Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
The Temporal Rover and the ATG Rover
Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification
LOLA: Runtime Monitoring of Synchronous Systems
TIME '05 Proceedings of the 12th International Symposium on Temporal Representation and Reasoning
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Temporal Assertions using AspectJ
Electronic Notes in Theoretical Computer Science (ENTCS)
Monitoring security policies with metric first-order temporal logic
Proceedings of the 15th ACM symposium on Access control models and technologies
Rule Systems for Run-time Monitoring
Journal of Logic and Computation
Monitoring Usage-Control Policies in Distributed Systems
TIME '11 Proceedings of the 2011 Eighteenth International Symposium on Temporal Representation and Reasoning
The ORCHIDS intrusion detection tool
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
An overview of the MOP runtime verification framework
International Journal on Software Tools for Technology Transfer (STTT) - Runtime Verification
Hi-index | 0.00 |
Determining whether the usage of sensitive, digitally stored data complies with regulations and policies is a growing concern for companies, administrations, and end users alike. Classical examples of policies used for protecting and preventing the misuse of data are history-based access-control policies like the Chinese-wall policy and separation-of-duty constraints. Other policies from more specialized areas like banking involve retention, reporting, and transaction requirements. Simplified examples from this domain are that financial reports must be approved at most a week before they are published and that transactions over $10,000 must be reported within two days.