{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:05:11Z","timestamp":1766048711601},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336923"},{"type":"electronic","value":"9783319336930"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33693-0_12","type":"book-chapter","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T05:35:47Z","timestamp":1464068147000},"page":"176-192","source":"Crossref","is-referenced-by-count":25,"title":["On Implementing a Monitor-Oriented Programming Framework for Actor Systems"],"prefix":"10.1007","author":[{"given":"Ian","family":"Cassar","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Francalanza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"unstructured":"Akka website. http:\/\/www.akka.io","key":"12_CR1"},{"key":"12_CR2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1086.001.0001","volume-title":"Actors: A Model of Concurrent Computation in Distributed Systems","author":"G Agha","year":"1986","unstructured":"Agha, G.: Actors: A Model of Concurrent Computation in Distributed Systems. MIT Press, Cambridge (1986)"},{"key":"12_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S095679689700261X","volume":"7","author":"G Agha","year":"1997","unstructured":"Agha, G., Mason, I.A., Smith, S.F., Talcott, C.L.: A foundation for actor computation. J. Funct. Program. 7, 1\u201372 (1997)","journal-title":"J. Funct. Program."},{"key":"12_CR4","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1109\/TSE.2003.1214327","volume":"29","author":"JH Andrews","year":"2003","unstructured":"Andrews, J.H., Zhang, Y.: General test result checking with log file analysis. IEEE Trans. Softw. Eng. 29, 634\u2013648 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012)"},{"issue":"4","key":"12_CR6","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? Edited automata revisited. Int. J. Inf. Secur. 10(4), 239\u2013254 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-3-319-23820-3_3","volume-title":"Runtime Verification","author":"I Cassar","year":"2015","unstructured":"Cassar, I., Francalanza, A.: Runtime adaptation for actor systems. In: Bartocci, E., et al. (eds.) RV 2015. LNCS, vol. 9333, pp. 38\u201354. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_3"},{"key":"12_CR8","volume-title":"ERLANG Programming","author":"F Cesarini","year":"2009","unstructured":"Cesarini, F., Thompson, S.: ERLANG Programming, 1st edn. O\u2019Reilly, Sebastopol (2009)","edition":"1"},{"key":"12_CR9","first-page":"106","volume":"89","author":"F Chen","year":"2003","unstructured":"Chen, F., Ro\u015fu, G.: Towards monitoring-oriented programming: a paradigm combining specification and implementation. ENTCS 89, 106\u2013125 (2003). Elsevier","journal-title":"ENTCS"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/978-3-540-31980-1_36","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F Chen","year":"2005","unstructured":"Chen, F., Ro\u015fu, G.: Java-MOP: a monitoring oriented programming environment for Java. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 546\u2013550. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Chen, F., Ro\u015fu, G.: MOP: an efficient and generic runtime verification framework. In: OOPSLA, pp. 569\u2013588. ACM Press (2007)","key":"12_CR11","DOI":"10.1145\/1297027.1297069"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-319-22969-0_7","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2015","unstructured":"Colombo, C., Dimech, G., Francalanza, A.: Investigating instrumentation techniques for ESB runtime verification. In: Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9276, pp. 99\u2013107. Springer, Heidelberg (2015)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1007\/978-3-642-29860-8_29","volume-title":"Runtime Verification","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Gatt, R.: Elarva: a monitoring tool for Erlang. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 370\u2013374. Springer, Heidelberg (2012)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/978-3-642-33826-7_15","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Mizzi, R., Pace, G.J.: Polylarva: runtime verification with configurable resource-aware monitoring boundaries. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol. 7504, pp. 218\u2013232. Springer, Heidelberg (2012)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-642-35632-2_22","volume-title":"Runtime Verification","author":"C Colombo","year":"2013","unstructured":"Colombo, C., Pace, G.J.: Fast-forward runtime monitoring \u2014 an industrial case study. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 214\u2013228. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Venneri, B.: Self-adaptive monitors for multiparty sessions. In: PDP, pp. 688\u2013696. IEEE Computer Society (2014)","key":"12_CR16","DOI":"10.1109\/PDP.2014.18"},{"issue":"4","key":"12_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083249","volume":"30","author":"M d\u2019Amorim","year":"2005","unstructured":"d\u2019Amorim, M., Havelund, K.: Event-based runtime verification of Java programs. SIGSOFT Softw. Eng. Notes 30(4), 1\u20137 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: runtime monitoring of synchronous systems. In: TIME, pp. 166\u2013174. IEEE (2005)","key":"12_CR18","DOI":"10.1109\/TIME.2005.26"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-642-38088-4_34","volume-title":"NASA Formal Methods","author":"N Decker","year":"2013","unstructured":"Decker, N., Leucker, M., Thoma, D.: jUnitRV\u2013adding runtime verification to jUnit. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 459\u2013464. Springer, Heidelberg (2013)"},{"issue":"12","key":"12_CR20","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N Delgado","year":"2004","unstructured":"Delgado, N., Gates, A.Q., Roach, S.: A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans. Softw. Eng. 30(12), 859\u2013872 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/978-3-540-45069-6_11","volume-title":"Computer Aided Verification","author":"D Drusinsky","year":"2003","unstructured":"Drusinsky, D.: Monitoring temporal rules combined with time series. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 114\u2013117. Springer, Heidelberg (2003)"},{"unstructured":"Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University (2004)","key":"12_CR22"},{"doi-asserted-by":"crossref","unstructured":"Francalanza, A.: A theory of monitors (extended abstract). In: FoSSaCS (2016, to appear)","key":"12_CR23","DOI":"10.1007\/978-3-662-49630-5_9"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-319-23820-3_5","volume-title":"Runtime Verification","author":"A Francalanza","year":"2015","unstructured":"Francalanza, A., Aceto, L., Ingolfsdottir, A.: On verifying Hennessy-Milner logic with recursion at runtime. In: Bartocci, E., et al. (eds.) RV 2015. LNCS, vol. 9333, pp. 71\u201386. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_5"},{"issue":"5\u20137","key":"12_CR25","first-page":"186","volume":"82","author":"A Francalanza","year":"2013","unstructured":"Francalanza, A., Gauci, A., Pace, G.J.: Distributed system contract monitoring. JLAP 82(5\u20137), 186\u2013215 (2013)","journal-title":"JLAP"},{"issue":"3","key":"12_CR26","first-page":"226","volume":"46","author":"A Francalanza","year":"2015","unstructured":"Francalanza, A., Seychell, A.: Synthesising correct concurrent runtime monitors. FMSD 46(3), 226\u2013261 (2015)","journal-title":"FMSD"},{"key":"12_CR27","volume-title":"Actors in Scala","author":"P Haller","year":"2012","unstructured":"Haller, P., Sommers, F.: Actors in Scala. Artima Inc., Mountain View (2012)"},{"issue":"2","key":"12_CR28","first-page":"200","volume":"55","author":"K Havelund","year":"2001","unstructured":"Havelund, K., Ro\u015fu, G., Programs, M.J.: Monitoring Java programs with Java PathExplorer. ENTCS 55(2), 200\u2013217 (2001)","journal-title":"ENTCS"},{"unstructured":"Hernandez, A., Yaws 1.89: directory traversal vulnerability. http:\/\/www.exploit-db.com\/exploits\/15371\/ . Accessed 1 Dec 2015","key":"12_CR29"},{"key":"12_CR30","volume-title":"Building Web Applications with Erlang: Working with REST and Web Sockets on Yaws","author":"Z Kessin","year":"2012","unstructured":"Kessin, Z.: Building Web Applications with Erlang: Working with REST and Web Sockets on Yaws. O\u2019Reilly Media, Sebastopol (2012)"},{"issue":"2","key":"12_CR31","first-page":"129","volume":"24","author":"M Kim","year":"2004","unstructured":"Kim, M., Viswanathan, M., Kannan, S., Lee, I., Sokolsky, O.: Java-MaC: a run-time assurance approach for Java programs. FMSD 24(2), 129\u2013155 (2004)","journal-title":"FMSD"},{"unstructured":"Krasnopolski, A.: AOP for Erlang. http:\/\/erlaop.sourceforge.net\/","key":"12_CR32"},{"issue":"5","key":"12_CR33","first-page":"293","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. JLAP 78(5), 293\u2013303 (2009)","journal-title":"JLAP"},{"issue":"1\u20132","key":"12_CR34","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. IJIS 4(1\u20132), 2\u201316 (2005)","journal-title":"IJIS"},{"key":"12_CR35","volume-title":"Erlang and OTP in Action","author":"M Logan","year":"2011","unstructured":"Logan, M., Merritt, E., Carlsson, R.: Erlang and OTP in Action. Manning, Greenwich (2011)"},{"doi-asserted-by":"crossref","unstructured":"Luo, Q., Ro\u015fu, G.: EnforceMOP: a runtime property enforcement system for multithreaded programs. In: ISSTA, New York, NY, USA, pp. 156\u2013166. ACM (2013)","key":"12_CR36","DOI":"10.1145\/2483760.2483766"},{"issue":"3","key":"12_CR37","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10009-011-0198-6","volume":"14","author":"PO Meredith","year":"2012","unstructured":"Meredith, P.O., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. STTT 14(3), 249\u2013289 (2012)","journal-title":"STTT"},{"doi-asserted-by":"crossref","unstructured":"Pellizzoni, R., Meredith, P.O., Caccamo, M., Rosu, G.: Hardware runtime monitoring for dependable COTS-based real-time embedded systems. In: RTSS, pp. 481\u2013491. IEEE (2008)","key":"12_CR38","DOI":"10.1109\/RTSS.2008.43"},{"issue":"2","key":"12_CR39","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10515-005-6205-y","volume":"12","author":"G Ro\u015fu","year":"2005","unstructured":"Ro\u015fu, G., Havelund, K.: Rewriting-based techniques for runtime verification. Autom. Softw. Eng. 12(2), 151\u2013197 (2005)","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"12_CR40","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Sen, K., Vardhan, A., Agha, G., Ro\u015fu, G.: Efficient decentralized monitoring of safety in distributed systems. In: ICSE, pp. 418\u2013427 (2004)","key":"12_CR41","DOI":"10.1109\/ICSE.2004.1317464"},{"unstructured":"Sha, L., Rajkumar, R., Gagliardi, M.: A software architecture for dependable and renewable industrial computing systems. In: International Conference on Process Control. IEEE (1995)","key":"12_CR42"},{"issue":"4","key":"12_CR43","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MIC.2011.100","volume":"15","author":"S Vinoski","year":"2011","unstructured":"Vinoski, S.: Yaws: yet another web server. IEEE Internet Comput. 15(4), 90\u201394 (2011)","journal-title":"IEEE Internet Comput."}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33693-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T01:00:10Z","timestamp":1600650010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33693-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336923","9783319336930"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33693-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}