Automatic verification of finite-state concurrent systems using temporal logic specifications
ACM Transactions on Programming Languages and Systems (TOPLAS)
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Specifying real-time properties with metric temporal logic
Real-Time Systems
The temporal logic of reactive and concurrent systems
The temporal logic of reactive and concurrent systems
Techniques for automatic verification of real-time systems
Techniques for automatic verification of real-time systems
A graphical environment for the design of concurrent real-time systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Property specification patterns for finite-state verification
FMSP '98 Proceedings of the second workshop on Formal methods in software practice
PROPEL: an approach supporting property elucidation
Proceedings of the 24th International Conference on Software Engineering
A Language Framework for Expressing Checkable Properties of Dynamic Software
Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
An OCL Extension for Real-Time Constraints
Object Modeling with the OCL, The Rationale behind the Object Constraint Language
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Real-time specification patterns
Proceedings of the 27th international conference on Software engineering
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
Artificial intelligence today
Security protocols, properties, and their monitoring
Proceedings of the fourth international workshop on Software engineering for secure systems
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Identifying, modifying, creating, and removing monitor rules for service oriented computing
Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems
Service research challenges and solutions for the future internet
Specification patterns from research to industry: a case study in service-based applications
Proceedings of the 34th International Conference on Software Engineering
A pattern-driven framework for monitoring security and dependability
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus - a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study.