A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994. ,
DOI : 10.1016/0304-3975(94)90010-8
Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011. ,
DOI : 10.1007/s10207-011-0137-2
URL : http://eprints.biblio.unitn.it/1449/1/techRep033.pdf
You Should Better Enforce Than Verify, Runtime Verification, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-16612-9_9
URL : https://hal.archives-ouvertes.fr/hal-00523653
What can you verify and enforce at runtime? STTT, pp.349-382, 2012. ,
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1007/s10703-011-0114-4
URL : https://hal.archives-ouvertes.fr/hal-00576948
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007. ,
DOI : 10.1016/j.entcs.2007.03.025
Runtime Enforcement of Timed Properties, Runtime Verification, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Foundations for the Run-Time Monitoring of Reactive Systems ??? Fundamentals of the MaC Language, ICTAC, LNCS, pp.543-556, 2004. ,
DOI : 10.1007/978-3-540-31862-0_38