-
1
-
-
33746373966
-
Preserving secrecy under refinement. In: Proc. of the 33rd Internat. Colloq. on Automata, Languages and Programming (ICALP 06), volume 4052 of Lecture Notes in Computer Science, Springer
-
Alur R, Zdancewic S (2006) Preserving secrecy under refinement. In: Proc. of the 33rd Internat. Colloq. on Automata, Languages and Programming (ICALP 06), volume 4052 of Lecture Notes in Computer Science, Springer, pp 107–118
-
(2006)
pp 107–118
-
-
Alur, R.1
Zdancewic, S.2
-
2
-
-
35948973608
-
Concurrent secrets
-
http: //dx.doi.org/10.1007/s10626-007-0020-5
-
Badouel E, Bednarczyk M, Borzyszkowski A, Caillaud B, Darondeau P (2007) Concurrent secrets. Discret Event Dyn Syst 17 (4): 425–446. 10.1007/s10626-007-0020-5
-
(2007)
Discret Event Dyn Syst
, vol.17
, Issue.4
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
3
-
-
54549090072
-
Opacity generalised to transition systems
-
Bryans J, Koutny M, Mazaré L, Ryan PYA (2008) Opacity generalised to transition systems. Int J Inf Secur 7 (6): 421–435
-
(2008)
Int J Inf Secur
, vol.7
, Issue.6
, pp. 421-435
-
-
Bryans, J.1
Koutny, M.2
Mazaré, L.3
Ryan, P.Y.A.4
-
5
-
-
71549125929
-
Dynamic observers for the synthesis of opaque systems. In: ATVA’09: 7th international symposium on automated technology for verification and analysis
-
Cassez F, Dubreil J, Marchand H (2009) Dynamic observers for the synthesis of opaque systems. In: ATVA’09: 7th international symposium on automated technology for verification and analysis, pp 352–367
-
(2009)
pp 352–367
-
-
Cassez, F.1
Dubreil, J.2
Marchand, H.3
-
6
-
-
84880922388
-
Monitoring and supervisory control for opacity properties. Ph.D
-
Dubreil J (2009) Monitoring and supervisory control for opacity properties. Ph.D. Thesis, Université de Rennes 1
-
(2009)
Thesis, Université de Rennes
, pp. 1
-
-
Dubreil, J.1
-
7
-
-
84955199515
-
Marchand H (2009) Monitoring confidentiality by diagnosis techniques
-
Budapest, Hungary
-
Dubreil J, Jéron T, Marchand H (2009) Monitoring confidentiality by diagnosis techniques. In: European control conference. Budapest, Hungary, pp 2584–2590
-
European control conference
, pp. 2584-2590
-
-
Dubreil, J.1
Jéron, T.2
-
9
-
-
78650166523
-
Barringer H, Falcone Y, Finkbeiner B, Havelund K, Lee I, Pace GJ, Rosu G, Sokolsky O, Tillmann N (eds) Lecture Notes in Computer Science. RV
-
Falcone Y You should better enforce than verify. In: Barringer H, Falcone Y, Finkbeiner B, Havelund K, Lee I, Pace GJ, Rosu G, Sokolsky O, Tillmann N (eds) Lecture Notes in Computer Science. RV, Springer, vol 6418, pp 89–105
-
Springer
, vol.6418
, pp. 89-105
-
-
Falcone, Y.1
-
10
-
-
85018095831
-
TAKOS: a java toolbox for the analysis of K-Opacity of systems
-
Falcone Y, Marchand H (2010a) TAKOS: a java toolbox for the analysis of K-Opacity of systems. Available at http://toolboxopacity.gforge.inria.fr
-
(2010)
Available at
-
-
Falcone, Y.1
Marchand, H.2
-
11
-
-
84874222510
-
Various notions of opacity verified and enforced at runtime. Tech. Rep. 7349
-
Falcone Y, Marchand H (2010b) Various notions of opacity verified and enforced at runtime. Tech. Rep. 7349, INRIA
-
(2010)
INRIA
-
-
Falcone, Y.1
Marchand, H.2
-
12
-
-
85128527769
-
Runtime enforcement of k-step opacity. In: Proceedings of the 52nd conference on decision and control
-
Falcone Y, Marchand H (2013) Runtime enforcement of k-step opacity. In: Proceedings of the 52nd conference on decision and control. IEEE
-
(2013)
IEEE
-
-
Falcone, Y.1
Marchand, H.2
-
13
-
-
58649088214
-
Synthesizing enforcement monitors wrt. the safety-progress classification of properties
-
Sekar R, Pujari AK, (eds), ICISS, Springer
-
Falcone Y, Fernandez JC, Mounier L (2008) Synthesizing enforcement monitors wrt. the safety-progress classification of properties. In: Sekar R, Pujari AK (eds) Lecture notes in computer science, 5352. ICISS, Springer, pp 41–55
-
(2008)
Lecture notes in computer science, 5352
, pp. 41-55
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
14
-
-
70549102701
-
Enforcement monitoring wrt. the safety-progress classification of properties
-
ACM symposium on Applied Computing, ACM
-
Falcone Y, Fernandez JC, Mounier L (2009a) Enforcement monitoring wrt. the safety-progress classification of properties. In: SAC’09: Proceedings of the 2009 ACM symposium on Applied Computing, ACM, pp 593–600
-
(2009)
SAC’09: Proceedings of the
, vol.2009
, pp. 593-600
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
15
-
-
70549106238
-
Runtime verification of safety-progress properties. In: RV’09: Proceedings of the 9th workshop on runtime verification. Revised selected Papers
-
Falcone Y, Fernandez JC, Mounier L (2009b) Runtime verification of safety-progress properties. In: RV’09: Proceedings of the 9th workshop on runtime verification. Revised selected Papers, pp 40–59
-
(2009)
pp 40–59
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
16
-
-
79960012024
-
Runtime enforcement monitors: composition, synthesis, and enforcement abilities
-
Falcone Y, Mounier L, Fernandez JC, Richier JL (2011) Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Form Methods Syst Des 38 (3): 223–262
-
(2011)
Form Methods Syst Des
, vol.38
, Issue.3
, pp. 223-262
-
-
Falcone, Y.1
Mounier, L.2
Fernandez, J.C.3
Richier, J.L.4
-
17
-
-
85028106755
-
What can you verify and enforce at runtime?
-
Falcone Y, Fernandez JC, Mounier L (2012) What can you verify and enforce at runtime? STTT 14 (3): 349–382
-
(2012)
STTT
, vol.14
, Issue.3
, pp. 349-382
-
-
Falcone, Y.1
Fernandez, J.C.2
Mounier, L.3
-
18
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
http://doi.acm.org/10.1145/1111596.1111601
-
Hamlen KW, Morrisett G, Schneider FB (2006) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28 (1): 175–205. http://doi.acm.org/10.1145/1111596.1111601
-
(2006)
ACM Trans Program Lang Syst
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
19
-
-
84885619076
-
Verify your runs. In: VSTTE’05: verified software: theories, tools, experiments: first IFIP TC 2/WG 2.3 conference, revised selected papers and discussions
-
Havelund K, Goldberg A (2008) Verify your runs. In: VSTTE’05: verified software: theories, tools, experiments: first IFIP TC 2/WG 2.3 conference, revised selected papers and discussions, pp 374–383
-
(2008)
pp 374–383
-
-
Havelund, K.1
Goldberg, A.2
-
21
-
-
67349182373
-
A brief account of runtime verification
-
Leucker M, Schallhart C (2008) A brief account of runtime verification. J Logic Algebraic Program 78 (5): 293–303
-
(2008)
J Logic Algebraic Program
, vol.78
, Issue.5
, pp. 293-303
-
-
Leucker, M.1
Schallhart, C.2
-
22
-
-
33646066871
-
Enforcing non-safety security policies with program monitors. In: ESORICS
-
Ligatti J, Bauer L, Walker D (2005) Enforcing non-safety security policies with program monitors. In: ESORICS, pp 355–373
-
(2005)
pp 355–373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
23
-
-
60349103393
-
Run-time enforcement of nonsafety policies
-
http://doi.acm.org/10.1145/1455526.1455532
-
Ligatti J, Bauer L, Walker D (2009) Run-time enforcement of nonsafety policies. ACM Trans Inf Syst Secur 12 (3): 1–41. http://doi.acm.org/10.1145/1455526.1455532
-
(2009)
ACM Trans Inf Syst Secur
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
24
-
-
70549090132
-
Automatic testing of access control for security properties
-
Marchand H, Dubreil J, Jéron T (2009) Automatic testing of access control for security properties. In: TestCom’09, Springer-Verlag, LNCS, vol 5826, pp 113–128
-
(2009)
TestCom’09, Springer-Verlag, LNCS
, vol.5826
, pp. 113-128
-
-
Marchand, H.1
Dubreil, J.2
Jéron, T.3
-
25
-
-
33749421226
-
PSL model checking and run-time verification via testers. In: FM’06: proceedings of formal methods
-
Pnueli A, Zaks A (2006) PSL model checking and run-time verification via testers. In: FM’06: proceedings of formal methods, pp 573–586
-
(2006)
pp 573–586
-
-
Pnueli, A.1
Zaks, A.2
-
26
-
-
62749155695
-
Notions of security and opacity in discrete event systems. In: CDC’07: 46th IEEE Conf. Decision and Control
-
Saboori A, Hadjicostis CN (2007) Notions of security and opacity in discrete event systems. In: CDC’07: 46th IEEE Conf. Decision and Control, pp 5056–5061
-
(2007)
pp 5056–5061
-
-
Saboori, A.1
Hadjicostis, C.N.2
-
27
-
-
84942995982
-
-
Verification of infinite-step opacity and analysis of its complexity. In, Dependable control of discrete systems
-
Saboori A, Hadjicostis CN (2009) Verification of infinite-step opacity and analysis of its complexity. In: Dependable control of discrete systems
-
(2009)
Hadjicostis CN
-
-
Saboori, A.1
-
28
-
-
79960119043
-
Verification of k-step opacity and analysis of its complexity
-
Saboori A, Hadjicostis CN (2011) Verification of k-step opacity and analysis of its complexity. IEEE Trans Autom Sci Eng 8 (3): 549–559
-
(2011)
IEEE Trans Autom Sci Eng
, vol.8
, Issue.3
, pp. 549-559
-
-
Saboori, A.1
Hadjicostis, C.N.2
-
29
-
-
84860457127
-
Opacity-enforcing supervisory strategies via state estimator constructions
-
Saboori A, Hadjicostis CN (2012) Opacity-enforcing supervisory strategies via state estimator constructions. IEEE Trans Autom Control 57 (5): 1155–1165
-
(2012)
IEEE Trans Autom Control
, vol.57
, Issue.5
, pp. 1155-1165
-
-
Saboori, A.1
Hadjicostis, C.N.2
-
30
-
-
84879786049
-
Verification of initial-state opacity in security applications of discrete event systems
-
Saboori A, Hadjicostis CN (2013) Verification of initial-state opacity in security applications of discrete event systems. Inf Sci 246: 115–132
-
(2013)
Inf Sci
, vol.246
, pp. 115-132
-
-
Saboori, A.1
Hadjicostis, C.N.2
-
31
-
-
84881225236
-
Enforceable security policies
-
Schneider FB (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3 (1): 30–50
-
(2000)
ACM Trans Inf Syst Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
33
-
-
70449682552
-
A formula for the supremal controllable and opaque sublanguage arising in supervisory control
-
Takai S, Oka Y (2008) A formula for the supremal controllable and opaque sublanguage arising in supervisory control. SICE J Control Meas, Syst Integr 1 (4): 307–312
-
(2008)
SICE J Control Meas, Syst Integr
, vol.1
, Issue.4
, pp. 307-312
-
-
Takai, S.1
Oka, Y.2
-
34
-
-
84874238258
-
Enforcement of opacity properties using insertion functions. In: 51st IEEE Conf. on Decision and Contr
-
Wu Y, Lafortune S (2012) Enforcement of opacity properties using insertion functions. In: 51st IEEE Conf. on Decision and Contr., pp 6722–6728
-
(2012)
pp 6722–6728
-
-
Wu, Y.1
Lafortune, S.2
|