadelphia, PA, USA, Supervisor-Sampath Kannan and Supervisor-Insup Lee
    • ViswanathanM(2000) Foundations for the run-time analysis of software systems. PhD thesis, University of Pennsylvania, Philadelphia, PA, USA, Supervisor-Sampath Kannan and Supervisor-Insup Lee
    • (2000) Foundations for the Run-Time Analysis of Software Systems
    • Viswanathan, M.1
  • 7
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • Ligatti J, Bauer L, Walker D (2005) Enforcing non-safety security policies with program monitors. In: ESORICS, pp 355-373
    • (2005) ESORICS , pp. 355-373
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 8
    • 3543121920 scopus 로고    scopus 로고
    • Access control by tracking shallow execution history
    • IEEE Computer Society Press, Los Alamitos
    • Fong PWL (2004) Access control by tracking shallow execution history. In: Proceedings of the 2004 IEEE symposium on security and privacy. IEEE Computer Society Press, Los Alamitos, pp 43-55
    • (2004) Proceedings of the 2004 IEEE Symposium on Security and Privacy , pp. 43-55
    • Pwl, F.1
  • 11
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport L (1977) Proving the correctness of multiprocess programs. IEEE Trans Softw Eng 3:125-143
    • (1977) IEEE Trans Softw Eng , vol.3 , pp. 125-143
    • Lamport, L.1
  • 13
    • 58649088214 scopus 로고    scopus 로고
    • Synthesizing enforcement monitors wrt the safety-progress classification of properties
    • Sekar R, Pujari AK (eds) ICISS.
    • Falcone Y, Fernandez JC, Mounier L (2008) Synthesizing enforcement monitors wrt the safety-progress classification of properties. In: Sekar R, Pujari AK (eds) ICISS. Lecture notes in computer science, vol 5352, pp 41-55
    • (2008) Lecture Notes in Computer Science , vol.5352 , pp. 41-55
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 16
    • 70549106238 scopus 로고    scopus 로고
    • Runtime verification of safety-progress properties
    • Bensalem S, Peled D (eds) RV. Springer, Berlin
    • Falcone Y, Fernandez JC, Mounier L (2009) Runtime verification of safety-progress properties. In: Bensalem S, Peled D (eds) RV. Lecture notes in computer science, vol 5779. Springer, Berlin, pp 40-59
    • (2009) Lecture Notes in Computer Science , vol.5779 , pp. 40-59
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 21
    • 34347249528 scopus 로고    scopus 로고
    • Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting
    • DOI 10.1016/j.entcs.2007.03.025, PII S1571066107004628
    • Matteucci I (2007) Automated synthesis of enforcing mechanisms for security properties in a timed setting. Electron Notes Theor Comput Sci 186:101-120 (Pubitemid 47001809)
    • (2007) Electronic Notes in Theoretical Computer Science , vol.186 , Issue.SPEC. ISS. , pp. 101-120
    • Matteucci, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.