Shield Synthesis:, TACAS, 2015. ,
DOI : 10.1007/978-3-662-46681-0_51
Introduction to Discrete Event Systems, 2006. ,
Extending the enforcement power of truncation monitors using static analysis, Computers & Security, vol.30, issue.4, pp.194-207, 2011. ,
DOI : 10.1016/j.cose.2010.11.004
Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015. ,
DOI : 10.1007/s10207-014-0239-8
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, Information Systems Security, pp.41-55, 2008. ,
DOI : 10.1145/298595.298598
URL : https://hal.archives-ouvertes.fr/hal-00346063
Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods in System Design, pp.223-262, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00576948
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
Transport and application protocol scrubbing, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1381-1390, 2000. ,
DOI : 10.1109/INFCOM.2000.832535
Isabelle/HOL ? A Proof Assistant for Higher-Order Logic, LNCS, vol.2283, 2002. ,
Runtime enforcement of timed properties revisited. Formal Methods in System Design, pp.381-422, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01088136
On Safety Properties and Their Monitoring, Scientific Annals of Computer Science, vol.22, issue.2, pp.327-365, 2012. ,
DOI : 10.7561/SACS.2012.2.327
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Runtime Verification with Predictive Semantics, NASA Formal Methods -4th International Symposium, pp.418-432, 2012. ,
DOI : 10.1007/978-3-642-28891-3_37