Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Proceedings of the 15th International Symposium on Formal Methods (May 2008)
2. Alpern, B., Schneider, F.B.: Defining liveness. Information Processing Letters 21(4), 181–185 (1985)
3. Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Transactions on Software Engineering and Methodology 18(3), 1–43 (2009)
4. Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)
5. Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP) (July 2009)
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Repair of Violated Eventually Properties in Concurrent Programs;Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE);2024-04-14
2. Proactive enforcement of provisions and obligations;Journal of Computer Security;2023-11-28
3. On first-order runtime enforcement of branching-time properties;Acta Informatica;2023-08-03
4. Quantitative and Approximate Monitoring;2021 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS);2021-06-29
5. ProSAS: Proactive Security Auditing System for Clouds;IEEE Transactions on Dependable and Secure Computing;2021