{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:54Z","timestamp":1740099054438,"version":"3.37.3"},"publisher-location":"Cham","reference-count":94,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756318"},{"type":"electronic","value":"9783319756325"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75632-5_4","type":"book-chapter","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T20:09:21Z","timestamp":1518206961000},"page":"103-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Runtime Failure Prevention and Reaction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0114-0641","authenticated-orcid":false,"given":"Yli\u00e8s","family":"Falcone","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9527-7042","authenticated-orcid":false,"given":"Leonardo","family":"Mariani","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Rollet","sequence":"additional","affiliation":[]},{"given":"Saikat","family":"Saha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,11]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., McDaniel, P.D.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: O\u2019Boyle, M.F.P., Pingali, K. (eds.) ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, Edinburgh, UK, 9\u201311 June 2014, pp. 259\u2013269. ACM (2014)","DOI":"10.1145\/2666356.2594299"},{"issue":"12","key":"4_CR2","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","volume":"11","author":"A Avizienis","year":"1985","unstructured":"Avizienis, A.: The N-version approach to fault-tolerant software. IEEE Trans. Softw. Eng. (TSE) 11(12), 1491\u20131501 (1985)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"issue":"5","key":"4_CR3","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"ET Barr","year":"2015","unstructured":"Barr, E.T., Harman, M., McMinn, P., Shahbaz, M., Shin, Y.: The Oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. (TSE) 41(5), 507\u2013525 (2015)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bartocci, E., Falcone, Y., Bonakdarpour, B., Colombo, C., Decker, N., Havelund, K., Joshi, Y., Klaedtke, F., Milewicz, R., Reger, G., Rosu, G., Signoles, J., Thoma, D., Zalinescu, E., Zhang, Y.: First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014. Int. J. Softw. Tools Technol. Transf. 1\u201340 (2017). https:\/\/doi.org\/10.1007\/s10009-017-0454-5","DOI":"10.1007\/s10009-017-0454-5"},{"issue":"1","key":"4_CR5","doi-asserted-by":"crossref","first-page":"3:1","DOI":"10.1145\/2487222.2487225","volume":"16","author":"D Basin","year":"2013","unstructured":"Basin, D., Jug\u00e9, V., Klaedtke, F., Z\u0103linescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1), 3:1\u20133:26 (2013). http:\/\/doi.acm.org\/10.1145\/2487222.2487225","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"4_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., Bensalem, S., Bozga, M., Combaz, J., Jaber, M., Nguyen, T., Sifakis, J.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28(3), 41\u201348 (2011)","journal-title":"IEEE Softw."},{"issue":"1\u20132","key":"4_CR7","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/s10703-016-0253-8","volume":"48","author":"A Bauer","year":"2016","unstructured":"Bauer, A., Falcone, Y.: Decentralised LTL monitoring. Formal Meth. Syst. Des. 48(1\u20132), 46\u201393 (2016)","journal-title":"Formal Meth. Syst. Des."},{"key":"4_CR8","unstructured":"Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Proceedings of the Workshop on Foundations of Computer Security (FCS 2002), Copenhagen, Denmark (2002)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: Sarkar, V., Hall, M.W. (eds.) Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, 12\u201315 June 2005, pp. 305\u2013314. ACM (2005)","DOI":"10.1145\/1065010.1065047"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10207-013-0195-8","volume":"12","author":"D Beauquier","year":"2013","unstructured":"Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite and pushdown edit automata. Int. J. Inf. Sec. 12(4), 319\u2013336 (2013). https:\/\/doi.org\/10.1007\/s10207-013-0195-8","journal-title":"Int. J. Inf. Sec."},{"issue":"4","key":"4_CR11","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? - edited automata revisited. Int. J. Inf. Sec. 10(4), 239\u2013254 (2011)","journal-title":"Int. J. Inf. Sec."},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-19125-1_6","volume-title":"Engineering Secure Software and Systems","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Predictability of enforcement. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 73\u201386. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19125-1_6"},{"issue":"1","key":"4_CR13","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3233\/JCS-2011-0431","volume":"20","author":"N Bielova","year":"2012","unstructured":"Bielova, N., Massacci, F.: Iterative enforcement by suppression: towards practical enforcement theories. J. Comput. Secur. 20(1), 51\u201379 (2012)","journal-title":"J. Comput. Secur."},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-34281-3_34","volume-title":"Formal Methods and Software Engineering","author":"JO Blech","year":"2012","unstructured":"Blech, J.O., Falcone, Y., Becker, K.: Towards certified runtime verification. In: Aoki, T., Taguchi, K. (eds.) ICFEM 2012. LNCS, vol. 7635, pp. 494\u2013509. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34281-3_34"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Bloem, R., K\u00f6nighofer, B., K\u00f6nighofer, R., Wang, C.: Shield synthesis: - runtime enforcement for reactive systems. In: Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11\u201318 April 2015, Proceedings, pp. 533\u2013548 (2015)","DOI":"10.1007\/978-3-662-46681-0_51"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-46982-9_4","volume-title":"Runtime Verification","author":"B Bonakdarpour","year":"2016","unstructured":"Bonakdarpour, B., Finkbeiner, B.: Runtime verification for HyperLTL. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 41\u201345. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_4"},{"key":"4_CR17","unstructured":"Bultan, T., Sen, K. (eds.): Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, 10\u201314 July 2017. ACM (2017)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Gorla, A., Mattavelli, A., Perino, N., Pezz\u00e8, M.: Automatic recovery from runtime failures. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 782\u2013791. IEEE Press (2013)","DOI":"10.1109\/ICSE.2013.6606624"},{"issue":"3","key":"4_CR19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/2755970","volume":"24","author":"A Carzaniga","year":"2015","unstructured":"Carzaniga, A., Gorla, A., Perino, N., Pezz\u00e8, M.: Automatic workarounds: exploiting the intrinsic redundancy of web applications. ACM Trans. Softw. Eng. Methodol. (TOSEM) 24(3), 16 (2015)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-04766-4_20","volume-title":"Identity and Privacy in the Internet Age","author":"H Chabot","year":"2009","unstructured":"Chabot, H., Khoury, R., Tawbi, N.: Generating in-line monitors for Rabin automata. In: J\u00f8sang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 287\u2013301. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04766-4_20"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Chang, E., Manna, Z., Pnueli, A.: The safety-progress classification. Technical report, Stanford University, Department of Computer Science (1992)","DOI":"10.1007\/978-3-642-58041-3_5"},{"key":"4_CR22","unstructured":"Chang, H., Mariani, L., Pezz\u00e8, M.: In-field healing of integration problems with COTS components. In: Proceedings of the International Conference on Software Engineering (ICSE) (2009)"},{"issue":"4","key":"4_CR23","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/2522920.2522923","volume":"22","author":"H Chang","year":"2013","unstructured":"Chang, H., Mariani, L., Pezz\u00e8, M.: Exception handlers for healing component-based systems. ACM Trans. Softw. Eng. Methodol. (TOSEM) 22(4), 30 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Charafeddine, H., El-Harake, K., Falcone, Y., Jaber, M.: Runtime enforcement for component-based systems. In: Wainwright, R.L., Corchado, J.M., Bechini, A., Hong, J. (eds.) Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, 13\u201317 April 2015, pp. 1789\u20131796. ACM (2015)","DOI":"10.1145\/2695664.2695879"},{"issue":"4","key":"4_CR25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.entcs.2006.02.002","volume":"144","author":"F Chen","year":"2006","unstructured":"Chen, F., d\u2019Amorim, M., Ro\u015fu, G.: Checking and correcting behaviors of Java programs at runtime with Java-MOP. Electron. Notes Theor. Comput. Sci. 144(4), 3\u201320 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, 23\u201325 June 2008, pp. 51\u201365. IEEE Computer Society (2008)","DOI":"10.1109\/CSF.2008.7"},{"issue":"1\u20132","key":"4_CR27","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10703-016-0251-x","volume":"49","author":"C Colombo","year":"2016","unstructured":"Colombo, C., Falcone, Y.: Organising LTL monitors over distributed systems with a global clock. Formal Meth. Syst. Des. 49(1\u20132), 109\u2013158 (2016). https:\/\/doi.org\/10.1007\/s10703-016-0251-x","journal-title":"Formal Meth. Syst. Des."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Ramard, T.: Availability enforcement by obligations and aspects identification. In: The First International Conference on Availability, Reliability and Security, ARES 2006, 10 pp. IEEE (2006)","DOI":"10.1109\/ARES.2006.36"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Ding, R., Fu, Q., Lou, J.G., Lin, Q., Zhang, D., Shen, J., Xie, T.: Healing online service systems via mining historical issue repositories. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 318\u2013321. IEEE (2012)","DOI":"10.1145\/2351676.2351735"},{"issue":"1","key":"4_CR30","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2015","unstructured":"Dolzhenko, E., Ligatti, J., Reddy, S.: Modeling runtime enforcement with mandatory results automata. Int. J. Inf. Secur. 14(1), 47\u201360 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-662-45231-8_17","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications","author":"K El-Harake","year":"2014","unstructured":"El-Harake, K., Falcone, Y., Jerad, W., Langet, M., Mamlouk, M.: Blocking advertisements on android devices using monitoring techniques. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014. LNCS, vol. 8803, pp. 239\u2013253. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45231-8_17"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"El-Hokayem, A., Falcone, Y.: Monitoring decentralized specifications. In: Bultan and Sen [17], pp. 125\u2013135","DOI":"10.1145\/3092703.3092723"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"El-Hokayem, A., Falcone, Y.: THEMIS: a tool for decentralized monitoring algorithms. In: Bultan and Sen [17], pp. 372\u2013375","DOI":"10.1145\/3092703.3098224"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Schneider, F.B.: SASI enforcement of security policies: a retrospective. In: Kienzle, D.M., Zurko, M.E., Greenwald, S.J., Serbau, C. (eds.) Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, 22\u201324 September 1999, pp. 87\u201395. ACM (1999)","DOI":"10.1109\/DISCEX.2000.821527"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16612-9_9","volume-title":"Runtime Verification","author":"Y Falcone","year":"2010","unstructured":"Falcone, Y.: You should better enforce than verify. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 89\u2013105. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_9"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for Android applications with RV-Droid. In: Qadeer and Tasiran [80], pp. 88\u201395","DOI":"10.1007\/978-3-642-35632-2_11"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-89862-7_3","volume-title":"Information Systems Security","author":"Y Falcone","year":"2008","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Synthesizing enforcement monitors wrt. the safety-progress classification of properties. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 41\u201355. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89862-7_3"},{"issue":"3","key":"4_CR38","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10009-011-0196-8","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone, Y., Fernandez, J.C., Mounier, L.: What can you verify and enforce at runtime? Int. J. Softw. Tools Technol. Transfer 14(3), 349\u2013382 (2012)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"issue":"3","key":"4_CR39","first-page":"1","volume":"19","author":"Y Falcone","year":"2016","unstructured":"Falcone, Y., Jaber, M.: Fully automated runtime enforcement of component-based systems with formal and sound recovery. Int. J. Softw. Tools Technol. Transf. 19(3), 1\u201325 (2016)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"4_CR40","first-page":"2","volume":"123","author":"Y Falcone","year":"2016","unstructured":"Falcone, Y., J\u00e9ron, T., Marchand, H., Pinisetty, S.: Runtime enforcement of regular timed properties by suppressing and delaying events. Syst. Control Lett. 123, 2\u201341 (2016)","journal-title":"Syst. Control Lett."},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Falcone, Y., Marchand, H.: Runtime enforcement of K-step opacity. In: Proceedings of the 52nd IEEE Conference on Decision and Control, CDC 2013, 10\u201313 December 2013, Firenze, Italy, pp. 7271\u20137278. IEEE (2013)","DOI":"10.1109\/CDC.2013.6761043"},{"issue":"4","key":"4_CR42","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10626-014-0196-4","volume":"25","author":"Y Falcone","year":"2015","unstructured":"Falcone, Y., Marchand, H.: Enforcement and validation (at runtime) of various notions of opacity. Discrete Event Dyn. Syst. 25(4), 531\u2013570 (2015). http:\/\/dx.doi.org\/10.1007\/s10626-014-0196-4","journal-title":"Discrete Event Dyn. Syst."},{"issue":"3","key":"4_CR43","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s10703-011-0114-4","volume":"38","author":"Y Falcone","year":"2011","unstructured":"Falcone, Y., Mounier, L., Fernandez, J., Richier, J.: Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Meth. Syst. Des. 38(3), 223\u2013262 (2011)","journal-title":"Formal Meth. Syst. Des."},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Access control by tracking shallow execution history. In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9\u201312 May 2004, Berkeley, CA, USA, pp. 43\u201355. IEEE Computer Society (2004)","DOI":"10.1109\/SECPRI.2004.1301314"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Goffi, A., Gorla, A., Mattavelli, A., Pezz\u00e8, M., Tonella, P.: Search-based synthesis of equivalent method sequences. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE) (2014)","DOI":"10.1145\/2635868.2635888"},{"issue":"1","key":"4_CR46","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"CL Goues","year":"2012","unstructured":"Goues, C.L., Nguyen, T., Forrest, S., Weimer, W.: GenProg: a generic method for automatic software repair. IEEE Trans. Softw. Eng. (TSE) 38(1), 54\u201372 (2012)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Hall\u00e9, S., Khoury, R., El-Hokayem, A., Falcone, Y.: Decentralized enforcement of artifact lifecycles. In: Matthes, F., Mendling, J., Rinderle-Ma, S. (eds.) 20th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2016, Vienna, Austria, 5\u20139 September 2016, pp. 1\u201310. IEEE Computer Society (2016)","DOI":"10.1109\/EDOC.2016.7579380"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Hall\u00e9, S., Khoury, R., Betti, Q., El-Hokayem, A., Falcone, Y.: Decentralized enforcement of document lifecycle constraints. Information Systems (2017)","DOI":"10.1016\/j.is.2017.08.002"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Certified in-lined reference monitoring on .net. In: Sreedhar, V.C., Zdancewic, S. (eds.) Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, 10 June 2006, pp. 7\u201316. ACM (2006)","DOI":"10.1145\/1134744.1134748"},{"issue":"1","key":"4_CR50","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. (TOPLAS) 28(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Hosek, P., Cadar, C.: Safe software updates via multi-version execution. In: Proceedings of the International Conference on Software Engineering (ICSE) (2013)","DOI":"10.1109\/ICSE.2013.6606607"},{"key":"4_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-49052-6_9","volume-title":"Hardware and Software: Verification and Testing","author":"L Humphrey","year":"2016","unstructured":"Humphrey, L., K\u00f6nighofer, B., K\u00f6nighofer, R., Topcu, U.: Synthesis of admissible shields. In: Bloem, R., Arbel, E. (eds.) HVC 2016. LNCS, vol. 10028, pp. 134\u2013151. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49052-6_9"},{"key":"4_CR53","unstructured":"IEEE: systems and software engineering - vocabulary. Technical report, ISO\/IEC\/IEEE 24765. IEEE International Standard (2010)"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Johansen, H.D., Birrell, E., van Renesse, R., Schneider, F.B., Stenhaug, M., Johansen, D.: Enforcing privacy policies with meta-code. In: Kono, K., Shinagawa, T. (eds.) Proceedings of the 6th Asia-Pacific Workshop on Systems, APSys 2015, Tokyo, Japan, 27\u201328 July 2015, pp. 16:1\u201316:7. ACM (2015)","DOI":"10.1145\/2797022.2797040"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the tarantula automatic fault-localization technique. In: Proceedings of the International Conference on Automated Software Engineering (ASE) (2005)","DOI":"10.1145\/1101908.1101949"},{"issue":"1","key":"4_CR56","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"key":"4_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-30303-1_7","volume-title":"Foundations and Practice of Security","author":"R Khoury","year":"2016","unstructured":"Khoury, R., Hall\u00e9, S.: Runtime enforcement with partial control. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 102\u2013116. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30303-1_7"},{"issue":"2","key":"4_CR58","doi-asserted-by":"crossref","first-page":"10:1","DOI":"10.1145\/2240276.2240281","volume":"15","author":"R Khoury","year":"2012","unstructured":"Khoury, R., Tawbi, N.: Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans. Inf. Syst. Secur. 15(2), 10:1\u201310:27 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"4_CR59","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.cosrev.2012.01.001","volume":"6","author":"R Khoury","year":"2012","unstructured":"Khoury, R., Tawbi, N.: Which security policies are enforceable by runtime monitors? A survey. Comput. Sci. Rev. 6(1), 27\u201345 (2012)","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"4_CR60","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/S1571-0661(04)80578-4","volume":"70","author":"M Kim","year":"2002","unstructured":"Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswanathan, M.: Computational analysis of run-time monitoring - fundamentals of Java-MAC. Electr. Notes Theor. Comput. Sci. 70(4), 80\u201394 (2002)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"4_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-319-26187-4_42","volume-title":"Web Information Systems Engineering \u2013 WISE 2015","author":"A Kumar","year":"2015","unstructured":"Kumar, A., Ligatti, J., Tu, Y.-C.: Query monitoring and analysis for database privacy - a security automata model approach. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9419, pp. 458\u2013472. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26187-4_42"},{"key":"4_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11555827_21","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355\u2013373. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11555827_21"},{"issue":"3","key":"4_CR63","doi-asserted-by":"crossref","first-page":"19:1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 19:1\u201319:41 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-15497-3_6","volume-title":"Computer Security \u2013 ESORICS 2010","author":"J Ligatti","year":"2010","unstructured":"Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87\u2013100. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_6"},{"key":"4_CR65","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.entcs.2006.08.029","volume":"179","author":"F Martinelli","year":"2007","unstructured":"Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. Electr. Notes Theor. Comput. Sci. 179, 31\u201346 (2007). http:\/\/dx.doi.org\/10.1016\/j.entcs.2006.08.029","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"4_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-46598-2_5","volume-title":"Security and Trust Management","author":"F Martinelli","year":"2016","unstructured":"Martinelli, F., Matteucci, I., Mori, P., Saracino, A.: Enforcement of U-XACML history-based usage control policy. In: Barthe, G., Markatos, E., Samarati, P. (eds.) STM 2016. LNCS, vol. 9871, pp. 64\u201381. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46598-2_5"},{"key":"4_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-319-03491-1_5","volume-title":"Trusted Systems","author":"F Martinelli","year":"2013","unstructured":"Martinelli, F., Matteucci, I., Saracino, A., Sgandurra, D.: Remote policy enforcement for trusted application execution in mobile environments. In: Bloem, R., Lipp, P. (eds.) INTRUST 2013. LNCS, vol. 8292, pp. 70\u201384. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03491-1_5"},{"key":"4_CR68","unstructured":"Martinelli, F., Matteucci, I., Saracino, A., Sgandurra, D.: Enforcing mobile application security through probabilistic contracts. In: Joosen, W., Martinelli, F., Heyman, T. (eds.) Proceedings of the 2014 ESSoS Doctoral Symposium Co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, 26 February 2014. CEUR Workshop Proceedings, vol. 1298. CEUR-WS.org (2014)"},{"key":"4_CR69","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mori, P., Saracino, A.: Enhancing android permission through usage control: a BYOD use-case. In: Ossowski [70], pp. 2049\u20132056","DOI":"10.1145\/2851613.2851797"},{"key":"4_CR70","unstructured":"Ossowski, S. (ed.): Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, 4\u20138 April 2016. ACM (2016)"},{"issue":"3","key":"4_CR71","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/357172.357178","volume":"4","author":"S Owicki","year":"1982","unstructured":"Owicki, S., Lamport, L.: Proving liveness properties of concurrent programs. ACM Trans. Program. Lang. Syst. 4(3), 455\u2013495 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/11557432_41","volume-title":"Model Driven Engineering Languages and Systems","author":"J Pavlich-Mariscal","year":"2005","unstructured":"Pavlich-Mariscal, J., Michel, L., Demurjian, S.: A formal enforcement framework for role-based access control using aspect-oriented programming. In: Briand, L., Williams, C. (eds.) MODELS 2005. LNCS, vol. 3713, pp. 537\u2013552. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11557432_41"},{"key":"4_CR73","doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Falcone, Y., J\u00e9ron, T., Marchand, H.: Runtime enforcement of parametric timed properties with practical applications. In: Lesage, J., Faure, J., Cury, J.E.R., Lennartson, B. (eds.) 12th International Workshop on Discrete Event Systems, WODES 2014, Cachan, France, 14\u201316 May 2014, pp. 420\u2013427. International Federation of Automatic Control (2014)","DOI":"10.3182\/20140514-3-FR-4046.00041"},{"key":"4_CR74","doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Falcone, Y., J\u00e9ron, T., Marchand, H.: Runtime enforcement of regular timed properties. In: Cho, Y., Shin, S.Y., Kim, S., Hung, C., Hong, J. (eds.) Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea, 24\u201328 March 2014, pp. 1279\u20131286. ACM (2014)","DOI":"10.1145\/2554850.2554967"},{"key":"4_CR75","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-23820-3_22","volume-title":"Runtime Verification","author":"S Pinisetty","year":"2015","unstructured":"Pinisetty, S., Falcone, Y., J\u00e9ron, T., Marchand, H.: TiPEX: a tool chain for timed property enforcement during execution. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 306\u2013320. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_22"},{"issue":"3","key":"4_CR76","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s10703-014-0215-y","volume":"45","author":"S Pinisetty","year":"2014","unstructured":"Pinisetty, S., Falcone, Y., J\u00e9ron, T., Marchand, H., Rollet, A., Nguena-Timo, O.: Runtime enforcement of timed properties revisited. Formal Meth. Syst. Des. 45(3), 381\u2013422 (2014)","journal-title":"Formal Meth. Syst. Des."},{"key":"4_CR77","doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Falcone, Y., J\u00e9ron, T., Marchand, H., Rollet, A., Nguena-Timo, O.L.: Runtime enforcement of timed properties. In: Qadeer and Tasiran [80], pp. 229\u2013244","DOI":"10.1007\/978-3-642-35632-2_23"},{"key":"4_CR78","doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Preoteasa, V., Tripakis, S., J\u00e9ron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. In: Ossowski [70], pp. 1628\u20131633","DOI":"10.1145\/2851613.2851827"},{"issue":"1","key":"4_CR79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10703-017-0271-1","volume":"51","author":"S Pinisetty","year":"2017","unstructured":"Pinisetty, S., Preoteasa, V., Tripakis, S., J\u00e9ron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. Formal Meth. Syst. Des. 51(1), 1\u201346 (2017)","journal-title":"Formal Meth. Syst. Des."},{"key":"4_CR80","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35632-2","volume-title":"Runtime Verification","year":"2013","unstructured":"Qadeer, S., Tasiran, S. (eds.): RV 2012. LNCS, vol. 7687. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2"},{"issue":"1","key":"4_CR81","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge, P.J., Wonham, W.M.: Supervisory control of a class of discrete event processes. SIAM J. Control Optim. 25(1), 206\u2013230 (1987)","journal-title":"SIAM J. Control Optim."},{"issue":"1","key":"4_CR82","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/5.21072","volume":"77","author":"PJ Ramadge","year":"1989","unstructured":"Ramadge, P.J., Wonham, W.M.: The control of discrete event systems. Proc. IEEE 77(1), 81\u201398 (1989)","journal-title":"Proc. IEEE"},{"key":"4_CR83","unstructured":"Renard, M.: GREP (2017). https:\/\/github.com\/matthieurenard\/GREP"},{"key":"4_CR84","doi-asserted-by":"crossref","unstructured":"Renard, M., Falcone, Y., Rollet, A., J\u00e9ron, T., Marchand, H.: Optimal enforcement of (timed) properties with uncontrollable events. In: Mathematical Structures in Computer Science, pp. 1\u201346 (2017)","DOI":"10.1017\/S0960129517000123"},{"key":"4_CR85","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/978-3-319-25150-9_31","volume-title":"Theoretical Aspects of Computing - ICTAC 2015","author":"M Renard","year":"2015","unstructured":"Renard, M., Falcone, Y., Rollet, A., Pinisetty, S., J\u00e9ron, T., Marchand, H.: Enforcement of (timed) properties with uncontrollable events. In: Leucker, M., Rueda, C., Valencia, F.D. (eds.) ICTAC 2015. LNCS, vol. 9399, pp. 542\u2013560. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25150-9_31"},{"key":"4_CR86","doi-asserted-by":"crossref","unstructured":"Renard, M., Rollet, A., Falcone, Y.: Runtime enforcement using B\u00fcchi games. In: Proceedings of Model Checking Software - 24th International Symposium, SPIN 2017, Co-located with ISSTA 2017, Santa Barbara, USA, pp. 70\u201379. ACM, July 2017","DOI":"10.1145\/3092282.3092296"},{"key":"4_CR87","doi-asserted-by":"crossref","unstructured":"Riganelli, O., Micucci, D., Mariani, L., Falcone, Y.: Verifying policy enforcers. In: Proceedings of the International Conference on Runtime Verification (RV) (2017)","DOI":"10.1007\/978-3-319-67531-2_15"},{"issue":"1","key":"4_CR88","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR89","doi-asserted-by":"crossref","unstructured":"Sridhar, M., Hamlen, K.W.: Flexible in-lined reference monitor certification: challenges and future directions. In: Proceedings of the 5th ACM Workshop on Programming Languages Meets Program Verification, PLPV 2011, pp. 55\u201360 (2011)","DOI":"10.1145\/1929529.1929537"},{"key":"4_CR90","doi-asserted-by":"crossref","unstructured":"Swanson, J., Cohen, M.B., Dwyer, M.B., Garvin, B.J., Firestone, J.: Beyond the rainbow: self-adaptive failure avoidance in configurable systems. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE) (2014)","DOI":"10.1145\/2635868.2635915"},{"issue":"2\u20134","key":"4_CR91","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ic.2007.07.009","volume":"206","author":"C Talhi","year":"2008","unstructured":"Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2\u20134), 158\u2013184 (2008). https:\/\/doi.org\/10.1016\/j.ic.2007.07.009","journal-title":"Inf. Comput."},{"key":"4_CR92","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-40648-0_6","volume-title":"NASA Formal Methods","author":"M Wu","year":"2016","unstructured":"Wu, M., Zeng, H., Wang, C.: Synthesizing runtime enforcer of safety properties under burst error. In: Rayadurgam, S., Tkachuk, O. (eds.) NFM 2016. LNCS, vol. 9690, pp. 65\u201381. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40648-0_6"},{"issue":"2","key":"4_CR93","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A Zeller","year":"2002","unstructured":"Zeller, A., Hildebrandt, R.: Simplifying and isolating failure-inducing input. IEEE Trans. Softw. Eng. (TSE) 28(2), 183\u2013200 (2002)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"4_CR94","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-642-28891-3_37","volume-title":"NASA Formal Methods","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Leucker, M., Dong, W.: Runtime verification with predictive semantics. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 418\u2013432. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28891-3_37"}],"container-title":["Lecture Notes in Computer Science","Lectures on Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75632-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T15:13:02Z","timestamp":1570720382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75632-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756318","9783319756325"],"references-count":94,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75632-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}