R. 1. Bartocci, E. Falcone, Y. Bonakdarpour, B. Colombo, C. Decker et al., First international competition on runtime verification rules, benchmarks, tools, and final results of CSRV 2014, 2017.

D. Basin, V. Jugé, F. Klaedtke, and E. , Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013.
DOI : 10.1145/2487222.2487225

A. Basu, S. Bensalem, M. Bozga, J. Combaz, M. Jaber et al., Rigorous Component-Based System Design Using the BIP Framework, IEEE Software, vol.28, issue.3, pp.41-48, 2011.
DOI : 10.1109/MS.2011.27

URL : https://hal.archives-ouvertes.fr/hal-00722395

L. Bauer, J. Ligatti, and D. Walker, More enforceable security policies, Proceedings of the Workshop on Foundations of Computer Security (FCS'02), 2002.

D. Beauquier, J. Cohen, and R. Lanotte, Security policies enforcement using finite and pushdown edit automata, International Journal of Information Security, vol.3, issue.1, pp.319-336, 2013.
DOI : 10.1016/j.ic.2007.07.009

N. Bielova and F. Massacci, Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011.
DOI : 10.1145/353323.353382

URL : http://eprints.biblio.unitn.it/1449/1/techRep033.pdf

N. Bielova and F. Massacci, Predictability of Enforcement, Engineering Secure Software and Systems -Third International Symposium, ESSoS 2011, pp.73-86, 2011.
DOI : 10.1016/j.ic.2007.07.009

N. Bielova and F. Massacci, Iterative enforcement by suppression: Towards practical enforcement theories*, Journal of Computer Security, vol.20, issue.1, pp.51-79, 2012.
DOI : 10.3233/JCS-2011-0431

R. Bloem, B. Könighofer, R. Könighofer, and C. Wang, Shield Synthesis:, 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.533-548, 2015.
DOI : 10.1007/978-3-662-46681-0_51

H. Chabot, R. Khoury, N. Tawbi, A. Jøsang, T. Maseng et al., Generating in-line monitors for rabin automata Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, pp.14-16, 2009.

E. Chang, Z. Manna, and A. Pnueli, The Safety-Progress Classification, Tech. rep, 1992.
DOI : 10.1007/978-3-642-58041-3_5

H. Charafeddine, K. El-harake, Y. Falcone, M. Jaber, R. L. Wainwright et al., Runtime enforcement for component-based systems, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.1789-1796, 2015.
DOI : 10.1007/3-540-49116-3_3

URL : https://hal.archives-ouvertes.fr/hal-01248353

E. Dolzhenko, J. Ligatti, and S. Reddy, Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015.
DOI : 10.1016/j.ic.2007.07.009

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010.
DOI : 10.1007/978-3-642-04766-4_20

URL : https://hal.archives-ouvertes.fr/hal-00523653

Y. Falcone, J. C. Fernandez, and L. Mounier, Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, Lecture Notes in Computer Science, vol.3, pp.41-55, 2008.
DOI : 10.1145/298595.298598

URL : https://hal.archives-ouvertes.fr/hal-00346063

Y. Falcone, J. C. Fernandez, and L. Mounier, What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012.
DOI : 10.1145/353323.353382

URL : https://hal.archives-ouvertes.fr/hal-00497350

Y. Falcone, K. Havelund, and G. Reger, A tutorial on runtime verification, Engineering Dependable Software Systems, NATO Science for Peace and Security Series, D : Information and Communication Security, pp.141-175, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853727

Y. Falcone and M. Jaber, Fully automated runtime enforcement of component-based systems with formal and sound recovery, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.1-25, 2016.
DOI : 10.1007/3-540-49116-3_3

URL : https://hal.archives-ouvertes.fr/hal-01262658

Y. Falcone, T. Jéron, H. Marchand, and S. Pinisetty, Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016.
DOI : 10.1016/j.scico.2016.02.008

URL : https://hal.archives-ouvertes.fr/hal-01281727

Y. Falcone and H. Marchand, Enforcement and validation (at runtime) of various notions of opacity, Discrete Event Dynamic Systems, vol.1, issue.4, pp.531-570, 2015.
DOI : 10.1109/CDC.2012.6426760

URL : https://hal.archives-ouvertes.fr/hal-00987985

Y. Falcone and H. Marchand, Enforcement and validation (at runtime) of various notions of opacity, Discrete Event Dynamic Systems, vol.1, issue.4, pp.531-570, 2015.
DOI : 10.1109/CDC.2012.6426760

URL : https://hal.archives-ouvertes.fr/hal-00987985

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1145/1273442.1250746

URL : https://hal.archives-ouvertes.fr/hal-00576948

P. W. Fong, Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004.
DOI : 10.1109/SECPRI.2004.1301314

URL : http://www.cs.uregina.ca/~pwlfong/Pub/UR-CS-TR-2003-9.ps

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

URL : http://www.cs.cornell.edu/fbs/publications/EnfClasses.pdf

K. Havelund and A. Goldberg, Verify Your Runs, Lecture Notes in Computer Science, vol.15, issue.4, pp.374-383, 2005.
DOI : 10.1016/S1571-0661(04)81049-1

R. Khoury, S. Hallé, J. García-alfaro, E. Kranakis, and G. Bonfante, Runtime Enforcement with Partial Control, Foundations and Practice of Security -8th International Symposium, FPS 2015, pp.102-116, 2015.
DOI : 10.1007/978-3-319-30303-1_7

URL : http://arxiv.org/pdf/1508.06525

R. Khoury and N. Tawbi, Corrective Enforcement, ACM Transactions on Information and System Security, vol.15, issue.2, pp.1-1027, 2012.
DOI : 10.1145/2240276.2240281

R. Khoury and N. Tawbi, Which security policies are enforceable by runtime monitors? A survey, Computer Science Review, vol.6, issue.1, pp.27-45, 2012.
DOI : 10.1016/j.cosrev.2012.01.001

M. Kim, S. Kannan, I. Lee, O. Sokolsky, and M. Viswanathan, Computational Analysis of Run-time Monitoring, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.80-94, 2002.
DOI : 10.1016/S1571-0661(04)80578-4

M. Leucker and C. Schallhart, A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008.
DOI : 10.1016/j.jlap.2008.08.004

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, Computer Security -ESORICS 2005, 10th European Symposium on Research in Computer Security, pp.355-373, 2005.
DOI : 10.1007/11555827_21

URL : http://www.cs.princeton.edu/~dpw/papers/nonsafety05.pdf

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

J. Ligatti and S. Reddy, A Theory of Runtime Enforcement, with Results, 15th European Symposium on Research in Computer Security, pp.87-100, 2010.
DOI : 10.1007/978-3-642-15497-3_6

F. Martinelli and I. Matteucci, Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007.
DOI : 10.1016/j.entcs.2006.08.029

I. Matteucci, Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007.
DOI : 10.1016/j.entcs.2007.03.025

S. Owicki and L. Lamport, Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.455-495, 1982.
DOI : 10.1145/357172.357178

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, J. Lesage et al., Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, pp.420-427, 2014.
DOI : 10.3182/20140514-3-FR-4046.00041

URL : https://hal.archives-ouvertes.fr/hal-00974548

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014.
DOI : 10.1145/2554850.2554967

URL : https://hal.archives-ouvertes.fr/hal-00907571

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, TiPEX: A Tool Chain for Timed Property Enforcement During eXecution, Runtime Verification -6th International Conference, pp.306-320, 2015.
DOI : 10.1016/j.entcs.2005.10.035

URL : https://hal.archives-ouvertes.fr/hal-01244446

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime Enforcement of Timed Properties, Runtime Verification, Third International Conference, pp.229-244, 2012.
DOI : 10.1007/978-3-642-35632-2_23

URL : https://hal.archives-ouvertes.fr/hal-00743270

S. Pinisetty, V. Preoteasa, S. Tripakis, T. Jéron, Y. Falcone et al., Predictive runtime enforcement, Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp.1628-1633, 2016.
DOI : 10.1145/2851613.2851827

URL : https://hal.archives-ouvertes.fr/hal-01244369

P. J. Ramadge and W. M. Wonham, Supervisory Control of a Class of Discrete Event Processes, SIAM Journal on Control and Optimization, vol.25, issue.1, pp.206-230, 1987.
DOI : 10.1137/0325013

P. J. Ramadge and W. M. Wonham, The control of discrete event systems, Proceedings of the IEEE, vol.77, issue.1, pp.81-98, 1989.
DOI : 10.1109/5.21072

M. Renard, Y. Falcone, A. Rollet, T. Jéron, and H. Marchand, Optimal enforcement of (timed) properties with uncontrollable events, Mathematical Structures in Computer Science, vol.16, pp.1-46, 2017.
DOI : 10.1145/353323.353382

URL : https://hal.archives-ouvertes.fr/hal-01262444

M. Renard, Y. Falcone, A. Rollet, S. Pinisetty, T. Jéron et al., Enforcement of (Timed) Properties with Uncontrollable Events, Proceedings. Lecture Notes in Computer Science, vol.9399, pp.542-560, 2015.
DOI : 10.1007/978-3-319-25150-9_31

URL : https://hal.archives-ouvertes.fr/hal-01185238

M. Renard, A. Rollet, and Y. Falcone, Runtime enforcement using büchi games, Proceedings of Model Checking Software -24th International Symposium, pp.70-79
DOI : 10.1145/3092282.3092296

M. Rinard, R. Crocker, and G. L. Jr, Acceptability-oriented computing, Proceedings of the 2003 ACM SIG- PLAN Conference On Object-Oriented Programming Sytems, Languages, and Applications Companion (OOPSLA 03 COMPANION, pp.221-239, 2003.
DOI : 10.1145/949344.949402

URL : http://dspace.mit.edu/bitstream/1721.1/3846/2/CS002.pdf

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://www.cs.cornell.edu/Info/People/jgm/lang-based-security/schneider.ps

C. Talhi, N. Tawbi, and M. Debbabi, Execution monitoring enforcement under memory-limitation constraints, Information and Computation, vol.206, issue.2-4, pp.158-184, 2008.
DOI : 10.1016/j.ic.2007.07.009

URL : https://doi.org/10.1016/j.ic.2007.07.009

T. Wilke, Classifying Discrete Temporal Properties, STACS. LNCS, pp.32-46, 1999.
DOI : 10.1007/3-540-49116-3_3

URL : http://www-i7.informatik.rwth-aachen.de/~wilke/publications/STACS99.html.ps.gz

M. Wu, H. Zeng, and C. Wang, Synthesizing Runtime Enforcer of Safety Properties Under Burst Error, NASA Formal Methods -8th International Symposium, NFM 2016, pp.65-81, 2016.
DOI : 10.1145/2610384.2610405

X. Zhang, M. Leucker, and W. Dong, Runtime Verification with Predictive Semantics, NASA Formal Methods -4th International Symposium, NFM 2012, pp.418-432, 2012.
DOI : 10.1007/978-3-642-28891-3_37