共 43 条
- [1] Alur R(1994)A theory of timed automata Theor. Comput. Sci. 126 183-235
- [2] Dill DL(2013)Enforceable security policies revisited ACM Trans. Inf. Syst. Secur. 16 3-48
- [3] Basin DA(2011)Rigorous component-based system design using the BIP framework IEEE Softw. 28 41-674
- [4] Jugé V(2010)Comparing LTL semantics for runtime verification J. Logic Comput. 20 651-1330
- [5] Klaedtke F(2008)The algebra of connectors–structuring interaction in BIP IEEE Trans. Comput. 57 1315-409
- [6] Zalinescu E(2012)A framework for automated distributed implementation of component-based models Distrib. Comput. 25 383-382
- [7] Basu A(2012)What can you verify and enforce at runtime? STTT 14 349-570
- [8] Bensalem S(2015)Enforcement and validation (at runtime) of various notions of opacity Discrete Event Dyn. Syst. 25 531-262
- [9] Bozga M(2011)Runtime enforcement monitors: composition, synthesis, and enforcement abilities Formal Methods Syst. Des. 38 223-19:41
- [10] Combaz J(2009)Run-time enforcement of nonsafety policies ACM Trans. Inf. Syst. Secur. 12 19:1-120