{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:28:37Z","timestamp":1750318117657,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031081460"},{"type":"electronic","value":"9783031081477"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08147-7_19","type":"book-chapter","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T16:43:08Z","timestamp":1655224988000},"page":"283-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Modular Runtime Enforcement Model Using Multi-traces"],"prefix":"10.1007","author":[{"given":"Rania","family":"Taleb","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sylvain","family":"Hall\u00e9","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rapha\u00ebl","family":"Khoury","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,15]]},"reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A Bauer","year":"2010","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Comparing LTL semantics for runtime verification. J. Log. Comput. 20(3), 651\u2013674 (2010)","journal-title":"J. Log. Comput."},{"key":"19_CR2","unstructured":"Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: In Foundations of Computer Security (2002)"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10207-013-0195-8","volume":"12","author":"D Beauquier","year":"2013","unstructured":"Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite and pushdown edit automata. Int. J. Inf. Sec. 12(4), 319\u2013336 (2013)","journal-title":"Int. J. Inf. Sec."},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-38677-1_6","volume-title":"Smart Contracts-Enabled Simulation for Hyperconnected Logistics","author":"Q Betti","year":"2020","unstructured":"Betti, Q., Montreuil, B., Khoury, R., Hall\u00e9, S.: Smart Contracts-Enabled Simulation for Hyperconnected Logistics, pp. 109\u2013149. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38677-1_6"},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? - edited automata revisited. Int. J. Inf. Sec. 10(4), 239\u2013254 (2011)","journal-title":"Int. J. Inf. Sec."},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-58041-3_5","volume-title":"Logic and Algebra of Specification","author":"E Chang","year":"1993","unstructured":"Chang, E., Manna, Z., Pnueli, A.: The safety-progress classification. In: Bauer, F.L., Brauer, W., Schwichtenberg, H. (eds.) Logic and Algebra of Specification, pp. 143\u2013202. Springer, Berlin Heidelberg, Berlin, Heidelberg (1993). https:\/\/doi.org\/10.1007\/978-3-642-58041-3_5"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Chen, F., Meredith, P.O., Jin, D., Rosu, G.: Efficient formalism-independent monitoring of parametric properties. In: ASE, pp. 383\u2013394. IEEE Computer Society (2009)","DOI":"10.1109\/ASE.2009.50"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-03427-6_23","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"C Colombo","year":"2018","unstructured":"Colombo, C., Ellul, J., Pace, G.J.: Contracts over smart contracts: recovering from violations dynamically. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 300\u2013315. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_23"},{"key":"19_CR9","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: TIME, pp. 166\u2013174. IEEE Computer Society (2005)"},{"issue":"1","key":"19_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2014","unstructured":"Dolzhenko, E., Ligatti, J., Reddy, S.: Modeling runtime enforcement with mandatory results automata. Int. J. Inf. Secur. 14(1), 47\u201360 (2014). https:\/\/doi.org\/10.1007\/s10207-014-0239-8","journal-title":"Int. J. Inf. Secur."},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38004-4_1","volume-title":"Security and Trust Management","author":"P Dr\u00e1bik","year":"2013","unstructured":"Dr\u00e1bik, P., Martinelli, F., Morisset, C.: Cost-aware runtime enforcement of security policies. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 1\u201316. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38004-4_1"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-33383-5_19","volume-title":"Information Security","author":"P Dr\u00e1bik","year":"2012","unstructured":"Dr\u00e1bik, P., Martinelli, F., Morisset, C.: A quantitative approach for inexact enforcement of security policies. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 306\u2013321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33383-5_19"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-75632-5_4","volume-title":"Lectures on Runtime Verification","author":"Y Falcone","year":"2018","unstructured":"Falcone, Y., Mariani, L., Rollet, A., Saha, S.: Runtime failure prevention and reaction. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 103\u2013134. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_4"},{"issue":"3","key":"19_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10703-011-0114-4","volume":"38","author":"Y Falcone","year":"2011","unstructured":"Falcone, Y., Mounier, L., Fernandez, J.C., Richier, J.L.: Runtime enforcement monitors: Composition, synthesis, and enforcement abilities. Form. Methods Syst. Des. 38(3), 223\u2013262 (2011)","journal-title":"Form. Methods Syst. Des."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Access control by tracking shallow execution history. In: S&P 2004, pp. 43\u201355. IEEE Computer Society (2004)","DOI":"10.1109\/SECPRI.2004.1301314"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-030-03769-7_27","volume-title":"Runtime Verification","author":"S Hall\u00e9","year":"2018","unstructured":"Hall\u00e9, S., Khoury, R.: Writing domain-specific languages for BeepBeep. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 447\u2013457. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_27"},{"issue":"11","key":"19_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2018.2876075","volume":"51","author":"S Hall\u00e9","year":"2018","unstructured":"Hall\u00e9, S., Khoury, R., Awesso, M.: Streamlining the inclusion of computer experiments in a research paper. Computer 51(11), 78\u201389 (2018)","journal-title":"Computer"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Hall\u00e9, S.: Event Stream Processing With BeepBeep 3: Log Crunching and Analysis Made Easy. Presses de l\u2019Universit\u00e9 du Qu\u00e9bec (2018)","DOI":"10.29007\/4cth"},{"issue":"1","key":"19_CR19","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, J.G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-30303-1_7","volume-title":"Foundations and Practice of Security","author":"R Khoury","year":"2016","unstructured":"Khoury, R., Hall\u00e9, S.: Runtime enforcement with partial control. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 102\u2013116. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30303-1_7"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Khoury, R., Hall\u00e9, S.: Tally keeping-LTL: an LTL semantics for quantitative evaluation of LTL specifications. In: IRI 2018, pp. 495\u2013502. IEEE (2018)","DOI":"10.1109\/IRI.2018.00079"},{"issue":"2","key":"19_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2240276.2240281","volume":"15","author":"R Khoury","year":"2012","unstructured":"Khoury, R., Tawbi, N.: Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans. Inf. Syst. Secur. 15(2), 10 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Mallios, Y., Bauer, L., Kaynar, D., Ligatti, J.: Enforcing more with less: formalizing target-aware run-time monitors. In: Proceedings of the International Workshop on Security and Trust Management, pp. 17\u201332, September 2012","DOI":"10.1007\/978-3-642-38004-4_2"},{"key":"19_CR24","doi-asserted-by":"publisher","unstructured":"Reger, G., Cruz, H.C., Rydeheard, D.: MarQ: Monitoring at Runtime with QEA. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 596\u2013610. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_55","DOI":"10.1007\/978-3-662-46681-0_55"},{"issue":"1","key":"19_CR25","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Taleb, R., Hall\u00e9, S., Khoury, R.: Benchmark measuring the overhead of runtime enforcement using multi-traces (LabPal package) (2022)","DOI":"10.1007\/978-3-031-08147-7_19"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Taleb, R., Khoury, R., Hall\u00e9, S.: Runtime verification under access restrictions. In: Bliudze, S., Gnesi, S., Plat, N., Semini, L. (eds.) FormaliSE@ICSE 2021, pp. 31\u201341. IEEE (2021)","DOI":"10.1109\/FormaliSE52586.2021.00010"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement for limited-memory systems. In: PST, PST 2006, Association for Computing Machinery, New York, NY, USA (2006)","DOI":"10.1145\/1501434.1501480"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08147-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T22:48:58Z","timestamp":1727390938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08147-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031081460","9783031081477"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08147-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2021.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}