Runtime enforcement monitors: composition, synthesis, and enforcement abilities
Top Cited Papers
Open Access
- 11 March 2011
- journal article
- Published by Springer Science and Business Media LLC in Formal Methods in System Design
- Vol. 38 (3), 223-262
- https://doi.org/10.1007/s10703-011-0114-4
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- A brief account of runtime verificationThe Journal of Logic and Algebraic Programming, 2009
- Run-Time Enforcement of Nonsafety PoliciesACM Transactions on Information and System Security, 2009
- Computability classes for enforcement mechanismsACM Transactions on Programming Languages and Systems, 2006
- Enforcing Non-safety Security Policies with Program MonitorsLecture Notes in Computer Science, 2005
- Access control by tracking shallow execution historyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- Characterization of temporal property classesLecture Notes in Computer Science, 1992
- A hierarchy of temporal propertiesPublished by Association for Computing Machinery (ACM) ,1987
- Defining livenessInformation Processing Letters, 1985
- Proving the Correctness of Multiprocess ProgramsIEEE Transactions on Software Engineering, 1977