First international competition on runtime verification rules, benchmarks, tools, and final results of CSRV 2014, 2017. ,
Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013. ,
DOI : 10.1145/2487222.2487225
Rigorous Component-Based System Design Using the BIP Framework, IEEE Software, vol.28, issue.3, pp.41-48, 2011. ,
DOI : 10.1109/MS.2011.27
URL : https://hal.archives-ouvertes.fr/hal-00722395
More enforceable security policies, Proceedings of the Workshop on Foundations of Computer Security (FCS'02), 2002. ,
Security policies enforcement using finite and pushdown edit automata, International Journal of Information Security, vol.3, issue.1, pp.319-336, 2013. ,
DOI : 10.1016/j.ic.2007.07.009
Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011. ,
DOI : 10.1145/353323.353382
URL : http://eprints.biblio.unitn.it/1449/1/techRep033.pdf
Predictability of Enforcement, Engineering Secure Software and Systems -Third International Symposium, ESSoS 2011, pp.73-86, 2011. ,
DOI : 10.1016/j.ic.2007.07.009
Iterative enforcement by suppression: Towards practical enforcement theories*, Journal of Computer Security, vol.20, issue.1, pp.51-79, 2012. ,
DOI : 10.3233/JCS-2011-0431
Shield Synthesis:, 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.533-548, 2015. ,
DOI : 10.1007/978-3-662-46681-0_51
Generating in-line monitors for rabin automata Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, pp.14-16, 2009. ,
The Safety-Progress Classification, Tech. rep, 1992. ,
DOI : 10.1007/978-3-642-58041-3_5
Runtime enforcement for component-based systems, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.1789-1796, 2015. ,
DOI : 10.1007/3-540-49116-3_3
URL : https://hal.archives-ouvertes.fr/hal-01248353
Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015. ,
DOI : 10.1016/j.ic.2007.07.009
You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-04766-4_20
URL : https://hal.archives-ouvertes.fr/hal-00523653
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, Lecture Notes in Computer Science, vol.3, pp.41-55, 2008. ,
DOI : 10.1145/298595.298598
URL : https://hal.archives-ouvertes.fr/hal-00346063
What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012. ,
DOI : 10.1145/353323.353382
URL : https://hal.archives-ouvertes.fr/hal-00497350
A tutorial on runtime verification, Engineering Dependable Software Systems, NATO Science for Peace and Security Series, D : Information and Communication Security, pp.141-175, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853727
Fully automated runtime enforcement of component-based systems with formal and sound recovery, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.1-25, 2016. ,
DOI : 10.1007/3-540-49116-3_3
URL : https://hal.archives-ouvertes.fr/hal-01262658
Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016. ,
DOI : 10.1016/j.scico.2016.02.008
URL : https://hal.archives-ouvertes.fr/hal-01281727
Enforcement and validation (at runtime) of various notions of opacity, Discrete Event Dynamic Systems, vol.1, issue.4, pp.531-570, 2015. ,
DOI : 10.1109/CDC.2012.6426760
URL : https://hal.archives-ouvertes.fr/hal-00987985
Enforcement and validation (at runtime) of various notions of opacity, Discrete Event Dynamic Systems, vol.1, issue.4, pp.531-570, 2015. ,
DOI : 10.1109/CDC.2012.6426760
URL : https://hal.archives-ouvertes.fr/hal-00987985
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1145/1273442.1250746
URL : https://hal.archives-ouvertes.fr/hal-00576948
Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004. ,
DOI : 10.1109/SECPRI.2004.1301314
URL : http://www.cs.uregina.ca/~pwlfong/Pub/UR-CS-TR-2003-9.ps
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
URL : http://www.cs.cornell.edu/fbs/publications/EnfClasses.pdf
Verify Your Runs, Lecture Notes in Computer Science, vol.15, issue.4, pp.374-383, 2005. ,
DOI : 10.1016/S1571-0661(04)81049-1
Runtime Enforcement with Partial Control, Foundations and Practice of Security -8th International Symposium, FPS 2015, pp.102-116, 2015. ,
DOI : 10.1007/978-3-319-30303-1_7
URL : http://arxiv.org/pdf/1508.06525
Corrective Enforcement, ACM Transactions on Information and System Security, vol.15, issue.2, pp.1-1027, 2012. ,
DOI : 10.1145/2240276.2240281
Which security policies are enforceable by runtime monitors? A survey, Computer Science Review, vol.6, issue.1, pp.27-45, 2012. ,
DOI : 10.1016/j.cosrev.2012.01.001
Computational Analysis of Run-time Monitoring, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.80-94, 2002. ,
DOI : 10.1016/S1571-0661(04)80578-4
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008. ,
DOI : 10.1016/j.jlap.2008.08.004
Enforcing Non-safety Security Policies with Program Monitors, Computer Security -ESORICS 2005, 10th European Symposium on Research in Computer Security, pp.355-373, 2005. ,
DOI : 10.1007/11555827_21
URL : http://www.cs.princeton.edu/~dpw/papers/nonsafety05.pdf
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
A Theory of Runtime Enforcement, with Results, 15th European Symposium on Research in Computer Security, pp.87-100, 2010. ,
DOI : 10.1007/978-3-642-15497-3_6
Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007. ,
DOI : 10.1016/j.entcs.2006.08.029
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007. ,
DOI : 10.1016/j.entcs.2007.03.025
Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.455-495, 1982. ,
DOI : 10.1145/357172.357178
Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, pp.420-427, 2014. ,
DOI : 10.3182/20140514-3-FR-4046.00041
URL : https://hal.archives-ouvertes.fr/hal-00974548
Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014. ,
DOI : 10.1145/2554850.2554967
URL : https://hal.archives-ouvertes.fr/hal-00907571
TiPEX: A Tool Chain for Timed Property Enforcement During eXecution, Runtime Verification -6th International Conference, pp.306-320, 2015. ,
DOI : 10.1016/j.entcs.2005.10.035
URL : https://hal.archives-ouvertes.fr/hal-01244446
Runtime Enforcement of Timed Properties, Runtime Verification, Third International Conference, pp.229-244, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
Predictive runtime enforcement, Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp.1628-1633, 2016. ,
DOI : 10.1145/2851613.2851827
URL : https://hal.archives-ouvertes.fr/hal-01244369
Supervisory Control of a Class of Discrete Event Processes, SIAM Journal on Control and Optimization, vol.25, issue.1, pp.206-230, 1987. ,
DOI : 10.1137/0325013
The control of discrete event systems, Proceedings of the IEEE, vol.77, issue.1, pp.81-98, 1989. ,
DOI : 10.1109/5.21072
Optimal enforcement of (timed) properties with uncontrollable events, Mathematical Structures in Computer Science, vol.16, pp.1-46, 2017. ,
DOI : 10.1145/353323.353382
URL : https://hal.archives-ouvertes.fr/hal-01262444
Enforcement of (Timed) Properties with Uncontrollable Events, Proceedings. Lecture Notes in Computer Science, vol.9399, pp.542-560, 2015. ,
DOI : 10.1007/978-3-319-25150-9_31
URL : https://hal.archives-ouvertes.fr/hal-01185238
Runtime enforcement using büchi games, Proceedings of Model Checking Software -24th International Symposium, pp.70-79 ,
DOI : 10.1145/3092282.3092296
Acceptability-oriented computing, Proceedings of the 2003 ACM SIG- PLAN Conference On Object-Oriented Programming Sytems, Languages, and Applications Companion (OOPSLA 03 COMPANION, pp.221-239, 2003. ,
DOI : 10.1145/949344.949402
URL : http://dspace.mit.edu/bitstream/1721.1/3846/2/CS002.pdf
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://www.cs.cornell.edu/Info/People/jgm/lang-based-security/schneider.ps
Execution monitoring enforcement under memory-limitation constraints, Information and Computation, vol.206, issue.2-4, pp.158-184, 2008. ,
DOI : 10.1016/j.ic.2007.07.009
URL : https://doi.org/10.1016/j.ic.2007.07.009
Classifying Discrete Temporal Properties, STACS. LNCS, pp.32-46, 1999. ,
DOI : 10.1007/3-540-49116-3_3
URL : http://www-i7.informatik.rwth-aachen.de/~wilke/publications/STACS99.html.ps.gz
Synthesizing Runtime Enforcer of Safety Properties Under Burst Error, NASA Formal Methods -8th International Symposium, NFM 2016, pp.65-81, 2016. ,
DOI : 10.1145/2610384.2610405
Runtime Verification with Predictive Semantics, NASA Formal Methods -4th International Symposium, NFM 2012, pp.418-432, 2012. ,
DOI : 10.1007/978-3-642-28891-3_37