{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:03:08Z","timestamp":1762459388468,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662496299"},{"type":"electronic","value":"9783662496305"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49630-5_9","type":"book-chapter","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T09:04:32Z","timestamp":1458551072000},"page":"145-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Theory of Monitors"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Francalanza","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.E.: Quantified event automata: Towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012)"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. TOSEM 20(4), 14 (2011)","journal-title":"TOSEM"},{"issue":"2:1","key":"9_CR3","first-page":"1","volume":"11","author":"G Bernardi","year":"2015","unstructured":"Bernardi, G., Hennessy, M.: Mutually testing processes. LMCS 11(2:1), 1\u201323 (2015)","journal-title":"LMCS"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? Edited automata revisited. Int. J. Inf. Secur. 10(4), 239\u2013254 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-38592-6_5","volume-title":"Formal Techniques for Distributed Systems","author":"L Bocchi","year":"2013","unstructured":"Bocchi, L., Chen, T.-C., Demangeon, R., Honda, K., Yoshida, N.: Monitoring networks through multiparty session types. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 50\u201365. Springer, Heidelberg (2013)"},{"key":"9_CR6","first-page":"54","volume":"175","author":"I Cassar","year":"2014","unstructured":"Cassar, I., Francalanza, A.: On synchronous and asynchronous monitor instrumentation for actor systems. FOCLASA 175, 54\u201368 (2014)","journal-title":"FOCLASA"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-23820-3_7","volume-title":"Runtime Verification","author":"A Kane","year":"2015","unstructured":"Kane, A., Chowdhury, O., Datta, A., Koopman, P.: A case study on runtime monitoring of an autonomous research vehicle (ARV) system. In: Bartocci, E., et al. (eds.) RV 2015. LNCS, vol. 9333, pp. 102\u2013117. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_7"},{"key":"9_CR8","volume-title":"Erlang Programming","author":"F Cesarini","year":"2009","unstructured":"Cesarini, F., Thompson, S.: Erlang Programming. O\u2019Reilly, Sebastopol (2009)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chen, F., Ro\u015fu, G.: MOP: An efficient and generic runtime verification framework. In: OOPSLA, pp. 569\u2013588. ACM, (2007)","DOI":"10.1145\/1297105.1297069"},{"key":"9_CR10","series-title":"lecture notes in computer science","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/978-3-662-46681-0_54","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C Cini","year":"2015","unstructured":"Cini, C., Francalanza, A.: An LTL proof system for runtime verification. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 581\u2013595. Springer, Heidelberg (2015)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Venneri, B.: Self-adaptive monitors for multiparty sessions. In: PDP, pp. 688\u2013696. IEEE Computer Society (2014)","DOI":"10.1109\/PDP.2014.18"},{"key":"9_CR12","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: Runtime monitoring of synchronous systems. In: TIME, IEEE (2005)"},{"issue":"1\u20132","key":"9_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(84)90113-0","volume":"34","author":"R Nicola De","year":"1984","unstructured":"De Nicola, R., Hennessy, M.C.B.: Testing equivalences for processes. TCS 34(1\u20132), 83\u2013133 (1984)","journal-title":"TCS"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-38088-4_34","volume-title":"NASA Formal Methods","author":"N Decker","year":"2013","unstructured":"Decker, N., Leucker, M., Thoma, D.: jUnit $$^\\text{ RV }$$ RV \u2013adding runtime verification to junit. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 459\u2013464. Springer, Heidelberg (2013)"},{"issue":"3","key":"9_CR15","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10009-011-0196-8","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: What can you verify and enforce at runtime? STTT 14(3), 349\u2013382 (2012)","journal-title":"STTT"},{"key":"9_CR16","unstructured":"Formal Systems Laboratory. Monitor Oriented Programming. University of Illinois at Urbana Champaign. http:\/\/fsl.cs.illinois.edu\/index.php\/Monitoring-Oriented_Programming"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-23820-3_7","volume-title":"Runtime Verification","author":"A Kane","year":"2015","unstructured":"Kane, A., Chowdhury, O., Datta, A., Koopman, P.: A case study on runtime monitoring of an autonomous research vehicle (ARV) system. In: Bartocci, E., et al. (eds.) RV 2015. LNCS, vol. 9333, pp. 102\u2013117. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_7"},{"issue":"5\u20137","key":"9_CR18","first-page":"186","volume":"82","author":"A Francalanza","year":"2013","unstructured":"Francalanza, A., Gauci, A., Pace, G.J.: Distributed system contract monitoring. JLAP 82(5\u20137), 186\u2013215 (2013)","journal-title":"JLAP"},{"issue":"1\u20132","key":"9_CR19","first-page":"22","volume":"73","author":"A Francalanza","year":"2007","unstructured":"Francalanza, A., Hennessy, M.: A theory for observational fault tolerance. JLAP 73(1\u20132), 22\u201350 (2007)","journal-title":"JLAP"},{"issue":"3","key":"9_CR20","first-page":"226","volume":"46","author":"A Francalanza","year":"2015","unstructured":"Francalanza, A., Seychell, A.: Synthesising correct concurrent runtime monitors. FMSD 46(3), 226\u2013261 (2015)","journal-title":"FMSD"},{"issue":"5","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1538917.1538920","volume":"31","author":"G Castagna","year":"2009","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. ACM Trans. Program. Lang. Syst. 31(5), 1\u201361 (2009)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.scico.2014.04.017","volume":"97","author":"CD Giusto","year":"2015","unstructured":"Giusto, C.D., Perez, J.A.: Disciplined structured communications with disciplined runtime adaptation. Sci. Comput. Program. 97(2), 235\u2013265 (2015)","journal-title":"Sci. Comput. Program."},{"key":"9_CR23","volume-title":"Algebraic Theory of Processes","author":"M Hennessy","year":"1988","unstructured":"Hennessy, M.: Algebraic Theory of Processes. MIT Press, Cambridge (1988)"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511611063","volume-title":"A Distributed Pi-Calculus","author":"M Hennessy","year":"2007","unstructured":"Hennessy, M.: A Distributed Pi-Calculus. Cambridge University Press, Cambridge (2007)"},{"issue":"2","key":"9_CR25","first-page":"129","volume":"24","author":"M Kim","year":"2004","unstructured":"Kim, M., Viswanathan, M., Kannan, S., Lee, I., Sokolsky, O.: Java-MaC: A run-time assurance approach for Java programs. FMSD 24(2), 129\u2013155 (2004)","journal-title":"FMSD"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-23820-3_7","volume-title":"Runtime Verification","author":"A Kane","year":"2015","unstructured":"Kane, A., Chowdhury, O., Datta, A., Koopman, P.: A case study on runtime monitoring of an Autonomous Research Vehicle (ARV) system. In: Bartocci, E., et al. (eds.) RV 2015. LNCS, vol. 9333, pp. 102\u2013117. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_7"},{"issue":"5","key":"9_CR27","first-page":"293","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. JLAP 78(5), 293\u2013303 (2009)","journal-title":"JLAP"},{"issue":"1\u20132","key":"9_CR28","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR29","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall Inc, Upper Saddle River (1989)"},{"issue":"2","key":"9_CR30","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10515-005-6205-y","volume":"12","author":"G Ro\u015fu","year":"2005","unstructured":"Ro\u015fu, G., Havelund, K.: Rewriting-based techniques for runtime verification. Autom. Softw. Engg. 12(2), 151\u2013197 (2005)","journal-title":"Autom. Softw. Engg."},{"key":"9_CR31","volume-title":"PI-Calculus: A Theory of Mobile Processes","author":"D Sangiorgi","year":"2001","unstructured":"Sangiorgi, D., Walker, D.: PI-Calculus: A Theory of Mobile Processes. Cambridge University Press, Cambridge (2001)"},{"issue":"1","key":"9_CR32","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Sen, K., Vardhan, A., Agha, G., Rosu, G.: Efficient decentralized monitoring of safety in distributed systems. In: ICSE, pp. 418\u2013427. IEEE (2004)","DOI":"10.1109\/ICSE.2004.1317464"},{"key":"9_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1663-7","volume-title":"Distributed Systems for System Architects","author":"P Verissimo","year":"2001","unstructured":"Verissimo, P., Rodrigues, L.: Distributed Systems for System Architects. Kluwer Academic Publishers, Norwell (2001)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computation Structures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49630-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:30:00Z","timestamp":1748813400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49630-5_9"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662496299","9783662496305"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49630-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}