Monitoring dynamic integrity constraints based on temporal logic
Information Systems
Specifying real-time properties with metric temporal logic
Real-Time Systems
Efficient checking of temporal integrity constraints using bounded history encoding
ACM Transactions on Database Systems (TODS)
On the feasibility of checking temporal integrity constraints
Journal of Computer and System Sciences - Special issue on selected papers presented at the 24th annual ACM symposium on the theory of computing (STOC '92)
Horn clauses and database dependencies
Journal of the ACM (JACM)
ACM Transactions on Information and System Security (TISSEC)
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
Temporal Triggers in Active Databases
IEEE Transactions on Knowledge and Data Engineering
Monitors for History-Based Policies
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Automatic Presentations of Structures
LCC '94 Selected Papers from the International Workshop on Logical and Computational Complexity
Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic
Logic of Programs, Workshop
Proceedings of the Conference on Logic of Programs
Logics and Models of Real Time: A Survey
Proceedings of the Real-Time: Theory in Practice, REX Workshop
Automata-Based Verification of Temporal Properties on Running Programs
Proceedings of the 16th IEEE international conference on Automated software engineering
Log Auditing through Model-Checking
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Efficient monitoring of safety properties
International Journal on Software Tools for Technology Transfer (STTT) - Special section on tools and algorithms for the construction and analysis of systems
Rewriting-Based Techniques for Runtime Verification
Automated Software Engineering
LOLA: Runtime Monitoring of Synchronous Systems
TIME '05 Proceedings of the 12th International Symposium on Temporal Representation and Reasoning
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
The CQL continuous query language: semantic foundations and query execution
The VLDB Journal — The International Journal on Very Large Data Bases
A note on the formalisation of UCON
Proceedings of the 12th ACM symposium on Access control models and technologies
The temporal logic of programs
SFCS '77 Proceedings of the 18th Annual Symposium on Foundations of Computer Science
Runtime Monitoring of Message-Based Workflows with Data
EDOC '08 Proceedings of the 2008 12th International IEEE Enterprise Distributed Object Computing Conference
Checking Traces for Regulatory Conformance
Runtime Verification
From Philosophical to Industrial Logics
ICLA '09 Proceedings of the 3rd Indian Conference on Logic and Its Applications
Regulations Expressed As Logical Models (REALM)
Proceedings of the 2005 conference on Legal Knowledge and Information Systems: JURIX 2005: The Eighteenth Annual Conference
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Monitoring Algorithms for Metric Temporal Logic Specifications
Electronic Notes in Theoretical Computer Science (ENTCS)
Run-Time Checking of Dynamic Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
AMT: a property-based monitoring tool for analog systems
FORMATS'07 Proceedings of the 5th international conference on Formal modeling and analysis of timed systems
Monitoring security policies with metric first-order temporal logic
Proceedings of the 15th ACM symposium on Access control models and technologies
Rule Systems for Run-time Monitoring
Journal of Logic and Computation
Temporal Assertions with Parametrized Propositions*
Journal of Logic and Computation
Monitoring of real-time properties
FSTTCS'06 Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science
FORMATS'06 Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems
The ORCHIDS intrusion detection tool
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Efficient monitoring of ω-languages
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A policy language for distributed usage control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Policy auditing over incomplete logs: theory, implementation and applications
Proceedings of the 18th ACM conference on Computer and communications security
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Using temporal logic for dynamic reconfigurations of components
FACS'10 Proceedings of the 7th international conference on Formal Aspects of Component Software
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
On XACML's adequacy to specify and to enforce HIPAA
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Report on the first workshop on innovative querying of streams
ACM SIGMOD Record
Relational abstraction in community-based secure collaboration
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Privacy-preserving audit for broker-based health information exchange
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
We present an approach to monitoring system policies As a specification language, we use an expressive fragment of a temporal logic, which can be effectively monitored We report on case studies in security and compliance monitoring and use these to show the adequacy of our specification language for naturally expressing complex, realistic policies and the practical feasibility of monitoring these policies using our monitoring algorithm.