Author:
Khoury Raphaël,Hallé Sylvain
Publisher
Springer International Publishing
Reference29 articles.
1. Alpern, B., Schneider, F.: Defining liveness. Inf. Process. Lett. 21(4), 181–185 (1985)
2. Basin, D., Jugé, V., Klaedtke, F., Zalinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1), 3 (2013)
3. Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Foundations of Computer Security, Copenhagen, Denmark (2002)
4. Beauquier, D., Pin, J.-E.: Languages and scanners. Theoret. Comput. Sci. 84(1), 3–21 (1991)
5. Bielova, N., Massacci, F.: Do you really mean what you actually enforced? - edit automata revisited. Int. J. Inf. Secur. 10(4), 239–254 (2011)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Repair of Violated Eventually Properties in Concurrent Programs;Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE);2024-04-14
2. A modular pipeline for enforcement of security properties at runtime;Annals of Telecommunications;2023-04-17
3. A Modular Runtime Enforcement Model Using Multi-traces;Foundations and Practice of Security;2022
4. Decent: A Benchmark for Decentralized Enforcement;Runtime Verification;2022
5. Decentralized LTL Enforcement;Electronic Proceedings in Theoretical Computer Science;2021-09-17