메뉴 건너뛰기




Volumn 25, Issue 4, 2015, Pages 531-570

Enforcement and validation (at runtime) of various notions of opacity

Author keywords

K step opacity; Opacity; Runtime enforcement; Runtime verification

Indexed keywords

DISCRETE EVENT SIMULATION; SYSTEM THEORY;

EID: 84940919127     PISSN: 09246703     EISSN: 15737594     Source Type: Journal    
DOI: 10.1007/s10626-014-0196-4     Document Type: Article
Times cited : (90)

References (34)
  • 1
    • 33746373966 scopus 로고    scopus 로고
    • Preserving secrecy under refinement. In: Proc. of the 33rd Internat. Colloq. on Automata, Languages and Programming (ICALP 06), volume 4052 of Lecture Notes in Computer Science, Springer
    • Alur R, Zdancewic S (2006) Preserving secrecy under refinement. In: Proc. of the 33rd Internat. Colloq. on Automata, Languages and Programming (ICALP 06), volume 4052 of Lecture Notes in Computer Science, Springer, pp 107–118
    • (2006) pp 107–118
    • Alur, R.1    Zdancewic, S.2
  • 5
    • 71549125929 scopus 로고    scopus 로고
    • Dynamic observers for the synthesis of opaque systems. In: ATVA’09: 7th international symposium on automated technology for verification and analysis
    • Cassez F, Dubreil J, Marchand H (2009) Dynamic observers for the synthesis of opaque systems. In: ATVA’09: 7th international symposium on automated technology for verification and analysis, pp 352–367
    • (2009) pp 352–367
    • Cassez, F.1    Dubreil, J.2    Marchand, H.3
  • 6
    • 84880922388 scopus 로고    scopus 로고
    • Monitoring and supervisory control for opacity properties. Ph.D
    • Dubreil J (2009) Monitoring and supervisory control for opacity properties. Ph.D. Thesis, Université de Rennes 1
    • (2009) Thesis, Université de Rennes , pp. 1
    • Dubreil, J.1
  • 7
    • 84955199515 scopus 로고    scopus 로고
    • Marchand H (2009) Monitoring confidentiality by diagnosis techniques
    • Budapest, Hungary
    • Dubreil J, Jéron T, Marchand H (2009) Monitoring confidentiality by diagnosis techniques. In: European control conference. Budapest, Hungary, pp 2584–2590
    • European control conference , pp. 2584-2590
    • Dubreil, J.1    Jéron, T.2
  • 9
    • 78650166523 scopus 로고    scopus 로고
    • Barringer H, Falcone Y, Finkbeiner B, Havelund K, Lee I, Pace GJ, Rosu G, Sokolsky O, Tillmann N (eds) Lecture Notes in Computer Science. RV
    • Falcone Y You should better enforce than verify. In: Barringer H, Falcone Y, Finkbeiner B, Havelund K, Lee I, Pace GJ, Rosu G, Sokolsky O, Tillmann N (eds) Lecture Notes in Computer Science. RV, Springer, vol 6418, pp 89–105
    • Springer , vol.6418 , pp. 89-105
    • Falcone, Y.1
  • 10
    • 85018095831 scopus 로고    scopus 로고
    • TAKOS: a java toolbox for the analysis of K-Opacity of systems
    • Falcone Y, Marchand H (2010a) TAKOS: a java toolbox for the analysis of K-Opacity of systems. Available at http://toolboxopacity.gforge.inria.fr
    • (2010) Available at
    • Falcone, Y.1    Marchand, H.2
  • 11
    • 84874222510 scopus 로고    scopus 로고
    • Various notions of opacity verified and enforced at runtime. Tech. Rep. 7349
    • Falcone Y, Marchand H (2010b) Various notions of opacity verified and enforced at runtime. Tech. Rep. 7349, INRIA
    • (2010) INRIA
    • Falcone, Y.1    Marchand, H.2
  • 12
    • 85128527769 scopus 로고    scopus 로고
    • Runtime enforcement of k-step opacity. In: Proceedings of the 52nd conference on decision and control
    • Falcone Y, Marchand H (2013) Runtime enforcement of k-step opacity. In: Proceedings of the 52nd conference on decision and control. IEEE
    • (2013) IEEE
    • Falcone, Y.1    Marchand, H.2
  • 13
    • 58649088214 scopus 로고    scopus 로고
    • Synthesizing enforcement monitors wrt. the safety-progress classification of properties
    • Sekar R, Pujari AK, (eds), ICISS, Springer
    • Falcone Y, Fernandez JC, Mounier L (2008) Synthesizing enforcement monitors wrt. the safety-progress classification of properties. In: Sekar R, Pujari AK (eds) Lecture notes in computer science, 5352. ICISS, Springer, pp 41–55
    • (2008) Lecture notes in computer science, 5352 , pp. 41-55
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 14
    • 70549102701 scopus 로고    scopus 로고
    • Enforcement monitoring wrt. the safety-progress classification of properties
    • ACM symposium on Applied Computing, ACM
    • Falcone Y, Fernandez JC, Mounier L (2009a) Enforcement monitoring wrt. the safety-progress classification of properties. In: SAC’09: Proceedings of the 2009 ACM symposium on Applied Computing, ACM, pp 593–600
    • (2009) SAC’09: Proceedings of the , vol.2009 , pp. 593-600
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 15
    • 70549106238 scopus 로고    scopus 로고
    • Runtime verification of safety-progress properties. In: RV’09: Proceedings of the 9th workshop on runtime verification. Revised selected Papers
    • Falcone Y, Fernandez JC, Mounier L (2009b) Runtime verification of safety-progress properties. In: RV’09: Proceedings of the 9th workshop on runtime verification. Revised selected Papers, pp 40–59
    • (2009) pp 40–59
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 16
    • 79960012024 scopus 로고    scopus 로고
    • Runtime enforcement monitors: composition, synthesis, and enforcement abilities
    • Falcone Y, Mounier L, Fernandez JC, Richier JL (2011) Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Form Methods Syst Des 38 (3): 223–262
    • (2011) Form Methods Syst Des , vol.38 , Issue.3 , pp. 223-262
    • Falcone, Y.1    Mounier, L.2    Fernandez, J.C.3    Richier, J.L.4
  • 17
    • 85028106755 scopus 로고    scopus 로고
    • What can you verify and enforce at runtime?
    • Falcone Y, Fernandez JC, Mounier L (2012) What can you verify and enforce at runtime? STTT 14 (3): 349–382
    • (2012) STTT , vol.14 , Issue.3 , pp. 349-382
    • Falcone, Y.1    Fernandez, J.C.2    Mounier, L.3
  • 18
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • http://doi.acm.org/10.1145/1111596.1111601
    • Hamlen KW, Morrisett G, Schneider FB (2006) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28 (1): 175–205. http://doi.acm.org/10.1145/1111596.1111601
    • (2006) ACM Trans Program Lang Syst , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 19
    • 84885619076 scopus 로고    scopus 로고
    • Verify your runs. In: VSTTE’05: verified software: theories, tools, experiments: first IFIP TC 2/WG 2.3 conference, revised selected papers and discussions
    • Havelund K, Goldberg A (2008) Verify your runs. In: VSTTE’05: verified software: theories, tools, experiments: first IFIP TC 2/WG 2.3 conference, revised selected papers and discussions, pp 374–383
    • (2008) pp 374–383
    • Havelund, K.1    Goldberg, A.2
  • 21
    • 67349182373 scopus 로고    scopus 로고
    • A brief account of runtime verification
    • Leucker M, Schallhart C (2008) A brief account of runtime verification. J Logic Algebraic Program 78 (5): 293–303
    • (2008) J Logic Algebraic Program , vol.78 , Issue.5 , pp. 293-303
    • Leucker, M.1    Schallhart, C.2
  • 22
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors. In: ESORICS
    • Ligatti J, Bauer L, Walker D (2005) Enforcing non-safety security policies with program monitors. In: ESORICS, pp 355–373
    • (2005) pp 355–373
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 23
    • 60349103393 scopus 로고    scopus 로고
    • Run-time enforcement of nonsafety policies
    • http://doi.acm.org/10.1145/1455526.1455532
    • Ligatti J, Bauer L, Walker D (2009) Run-time enforcement of nonsafety policies. ACM Trans Inf Syst Secur 12 (3): 1–41. http://doi.acm.org/10.1145/1455526.1455532
    • (2009) ACM Trans Inf Syst Secur , vol.12 , Issue.3 , pp. 1-41
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 25
    • 33749421226 scopus 로고    scopus 로고
    • PSL model checking and run-time verification via testers. In: FM’06: proceedings of formal methods
    • Pnueli A, Zaks A (2006) PSL model checking and run-time verification via testers. In: FM’06: proceedings of formal methods, pp 573–586
    • (2006) pp 573–586
    • Pnueli, A.1    Zaks, A.2
  • 26
    • 62749155695 scopus 로고    scopus 로고
    • Notions of security and opacity in discrete event systems. In: CDC’07: 46th IEEE Conf. Decision and Control
    • Saboori A, Hadjicostis CN (2007) Notions of security and opacity in discrete event systems. In: CDC’07: 46th IEEE Conf. Decision and Control, pp 5056–5061
    • (2007) pp 5056–5061
    • Saboori, A.1    Hadjicostis, C.N.2
  • 27
    • 84942995982 scopus 로고    scopus 로고
    • Verification of infinite-step opacity and analysis of its complexity. In, Dependable control of discrete systems
    • Saboori A, Hadjicostis CN (2009) Verification of infinite-step opacity and analysis of its complexity. In: Dependable control of discrete systems
    • (2009) Hadjicostis CN
    • Saboori, A.1
  • 28
    • 79960119043 scopus 로고    scopus 로고
    • Verification of k-step opacity and analysis of its complexity
    • Saboori A, Hadjicostis CN (2011) Verification of k-step opacity and analysis of its complexity. IEEE Trans Autom Sci Eng 8 (3): 549–559
    • (2011) IEEE Trans Autom Sci Eng , vol.8 , Issue.3 , pp. 549-559
    • Saboori, A.1    Hadjicostis, C.N.2
  • 29
    • 84860457127 scopus 로고    scopus 로고
    • Opacity-enforcing supervisory strategies via state estimator constructions
    • Saboori A, Hadjicostis CN (2012) Opacity-enforcing supervisory strategies via state estimator constructions. IEEE Trans Autom Control 57 (5): 1155–1165
    • (2012) IEEE Trans Autom Control , vol.57 , Issue.5 , pp. 1155-1165
    • Saboori, A.1    Hadjicostis, C.N.2
  • 30
    • 84879786049 scopus 로고    scopus 로고
    • Verification of initial-state opacity in security applications of discrete event systems
    • Saboori A, Hadjicostis CN (2013) Verification of initial-state opacity in security applications of discrete event systems. Inf Sci 246: 115–132
    • (2013) Inf Sci , vol.246 , pp. 115-132
    • Saboori, A.1    Hadjicostis, C.N.2
  • 31
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider FB (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3 (1): 30–50
    • (2000) ACM Trans Inf Syst Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 33
    • 70449682552 scopus 로고    scopus 로고
    • A formula for the supremal controllable and opaque sublanguage arising in supervisory control
    • Takai S, Oka Y (2008) A formula for the supremal controllable and opaque sublanguage arising in supervisory control. SICE J Control Meas, Syst Integr 1 (4): 307–312
    • (2008) SICE J Control Meas, Syst Integr , vol.1 , Issue.4 , pp. 307-312
    • Takai, S.1    Oka, Y.2
  • 34
    • 84874238258 scopus 로고    scopus 로고
    • Enforcement of opacity properties using insertion functions. In: 51st IEEE Conf. on Decision and Contr
    • Wu Y, Lafortune S (2012) Enforcement of opacity properties using insertion functions. In: 51st IEEE Conf. on Decision and Contr., pp 6722–6728
    • (2012) pp 6722–6728
    • Wu, Y.1    Lafortune, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.