共 43 条
[1]
Alur R(1994)A theory of timed automata Theor. Comput. Sci. 126 183-235
[2]
Dill DL(2013)Enforceable security policies revisited ACM Trans. Inf. Syst. Secur. 16 3-48
[3]
Basin DA(2011)Rigorous component-based system design using the BIP framework IEEE Softw. 28 41-674
[4]
Jugé V(2010)Comparing LTL semantics for runtime verification J. Logic Comput. 20 651-1330
[5]
Klaedtke F(2008)The algebra of connectors–structuring interaction in BIP IEEE Trans. Comput. 57 1315-409
[6]
Zalinescu E(2012)A framework for automated distributed implementation of component-based models Distrib. Comput. 25 383-382
[7]
Basu A(2012)What can you verify and enforce at runtime? STTT 14 349-570
[8]
Bensalem S(2015)Enforcement and validation (at runtime) of various notions of opacity Discrete Event Dyn. Syst. 25 531-262
[9]
Bozga M(2011)Runtime enforcement monitors: composition, synthesis, and enforcement abilities Formal Methods Syst. Des. 38 223-19:41
[10]
Combaz J(2009)Run-time enforcement of nonsafety policies ACM Trans. Inf. Syst. Secur. 12 19:1-120