共 27 条
[1]
Thati P(2005)Monitoring algorithms for metric temporal logic specifications Electron Notes Theor Comput Sci 113 145-162
[2]
Rosu G(2011)Runtime verification for LTL and TLTL ACM Trans Softw Eng Methodol 20 14:1-14:64
[3]
Bauer A(2000)Enforceable security policies ACM Trans Inf Syst Secur 3 30-50
[4]
Leucker M(2009)Run-time enforcement of nonsafety policies ACM Trans Inf Syst Secur 12 19:1-19:41
[5]
Schallhart C(2011)Runtime enforcement monitors: composition, synthesis, and enforcement abilities Form Methods Syst Des 38 223-262
[6]
Schneider FB(2007)Automated synthesis of enforcing mechanisms for security properties in a timed setting Electron Notes Theor Comput Sci 186 101-120
[7]
Ligatti J(2013)Enforceable security policies revisited ACM Trans Inf Syst Secur 16 3:1-3:26
[8]
Bauer L(1994)A theory of timed automata Theor Comput Sci 126 183-235
[9]
Walker D(1997)UPPAAL in a nutshell Int J Softw Tools Technol Transf 1 134-152
[10]
Falcone Y(2006)Patterns for timed property specifications Electron Notes Theor Comput Sci 153 117-133