Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
DOI10.1007/S10703-011-0114-4zbMATH Open1219.68089OpenAlexW2028720147MaRDI QIDQ548696FDOQ548696
Yliès Falcone, Jean-Claude Fernandez, Jean-Luc Richier, Laurent Mounier
Publication date: 30 June 2011
Published in: Formal Methods in System Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10703-011-0114-4
Formal languages and automata (68Q45) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Cites Work
Cited In (17)
- Execution monitoring enforcement under memory-limitation constraints
- Bounded-memory runtime enforcement with probabilistic and performance analysis
- Decentralized LTL enforcement
- Runtime enforcement of timed properties revisited
- A process calculus approach to detection and mitigation of PLC malware
- Runtime enforcement with reordering, healing, and suppression
- Compositional runtime enforcement revisited
- Runtime enforcement of hyperproperties
- Which security policies are enforceable by runtime monitors? A survey
- Enforcement and validation (at runtime) of various notions of opacity
- On first-order runtime enforcement of branching-time properties
- Predictive runtime enforcement
- Title not available (Why is that?)
- Real-time policy enforcement with metric first-order temporal logic
- Runtime enforcement of timed properties using games
- Optimal enforcement of (timed) properties with uncontrollable events
- Title not available (Why is that?)
Uses Software
This page was built for publication: Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q548696)