{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:20:58Z","timestamp":1761621658000,"version":"3.37.3"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12243-023-00952-z","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T04:05:10Z","timestamp":1681704310000},"page":"429-457","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A modular pipeline for enforcement of security properties at runtime"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2743-2853","authenticated-orcid":false,"given":"Rania","family":"Taleb","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sylvain","family":"Hall\u00e9","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rapha\u00ebl","family":"Khoury","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"key":"952_CR1","doi-asserted-by":"publisher","unstructured":"Ancona D, Dagnino F, Franceschini L (2018) A formalism for specification of java API interfaces. In: Dolby J, Halfond WGJ, Mishra A (eds) Companion Proceedings for the ISSTA\/ECOOP 2018 Workshops, ISSTA 2018, Amsterdam, Netherlands, July 16-21, 2018. ACM, pp 24\u201326. https:\/\/doi.org\/10.1145\/3236454.3236476","DOI":"10.1145\/3236454.3236476"},{"issue":"1","key":"952_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s00165-012-0269-9","volume":"26","author":"M Avalle","year":"2014","unstructured":"Avalle M, Pironti A, Sisto R (2014) Formal verification of security protocol implementations: a survey. Form Asp Comput 26(1):99\u2013123. https:\/\/doi.org\/10.1007\/s00165-012-0269-9","journal-title":"Form Asp Comput"},{"key":"952_CR3","doi-asserted-by":"publisher","unstructured":"Bartocci E, Majumdar R (eds.) (2015) Runtime Verification \u2013 6th International Conference, RV 2015 Vienna, Austria, September 22-25, 2015. Proceedings, Lecture Notes in Computer Science. Springer, vol 9333 https:\/\/doi.org\/10.1007\/978-3-319-23820-3","DOI":"10.1007\/978-3-319-23820-3"},{"key":"952_CR4","doi-asserted-by":"publisher","unstructured":"Bartocci E, Falcone Y, Francalanza A et al (2018) Introduction to runtime verification. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification - introductory and advanced topics, Lecture Notes in Computer Science, vol 10457. Springer, pp 1\u201333. https:\/\/doi.org\/10.1007\/978-3-319-75632-5_1","DOI":"10.1007\/978-3-319-75632-5_1"},{"issue":"3","key":"952_CR5","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.cose.2009.09.003","volume":"29","author":"A Bauer","year":"2010","unstructured":"Bauer A, J\u00fcrjens J (2010) Runtime verification of cryptographic protocols. Comput Secur 29(3):315\u2013330. https:\/\/doi.org\/10.1016\/j.cose.2009.09.003, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404809001047. special issue on software engineering for secure systems","journal-title":"Comput Secur"},{"key":"952_CR6","doi-asserted-by":"publisher","unstructured":"Bauer A, Leucker M, Schallhart C (2006) Monitoring of real-time properties. In: Arun-Kumar S, Garg N (eds) FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings, Lecture Notes in Computer Science, vol 4337. Springer, pp 260\u2013272. https:\/\/doi.org\/10.1007\/11944836_25","DOI":"10.1007\/11944836_25"},{"key":"952_CR7","doi-asserted-by":"publisher","unstructured":"Bauer A, Leucker M, Schallhart C (2007) The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky O, Tasiran S (eds) Runtime Verification, 7th International Workshop, RV 2007, Vancouver, Canada, March 13, 2007, Revised Selected Papers, Lecture Notes in Computer Science, vol 4839. Springer, pp 126\u2013138. https:\/\/doi.org\/10.1007\/978-3-540-77395-5_11","DOI":"10.1007\/978-3-540-77395-5_11"},{"issue":"3","key":"952_CR8","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A Bauer","year":"2010","unstructured":"Bauer A, Leucker M, Schallhart C (2010) Comparing LTL semantics for runtime verification. J Log Comput 20(3):651\u2013674","journal-title":"J Log Comput"},{"issue":"4","key":"952_CR9","doi-asserted-by":"publisher","first-page":"14:1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer A, Leucker M, Schallhart C (2011) Runtime verification for LTL and TLTL. ACM Trans Softw Eng Methodol 20(4):14:1\u201314:64. https:\/\/doi.org\/10.1145\/2000799.2000800","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"952_CR10","unstructured":"Bauer L, Ligatti J, Walker D (2002) More enforceable security policies. In: In foundations of computer security"},{"issue":"4","key":"952_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10207-013-0195-8","volume":"12","author":"D Beauquier","year":"2013","unstructured":"Beauquier D, Cohen J, Lanotte R (2013) Security policies enforcement using finite and pushdown edit automata. Int J Inf Sec 12(4):319\u2013336","journal-title":"Int J Inf Sec"},{"key":"952_CR12","first-page":"109","volume-title":"Smart contracts-enabled simulation for hyperconnected logistics","author":"Q Betti","year":"2020","unstructured":"Betti Q, Montreuil B, Khoury R et al (2020) Smart contracts-enabled simulation for hyperconnected logistics. Springer International Publishing, Cham, pp 109\u2013149"},{"key":"952_CR13","doi-asserted-by":"publisher","unstructured":"Bielova N, Massacci F (2011a) Do you really mean what you actually enforced? Int J of Inf Security :1\u201316. https:\/\/doi.org\/10.1007\/s10207-011-0137-2","DOI":"10.1007\/s10207-011-0137-2"},{"issue":"4","key":"952_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10207-011-0137-2","volume":"10","author":"N Bielova","year":"2011","unstructured":"Bielova N, Massacci F (2011b) Do you really mean what you actually enforced? \u2013 edited automata revisited. Int J Inf Sec 10(4):239\u2013254","journal-title":"Int J Inf Sec"},{"key":"952_CR15","doi-asserted-by":"crossref","unstructured":"Bielova N, Massacci F (2012) Iterative enforcement by suppression: towards practical enforcement theories. J Comput Secur 20(1)","DOI":"10.3233\/JCS-2011-0431"},{"issue":"3","key":"952_CR16","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1093\/logcom\/exn077","volume":"20","author":"E Bodden","year":"2010","unstructured":"Bodden E, Hendren LJ, Lam P et al (2010) Collaborative runtime verification with tracematches. J Log Comput 20(3):707\u2013723. https:\/\/doi.org\/10.1093\/logcom\/exn077","journal-title":"J Log Comput"},{"key":"952_CR17","doi-asserted-by":"publisher","unstructured":"Boussaha MR, Khoury R, Hall\u00e9 S (2017) Monitoring of security properties using BeepBeep. In: Imine A, Fernandez JM, Marion J et al (eds) Foundations and Practice of Security \u2013 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol 10723. Springer, pp 160\u2013169. https:\/\/doi.org\/10.1007\/978-3-319-75650-9_11","DOI":"10.1007\/978-3-319-75650-9_11"},{"key":"952_CR18","doi-asserted-by":"crossref","unstructured":"Chabot H, Khoury R, Tawbi N (2011) Extending the enforcement power of truncation monitors using static analysis. pp 194\u2013207","DOI":"10.1016\/j.cose.2010.11.004"},{"key":"952_CR19","doi-asserted-by":"crossref","unstructured":"Chang E, Manna Z, Pnueli A (1993) The safety-progress classification. In: Bauer FL, Brauer W, Schwichtenberg H (eds) Logic and algebra of specification. Springer, Berlin, pp 143\u2013202","DOI":"10.1007\/978-3-642-58041-3_5"},{"key":"952_CR20","doi-asserted-by":"crossref","unstructured":"Chen F, Meredith PO, Jin D et al (2009) Efficient formalism-independent monitoring of parametric properties. In: ASE. IEEE Computer Society, pp 383\u2013394","DOI":"10.1109\/ASE.2009.50"},{"key":"952_CR21","doi-asserted-by":"publisher","unstructured":"Colombo C, Pace GJ, Schneider G (2009) LARVA\u2014safer monitoring of real-time java programs (tool paper). In: Hung DV, Krishnan P (eds) 7th IEEE international conference on software engineering and formal methods, SEFM 2009, Hanoi, Vietnam, 23\u201327 November 2009. IEEE Computer Society, pp 33\u201337. https:\/\/doi.org\/10.1109\/SEFM.2009.13","DOI":"10.1109\/SEFM.2009.13"},{"key":"952_CR22","doi-asserted-by":"crossref","unstructured":"Colombo C, Ellul J, Pace GJ (2018) Contracts over smart contracts: recovering from violations dynamically. In: Margaria T, Steffen B (eds) ISoLA 2018, LNCS, vol 11247. Springer, pp 300\u2013315","DOI":"10.1007\/978-3-030-03427-6_23"},{"key":"952_CR23","doi-asserted-by":"publisher","unstructured":"Convent L, Hungerecker S, Leucker M, etal (2018) TeSSLa: Temporal stream-based specification language. In: Massoni T, Mousavi MR (eds) Formal methods: foundations and applications - 21st Brazilian Symposium, SBMF 2018, Salvador, Brazil, November 26\u201330, 2018, Proceedings, Lecture Notes in Computer Science, vol 11254. Springer, pp 144\u2013162. https:\/\/doi.org\/10.1007\/978-3-030-03044-5_10","DOI":"10.1007\/978-3-030-03044-5_10"},{"key":"952_CR24","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo B, Sankaranarayanan S, S\u00e1nchez C et al (2005) LOLA: runtime monitoring of synchronous systems. In: TIME. IEEE Computer Society, pp 166\u2013174","DOI":"10.1109\/TIME.2005.26"},{"issue":"1","key":"952_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2015","unstructured":"Dolzhenko E, Ligatti J, Reddy S (2015a) Modeling runtime enforcement with mandatory results automata. Int J Inf Sec 14(1):47\u201360. https:\/\/doi.org\/10.1007\/s10207-014-0239-8","journal-title":"Int J Inf Sec"},{"issue":"1","key":"952_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2015","unstructured":"Dolzhenko E, Ligatti J, Reddy S (2015b) Modeling runtime enforcement with mandatory results automata. Int J Inf Secur 14(1):47\u201360","journal-title":"Int J Inf Secur"},{"key":"952_CR27","doi-asserted-by":"crossref","unstructured":"Dr\u00e1bik P, Martinelli F, Morisset C (2012a) Cost-aware runtime enforcement of security policies. In: J\u00f8sang A, Samarati P, Petrocchi M (eds) STM, LNCS, vol 7783. Springer, pp 1\u201316","DOI":"10.1007\/978-3-642-38004-4_1"},{"key":"952_CR28","doi-asserted-by":"crossref","unstructured":"Dr\u00e1bik P, Martinelli F, Morisset C (2012b) A quantitative approach for inexact enforcement of security policies. In: Gollmann D, Freiling FC (eds) ISC 2012, LNCS, vol 7483. Springer, pp 306\u2013321","DOI":"10.1007\/978-3-642-33383-5_19"},{"key":"952_CR29","unstructured":"Erlingsson U (2004) The inlined reference monitor approach to security policy enforcement. PhD thesis, USA, aAI3114521"},{"key":"952_CR30","doi-asserted-by":"publisher","unstructured":"Falcone Y, Sala\u00fcn G (2021) Runtime enforcement with reordering, healing, and suppression. In: Calinescu R, Pasareanu CS (eds) Software Engineering and Formal Methods - 19th International Conference, SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings, Lecture Notes in Computer Science, vol 13085. Springer, pp 47\u201365. https:\/\/doi.org\/10.1007\/978-3-030-92124-8_3","DOI":"10.1007\/978-3-030-92124-8_3"},{"issue":"3","key":"952_CR31","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10703-011-0114-4","volume":"38","author":"Y Falcone","year":"2011","unstructured":"Falcone Y, Mounier L, Fernandez JC et al (2011) Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Form Methods Syst Des 38(3):223\u2013262","journal-title":"Form Methods Syst Des"},{"issue":"3","key":"952_CR32","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10009-011-0196-8","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone Y, Fernandez J, Mounier L (2012) What can you verify and enforce at runtime? Int J Softw Tools Technol Transf 14(3):349\u2013382. https:\/\/doi.org\/10.1007\/s10009-011-0196-8","journal-title":"Int J Softw Tools Technol Transf"},{"key":"952_CR33","doi-asserted-by":"crossref","unstructured":"Falcone Y, Mariani L, Rollet A et al (2018) Runtime failure prevention and reaction. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification \u2013 introductory and advanced topics, LNCS, vol 10457. Springer, pp 103\u2013134","DOI":"10.1007\/978-3-319-75632-5_4"},{"key":"952_CR34","doi-asserted-by":"crossref","unstructured":"Fong PWL (2004) Access control by tracking shallow execution history. In: S&P 2004. IEEE Computer Society, pp 43\u201355","DOI":"10.1109\/SECPRI.2004.1301314"},{"issue":"4","key":"952_CR35","doi-asserted-by":"publisher","first-page":"30:1","DOI":"10.1145\/2629606","volume":"15","author":"A Frigeri","year":"2014","unstructured":"Frigeri A, Pasquale L, Spoletini P (2014) Fuzzy time in linear temporal logic. ACM Trans Comput Log 15(4):30:1\u201330:22","journal-title":"ACM Trans Comput Log"},{"key":"952_CR36","doi-asserted-by":"publisher","unstructured":"Hall\u00e9 S, Khoury R (2017) Event stream processing with beepbeep 3. In: Reger G, Havelund K (eds) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, USA, Kalpa Publications in Computing, vol 3. EasyChair, pp 81\u201388. https:\/\/doi.org\/10.29007\/4cth","DOI":"10.29007\/4cth"},{"key":"952_CR37","doi-asserted-by":"publisher","unstructured":"Hall\u00e9 S, Khoury R (2018) Writing domain-specific languages for BeepBeep. In: Colombo C, Leucker M (eds) RV, LNCS, vol 11237. Springer, pp 447\u2013457. https:\/\/doi.org\/10.1007\/978-3-030-03769-7_27","DOI":"10.1007\/978-3-030-03769-7_27"},{"key":"952_CR38","unstructured":"Hall\u00e9 S, Gaboury S, Bouchard B (2016) Activity recognition through complex event processing: first findings. In: Bouchard B, Giroux S, Bouzouane A et al (eds) Artificial intelligence applied to assistive technologies and smart environments, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016, AAAI Technical Report, vol WS-16-01. AAAI Press. http:\/\/www.aaai.org\/ocs\/index.php\/WS\/AAAIW16\/paper\/view\/12561"},{"issue":"11","key":"952_CR39","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2018.2876075","volume":"51","author":"S Hall\u00e9","year":"2018","unstructured":"Hall\u00e9 S, Khoury R, Awesso M (2018) Streamlining the inclusion of computer experiments in a research paper. Computer 51(11):78\u201389. https:\/\/doi.org\/10.1109\/MC.2018.2876075","journal-title":"Computer"},{"key":"952_CR40","doi-asserted-by":"crossref","unstructured":"Hall\u00e9 S (2018) Event stream processing with BeepBeep 3: log crunching and analysis made easy. Presses de l\u2019Universit\u00e9 du Qu\u00e9bec","DOI":"10.29007\/4cth"},{"key":"952_CR41","doi-asserted-by":"publisher","unstructured":"Hall\u00e9 S, Villemaire R (2008) Runtime monitoring of message-based workflows with data. pp 63\u201372. https:\/\/doi.org\/10.1109\/EDOC.2008.32","DOI":"10.1109\/EDOC.2008.32"},{"issue":"1","key":"952_CR42","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen KW, Morrisett JG, Schneider FB (2006a) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28(1):175\u2013205","journal-title":"ACM Trans Program Lang Syst"},{"issue":"1","key":"952_CR43","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen KW, Morrisett JG, Schneider FB (2006b) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28(1):175\u2013205. https:\/\/doi.org\/10.1145\/1111596.1111601","journal-title":"ACM Trans Program Lang Syst"},{"key":"952_CR44","doi-asserted-by":"publisher","unstructured":"Havelund K, Goldberg A (2008) Verify your runs, vol 4171, pp 374\u2013383. https:\/\/doi.org\/10.1007\/978-3-540-69149-5_40","DOI":"10.1007\/978-3-540-69149-5_40"},{"issue":"1","key":"952_CR45","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10703-018-0319-x","volume":"53","author":"S Jaksic","year":"2018","unstructured":"Jaksic S, Bartocci E, Grosu R et al (2018) Quantitative monitoring of STL with edit distance. Formal Methods Syst Des 53(1):83\u2013112. https:\/\/doi.org\/10.1007\/s10703-018-0319-x","journal-title":"Formal Methods Syst Des"},{"key":"952_CR46","doi-asserted-by":"crossref","unstructured":"Khoury R, Hall\u00e9 S (2015a) Runtime enforcement with partial control. In: Garc\u00eda-Alfaro J, Kranakis E, Bonfante G (eds) FPS 2015, LNCS, vol 9482. Springer, pp 102\u2013116","DOI":"10.1007\/978-3-319-30303-1_7"},{"key":"952_CR47","doi-asserted-by":"publisher","unstructured":"Khoury R, Hall\u00e9 S (2015b) Runtime enforcement with partial control. In: Garc\u00eda-Alfaro J, Kranakis E, Bonfante G (eds) Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9482. Springer, pp 102\u2013116. https:\/\/doi.org\/10.1007\/978-3-319-30303-1_7","DOI":"10.1007\/978-3-319-30303-1_7"},{"key":"952_CR48","doi-asserted-by":"crossref","unstructured":"Khoury R, Hall\u00e9 S (2018) Tally keeping-LTL: an LTL semantics for quantitative evaluation of LTL specifications. In: IRI 2018. IEEE, pp 495\u2013502","DOI":"10.1109\/IRI.2018.00079"},{"issue":"2","key":"952_CR49","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2240276.2240281","volume":"15","author":"R Khoury","year":"2012","unstructured":"Khoury R, Tawbi N (2012a) Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans Inf Syst Secur 15(2):10","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"1","key":"952_CR50","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.cosrev.2012.01.001","volume":"6","author":"R Khoury","year":"2012","unstructured":"Khoury R, Tawbi N (2012b) Which security policies are enforceable by runtime monitors? A survey. Comput Sci Rev 6(1):27\u201345","journal-title":"Comput Sci Rev"},{"key":"952_CR51","doi-asserted-by":"publisher","unstructured":"Khoury R, Hall\u00e9 S, Waldmann O (2016) Execution trace analysis using LTL-FO \u02c6+. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 356\u2013362. https:\/\/doi.org\/10.1007\/978-3-319-47169-3_26","DOI":"10.1007\/978-3-319-47169-3_26"},{"key":"952_CR52","doi-asserted-by":"crossref","unstructured":"Kiczales G, Lamping J, Mendhekar A et al (1997) Aspect-oriented programming. In: European conference on object-oriented programming. Springer, pp 220\u2013242","DOI":"10.1007\/BFb0053381"},{"issue":"4","key":"952_CR53","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01995674","volume":"2","author":"R Koymans","year":"1990","unstructured":"Koymans R (1990) Specifying real-time properties with metric temporal logic. Real Time Syst 2(4):255\u2013299. https:\/\/doi.org\/10.1007\/BF01995674","journal-title":"Real Time Syst"},{"key":"952_CR54","doi-asserted-by":"publisher","unstructured":"Legunsen O, Marinov D, Rosu G (2015) Evolution-aware monitoring-oriented programming. In: Bertolino A, Canfora G, Elbaum S G (eds) 37th IEEE\/ACM international conference on software engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, vol 2. IEEE Computer Society, pp 615\u2013618. https:\/\/doi.org\/10.1109\/ICSE.2015.206","DOI":"10.1109\/ICSE.2015.206"},{"issue":"5","key":"952_CR55","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker M, Schallhart C (2009) A brief account of runtime verification. J Log Algebraic Methods Program 78(5):293\u2013303. https:\/\/doi.org\/10.1016\/j.jlap.2008.08.004","journal-title":"J Log Algebraic Methods Program"},{"key":"952_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4222-2","volume-title":"Temporal verification of reactive systems - safety","author":"Z Manna","year":"1995","unstructured":"Manna Z, Pnueli A (1995) Temporal verification of reactive systems - safety. Springer, Berlin"},{"issue":"5","key":"952_CR57","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1002\/j.1538-7305.1955.tb03788.x","volume":"34","author":"GH Mealy","year":"1955","unstructured":"Mealy GH (1955) A method for synthesizing sequential circuits. Bell Syst Tech J 34(5):1045\u20131079. https:\/\/doi.org\/10.1002\/j.1538-7305.1955.tb03788.x","journal-title":"Bell Syst Tech J"},{"key":"952_CR58","doi-asserted-by":"publisher","unstructured":"Pace GJ, Pardo R, Schneider G (2016) On the runtime enforcement of evolving privacy policies in online social networks. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 407\u2013412. https:\/\/doi.org\/10.1007\/978-3-319-47169-3_33","DOI":"10.1007\/978-3-319-47169-3_33"},{"key":"952_CR59","doi-asserted-by":"crossref","unstructured":"Pinisetty S, Falcone Y, J\u00e9ron T et al (2013) Runtime enforcement of timed properties. In: Qadeer S, Tasiran S (eds) Runtime verification. Springer, Berlin, pp 229\u2013244","DOI":"10.1007\/978-3-642-35632-2_23"},{"issue":"1","key":"952_CR60","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10703-017-0271-1","volume":"51","author":"S Pinisetty","year":"2017","unstructured":"Pinisetty S, Preoteasa V, Tripakis S et al (2017) Predictive runtime enforcement. Formal Methods Syst Des 51(1):154\u2013199. https:\/\/doi.org\/10.1007\/s10703-017-0271-1","journal-title":"Formal Methods Syst Des"},{"key":"952_CR61","doi-asserted-by":"publisher","unstructured":"Pnueli A (1977) The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October - 1 November 1977. IEEE Computer Society, pp 46\u201357. https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"952_CR62","doi-asserted-by":"crossref","unstructured":"Reger G, Cruz HC, Rydeheard DE (2015) MarQ: monitoring at runtime with QEA. In: Baier C, Tinelli C (eds) TACAS 2015, LNCS, vol 9035. Springer, pp 596\u2013610","DOI":"10.1007\/978-3-662-46681-0_55"},{"key":"952_CR63","doi-asserted-by":"publisher","unstructured":"Roudjane M, Rebaine D, Khoury R et al (2019) Predictive analytics for event stream processing. In: 23rd IEEE international enterprise distributed object computing conference, EDOC 2019, Paris, France, October 28-31, 2019. IEEE, pp 171\u2013182. https:\/\/doi.org\/10.1109\/EDOC.2019.00029","DOI":"10.1109\/EDOC.2019.00029"},{"issue":"1","key":"952_CR64","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider FB (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30\u201350","journal-title":"ACM Trans Inf Syst Secur"},{"key":"952_CR65","doi-asserted-by":"crossref","unstructured":"Selyunin K, Jaksic S, Nguyen T et al (2017) Runtime monitoring with recovery of the sent communication protocol. In: Majumdar R, Kun\u010dak V (eds) Computer aided verification. Springer International Publishing, Cham, pp 336\u2013355","DOI":"10.1007\/978-3-319-63387-9_17"},{"key":"952_CR66","doi-asserted-by":"publisher","unstructured":"Taleb R, Hall\u00e9 S, Khoury R (2021a) A modular runtime enforcement model using multi-traces. In: A\u00efmeur E, Laurent M, Yaich R et al (eds) Foundations and practice of security - 14th international symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers, Lecture Notes in Computer Science, vol 13291. Springer, pp 283\u2013302. https:\/\/doi.org\/10.1007\/978-3-031-08147-7_19","DOI":"10.1007\/978-3-031-08147-7_19"},{"key":"952_CR67","doi-asserted-by":"publisher","unstructured":"Taleb R, Khoury R, Hall\u00e9 S et al (2021b) Runtime verification under access restrictions. In: Bliudze S, Gnesi S, Plat N (eds) FormaliSE@ICSE 2021. IEEE, pp 31\u201341. https:\/\/doi.org\/10.1109\/FormaliSE52586.2021","DOI":"10.1109\/FormaliSE52586.2021"},{"key":"952_CR68","doi-asserted-by":"publisher","unstructured":"Taleb R, Hall\u00e9 S, Khoury R (2022) Benchmark measuring the overhead of runtime enforcement using multi-traces (LabPal package). https:\/\/doi.org\/10.5281\/zenodo.5976001","DOI":"10.5281\/zenodo.5976001"},{"key":"952_CR69","doi-asserted-by":"crossref","unstructured":"Talhi C, Tawbi N, Debbabi M (2006) Execution monitoring enforcement for limited-memory systems. In: PST, PST \u201906. Association for Computing Machinery, New York","DOI":"10.1145\/1501434.1501480"},{"issue":"1","key":"952_CR70","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/2700529","volume":"15","author":"S Varvaressos","year":"2017","unstructured":"Varvaressos S, Lavoie K, Gaboury S et al (2017) Automated bug finding in video games: a case study for runtime monitoring. Comput Entertain 15(1):1:1\u20131:28. https:\/\/doi.org\/10.1145\/2700529","journal-title":"Comput Entertain"},{"key":"952_CR71","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11416-021-00391-1","volume":"17","author":"M Vella","year":"2021","unstructured":"Vella M, Colombo C, Abela R et al (2021) RV-TEE: secure cryptographic protocol execution based on runtime verification. J Comput Virol Hacking Tech 17:229\u2013248","journal-title":"J Comput Virol Hacking Tech"},{"issue":"8","key":"952_CR72","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1142\/S0129054111009112","volume":"22","author":"F Yu","year":"2011","unstructured":"Yu F, Bultan T, Ibarra OH (2011) Relational string verification using multi-track automata. Int J Found Comput Sci 22(8):1909\u20131924. https:\/\/doi.org\/10.1142\/S0129054111009112","journal-title":"Int J Found Comput Sci"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00952-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-023-00952-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00952-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T10:53:42Z","timestamp":1729248822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-023-00952-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":72,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["952"],"URL":"https:\/\/doi.org\/10.1007\/s12243-023-00952-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2023,4,17]]},"assertion":[{"value":"20 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}}]}}