R. Alur and S. Zdancewic, Preserving Secrecy Under Refinement, Proc. of the 33rd Internat, pp.107-118, 2006.
DOI : 10.1007/11787006_10

E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, P. Darondeau et al., Concurrent secrets. Discrete Event Dynamic Systems, pp.425-446, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00070249

J. Bryans, M. Koutny, L. Mazaré, and P. Ryan, Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008.
DOI : 10.1007/s10207-008-0058-x

C. Cassandras and S. Lafortune, Introduction to Discrete Event Systems, 2006.

F. Cassez, J. Dubreil, and H. Marchand, Dynamic Observers for the Synthesis of Opaque Systems, ATVA'09: 7 th International Symposium on Automated Technology for Verification and Analysis, pp.352-367, 2009.
DOI : 10.1007/978-3-642-04761-9_26

URL : https://hal.archives-ouvertes.fr/inria-00396442

J. Dubreil, Monitoring and supervisory control for opacity properties, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00461306

J. Dubreil, T. Jéron, and H. Marchand, Monitoring confidentiality by diagnosis techniques, European Control Conference, pp.2584-2590, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00420420

J. Dubreil, P. Darondeau, and H. Marchand, Supervisory Control for Opacity, IEEE Transactions on Automatic Control, vol.55, issue.5, pp.1089-1100, 2010.
DOI : 10.1109/TAC.2010.2042008

URL : https://hal.archives-ouvertes.fr/inria-00360186

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Lecture Notes in Computer Science, vol.6418, pp.89-105, 2010.
DOI : 10.1007/978-3-642-16612-9_9

URL : https://hal.archives-ouvertes.fr/hal-00523653

Y. Falcone and H. Marchand, TAKOS: a Java Toolbox for the Analysis of K-Opacity of Systems Available at http://toolboxopacity.gforge.inria.fr Falcone Y, Marchand H (2010b) Various notions of opacity verified and enforced at runtime, 2010.

Y. Falcone and H. Marchand, Runtime enforcement of K-step opacity, 52nd IEEE Conference on Decision and Control, 2013.
DOI : 10.1109/CDC.2013.6761043

URL : https://hal.archives-ouvertes.fr/hal-00863223

Y. Falcone, J. Fernandez, and L. Mounier, Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, 2008.
DOI : 10.1145/298595.298598

URL : https://hal.archives-ouvertes.fr/hal-00346063

Y. Falcone, J. Fernandez, and L. Mounier, Enforcement monitoring wrt. the safety-progress classification of properties, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.593-600, 2009.
DOI : 10.1145/1529282.1529408

URL : https://hal.archives-ouvertes.fr/hal-00953590

Y. Falcone, J. Fernandez, and L. Mounier, Runtime verification of safetyprogress properties, RV'09: Proceedings of the 9 th Workshop on Runtime Verification, pp.40-59, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00420487

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1007/s10703-011-0114-4

URL : https://hal.archives-ouvertes.fr/hal-00576948

Y. Falcone, J. Fernandez, and L. Mounier, What can you verify and enforce at runtime? STTT, pp.349-382, 2012.
DOI : 10.1007/s10009-011-0196-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Hamlen, G. Morrisett, and F. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Havelund and A. Goldberg, Verify Your Runs, VSTTE'05: Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, Revised Selected Papers and Discussions, pp.374-383, 2008.
DOI : 10.1007/11494881_14

K. Havelund and G. Rosu, Efficient monitoring of safety properties Software Tools and Technology Transfer Leucker M, Schallhart C (2008) A brief account of runtime verification, Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2002.

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, pp.355-373, 2005.
DOI : 10.1007/11555827_21

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-41, 2009.
DOI : 10.1145/1455526.1455532

H. Marchand, J. Dubreil, and T. Jéron, Automatic Testing of Access Control for Security Properties, LNCS, vol.3, issue.1, pp.113-128, 2009.
DOI : 10.1007/3-540-48320-9_6

URL : https://hal.archives-ouvertes.fr/inria-00420424

A. Pnueli and A. Zaks, PSL Model Checking and Run-Time Verification Via Testers, FM'06: Proceedings of Formal Methods, pp.573-586, 2006.
DOI : 10.1007/11813040_38

A. Saboori and C. Hadjicostis, Notions of security and opacity in discrete event systems, 2007 46th IEEE Conference on Decision and Control, pp.5056-5061, 2007.
DOI : 10.1109/CDC.2007.4434515

A. Saboori and C. Hadjicostis, Verification of Infinite-Step Opacity and Analysis of its Complexity*, IFAC Proceedings Volumes, vol.42, issue.5, pp.549-559, 2009.
DOI : 10.3182/20090610-3-IT-4004.00013

A. Saboori and C. Hadjicostis, Opacity-Enforcing Supervisory Strategies via State Estimator Constructions, IEEE Transactions on Automatic Control, vol.57, issue.5, pp.1155-1165, 2012.
DOI : 10.1109/TAC.2011.2170453

A. Saboori and C. Hadjicostis, Verification of initial-state opacity in security applications of discrete event systems, Information Sciences, vol.246, pp.115-132, 2013.
DOI : 10.1016/j.ins.2013.05.033