-
1
-
-
66849138438
-
Composing expressive runtime security policies
-
Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Trans. Softw. Eng. Methodol. 18(3), 9 (2009)
-
(2009)
ACM Trans. Softw. Eng. Methodol
, vol.18
, Issue.3
, pp. 9
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
2
-
-
84926661463
-
Shield synthesis: Runtime enforcement for reactive systems
-
Baier, C., Tinelli, C. (eds.), Springer, Heidelberg
-
Bloem, R., Könighofer, B., Könighofer, R., Wang, C.: Shield synthesis: runtime enforcement for reactive systems. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 533–548. Springer, Heidelberg (2015)
-
(2015)
TACAS 2015. LNCS
, vol.9035
, pp. 533-548
-
-
Bloem, R.1
Könighofer, B.2
Könighofer, R.3
Wang, C.4
-
3
-
-
0024943291
-
Compositional model checking
-
Proceedings
-
Clarke, E., Long, D., McMillan, K.: Compositional model checking. In: 1989 Fourth Annual Symposium on Logic in Computer Science, LICS 1989, Proceedings., pp. 353–362 (1989)
-
(1989)
1989 Fourth Annual Symposium on Logic in Computer Science, LICS 1989
, pp. 353-362
-
-
Clarke, E.1
Long, D.2
McMillan, K.3
-
4
-
-
84922337866
-
Runtime verification of component-based systems in the BIP framework with formally-proved sound and complete instrumentation
-
Falcone, Y., Jaber, M., Nguyen, T.H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems in the BIP framework with formally-proved sound and complete instrumentation. Softw. Syst. Model. 14(1), 173–199 (2015)
-
(2015)
Softw. Syst. Model
, vol.14
, Issue.1
, pp. 173-199
-
-
Falcone, Y.1
Jaber, M.2
Nguyen, T.H.3
Bozga, M.4
Bensalem, S.5
-
5
-
-
79960012024
-
Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
-
Falcone, Y., Mounier, L., Fernandez, J.C., Richier, J.L.: Runtime enforcement monitors: composition, synthesis, and enforcement abilities. FMSD 38(3), 223–262 (2011)
-
(2011)
FMSD
, vol.38
, Issue.3
, pp. 223-262
-
-
Falcone, Y.1
Mounier, L.2
Fernandez, J.C.3
Richier, J.L.4
-
6
-
-
84977876627
-
Runtime enforcement of regular timed properties by suppressing and delaying events
-
Falcone, Y., Jéron, T., Marchand, H., Pinisetty, S.: Runtime enforcement of regular timed properties by suppressing and delaying events. Sci. Comput. Program. 123, 2–41 (2016)
-
(2016)
Sci. Comput. Program
, vol.123
, pp. 2-41
-
-
Falcone, Y.1
Jéron, T.2
Marchand, H.3
Pinisetty, S.4
-
9
-
-
70350630639
-
Compositional synthesis of reactive systems from live sequence chart specifications
-
Kowalewski, S., Philippou, A. (eds.), Springer, Heidelberg
-
Kugler, H., Segall, I.: Compositional synthesis of reactive systems from live sequence chart specifications. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 77–91. Springer, Heidelberg (2009)
-
(2009)
TACAS 2009. LNCS
, vol.5505
, pp. 77-91
-
-
Kugler, H.1
Segall, I.2
-
10
-
-
18944373357
-
Combining monitors for runtime system verification
-
runtime Verification
-
Levy, J., Saïdi, H., Uribe, T.E.: Combining monitors for runtime system verification. Electron. Notes Theor. Comput. Sci. 70(4), 112–127 (2002). runtime Verification
-
(2002)
Electron. Notes Theor. Comput. Sci
, vol.70
, Issue.4
, pp. 112-127
-
-
Levy, J.1
Saïdi, H.2
Uribe, T.E.3
-
11
-
-
60349103393
-
Run-time enforcement of non safety policies
-
Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of non safety policies. ACM Trans. Inf. Syst. Secur. 12(3), 19:1–19:41 (2009)
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.3
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
12
-
-
84911997255
-
Runtime enforcement of timed properties revisited
-
Pinisetty, S., Falcone, Y., Jéron, T., Marchand, H., Rollet, A., Nguena Timo, O.: Runtime enforcement of timed properties revisited. FMSD 45(3), 381–422 (2014)
-
(2014)
FMSD
, vol.45
, Issue.3
, pp. 381-422
-
-
Pinisetty, S.1
Falcone, Y.2
Jéron, T.3
Marchand, H.4
Rollet, A.5
Nguena Timo, O.6
-
13
-
-
85075102803
-
Predictive runtime enforcement
-
ACM
-
Pinisetty, S., Preoteasa, V., Tripakis, S., Jéron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. In: Symposium on Applied Computing (SACSVT). ACM (2016)
-
(2016)
Symposium on Applied Computing (SACSVT)
-
-
Pinisetty, S.1
Preoteasa, V.2
Tripakis, S.3
Jéron, T.4
Falcone, Y.5
Marchand, H.6
-
14
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
|