ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
A behavioral type system and its application in Ptolemy II
Formal Aspects of Computing
Abstract behavior types: a foundation model for components and their composition
Science of Computer Programming - Formal methods for components and objects pragmatic aspects and applications
A Framework for Component-based Construction Extended Abstract
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Certified In-lined Reference Monitoring on .NET
Proceedings of the 2006 workshop on Programming languages and analysis for security
A Practical Introduction to PSL (Series on Integrated Circuits and Systems)
A Practical Introduction to PSL (Series on Integrated Circuits and Systems)
Runtime monitoring of web service conversations
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Run-Time Enforcement of Nonsafety Policies
ACM Transactions on Information and System Security (TISSEC)
Automated Runtime Verification for Web Services
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
You should better enforce than verify
RV'10 Proceedings of the First international conference on Runtime verification
Synthesis of fault-tolerant embedded systems using games: from theory to practice
VMCAI'11 Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation
The theory and practice of SALT
NFM'11 Proceedings of the Third international conference on NASA Formal methods
Runtime enforcement monitors: composition, synthesis, and enforcement abilities
Formal Methods in System Design
Runtime verification of component-based systems
SEFM'11 Proceedings of the 9th international conference on Software engineering and formal methods
Beyond assertions: advanced specification and verification with JML and ESC/Java2
FMCO'05 Proceedings of the 4th international conference on Formal Methods for Components and Objects
ABS: a core language for abstract behavioral specification
FMCO'10 Proceedings of the 9th international conference on Formal Methods for Components and Objects
What can you verify and enforce at runtime?
International Journal on Software Tools for Technology Transfer (STTT) - Runtime Verification
Generating Invariant-Based Certificates for Embedded Systems
ACM Transactions on Embedded Computing Systems (TECS)
Runtime verification: the application perspective
ISoLA'12 Proceedings of the 5th international conference on Leveraging Applications of Formal Methods, Verification and Validation: technologies for mastering change - Volume Part I
Hi-index | 0.00 |
Abstract constraint specifications --- such as interoperability contracts --- of the behavior of a system are frequently stated as requirements during early design phases. During the development process, these abstract specifications get refined until one reaches a deployable implementation. Especially in systems with components being dynamically added or replaced, it is critical that the constraints stated are met by the running system. The size of abstract constraint specifications is typically very small compared to the final implementation. In this paper, we sketch a process, where abstract constraint specifications are used as a basis for runtime monitors and checks. These monitors and checks ensure that in cases of deviations from the original specification, the system takes compensating actions such as turning the system into a safe state. We particularly focus on systems where components can be exchanged, added or removed during runtime. We discuss a concrete application scenario: The usage of specification-based monitors for OSGi-based services in the domain of home automation.