K. Havelund and A. Goldberg, Verify your runs Verified Software: Theories, Tools, Experiments: First IFIP TC 2/WG 2.3 Conference, VSTTE 2005. Revised Selected Papers and Discussions, pp.374-383, 2008.

M. Leucker and C. Schallhart, A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008.
DOI : 10.1016/j.jlap.2008.08.004

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, 2000.
DOI : 10.1109/fits.2003.1264930

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, 2009.
DOI : 10.1145/1455526.1455532

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

Y. Falcone, J. C. Fernandez, and L. Mounier, Enforcement monitoring wrt. the safetyprogress classification of properties, SAC '09: Proceedings of the ACM symposium on Applied Computing, pp.593-600, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00953590

M. Dam, B. Jacobs, A. Lundblad, and F. Piessens, Security Monitor Inlining for Multithreaded Java, Genoa: Proceedings of the 23 rd European Conference on ECOOP ? Object-Oriented Programming, pp.546-569, 2009.
DOI : 10.1023/A:1025055424017

I. Aktug, M. Dam, and D. Gurov, Provably correct runtime monitoring, FM '08: Proceedings of the 15 th int, pp.262-277, 2008.
DOI : 10.1016/j.jlap.2008.12.002

URL : http://doi.org/10.1016/j.jlap.2008.12.002

U. Erlingsson and F. B. Schneider, SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.87-95, 2000.
DOI : 10.1145/335169.335201

H. Cirstea, P. E. Moreau, and A. S. De-oliveira, Rewrite Based Specification of Access Control Policies, Electronic Notes in Theoretical Computer Science, vol.234, pp.37-54, 2009.
DOI : 10.1016/j.entcs.2009.02.071

URL : https://hal.archives-ouvertes.fr/inria-00335091

A. S. De-oliveira, E. K. Wang, C. Kirchner, and H. Kirchner, Weaving rewrite-based access control policies, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.71-80, 2007.
DOI : 10.1145/1314436.1314446

URL : https://hal.archives-ouvertes.fr/inria-00185710

K. Havelund and G. Rosu, An Overview of the Runtime Verification Tool Java PathExplorer, Formal Methods in System Design, vol.24, issue.2, 2003.
DOI : 10.1023/B:FORM.0000017721.39909.4b

K. Havelund, Runtime Verification of C Programs, pp.7-22, 2008.
DOI : 10.1007/11550679_13

D. Drusinsky, The Temporal Rover and the ATG Rover, pp.323-330, 2000.
DOI : 10.1007/10722468_19

F. Chen and G. Ro¸suro¸su, MOP: An Efficient and Generic Runtime Verification Framework, OOPSLA'07: Object-Oriented Programming, pp.569-588, 2007.

F. Chen and G. Rosu, Parametric Trace Slicing and Monitoring, TACAS'09: 15 th International Conference Tools and Algorithms for the Construction and Analysis of Systems, pp.246-261, 2009.
DOI : 10.1023/A:1011227529550

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.471.347

E. A. Emerson, Temporal and Modal Logic, pp.995-1072, 1990.
DOI : 10.1016/B978-0-444-88074-1.50021-4

L. Lamport, Proving the Correctness of Multiprocess Programs, IEEE Transactions on Software Engineering, vol.3, issue.2, pp.125-143, 1977.
DOI : 10.1109/TSE.1977.229904

B. Alpern and F. B. Schneider, Defining liveness, Information Processing Letters, vol.21, issue.4, pp.181-185, 1985.
DOI : 10.1016/0020-0190(85)90056-0

Z. Manna and A. Pnueli, Adequate proof principles for invariance and liveness properties of concurrent programs, Science of Computer Programming, vol.4, issue.3, pp.257-289, 1984.
DOI : 10.1016/0167-6423(84)90003-0

S. Owicki and L. Lamport, Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.455-495, 1982.
DOI : 10.1145/357172.357178

A. P. Sistla, On characterization of safety and liveness properties in temporal logic, Proceedings of the fourth annual ACM symposium on Principles of distributed computing , PODC '85, pp.39-48, 1985.
DOI : 10.1145/323596.323600

Z. Manna and A. Pnueli, A hierarchy of temporal properties, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing , PODC '87, 1989.
DOI : 10.1145/41840.41857

E. Y. Chang, Z. Manna, and A. Pnueli, Characterization of temporal property classes, In: Automata, Languages and Programming, pp.474-486, 1992.
DOI : 10.1007/3-540-55719-9_97

E. Chang, Z. Manna, and A. Pnueli, The Safety-Progress Classification, 1992.
DOI : 10.1007/978-3-642-58041-3_5

R. S. Streett, Propositional Dynamic Logic of looping and converse, Proceedings of the thirteenth annual ACM symposium on Theory of computing , STOC '81, pp.375-383, 1981.
DOI : 10.1145/800076.802492

Y. Falcone, J. C. Fernandez, and L. Mounier, What can you verify and enforce at runtime ? Software Tools for Technology Transfer, special issue on Runtime Verification (2010) Invited Paper, under review

S. Colin and L. Mariani, Run-time verification In: Model-based Testing of Reactive Systems, LNCS, vol.3472, pp.525-556, 2005.

F. Chen, T. F. Ro¸suro¸su, and G. , jPredictor, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.221-230, 2008.
DOI : 10.1145/1368088.1368119

E. Bodden and K. Havelund, Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, 2009.
DOI : 10.1145/1390630.1390650

S. Bensalem and K. Havelund, Dynamic Deadlock Analysis of Multi-threaded Programs, Hardware and Software Verification and Testing, 1 st International Haifa Verification Conference. Revised Selected Papers, pp.208-223, 2005.
DOI : 10.1007/11678779_15

C. Flanagan and S. N. Freund, Atomizer: a dynamic atomicity checker for multithreaded programs, POPL '04: Proceedings of the 31 st ACM SIGPLAN- SIGACT symposium on Principles of programming languages, pp.256-267, 2004.

N. Bielova and F. Massacci, Do you really mean what you actually enforced? In: FAST'08: 5 th International Workshop on Formal Aspects in Security and Trust. Revised Selected Papers, pp.287-301, 2008.

G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes et al., Aspect-oriented programming, pp.220-242, 1997.

N. Delgado, A. Q. Gates, and S. Roach, A taxonomy and catalog of runtime software-fault monitoring tools, IEEE Transactions on Software Engineering, vol.30, issue.12, pp.859-872, 2004.
DOI : 10.1109/TSE.2004.91

M. Viswanathan and M. Kim, Foundations for the Run-Time Monitoring of Reactive Systems ??? Fundamentals of the MaC Language, Colloquium on Theoretical Aspects of Computing. Revised Selected Papers, pp.543-556, 2004.
DOI : 10.1007/978-3-540-31862-0_38

A. Pnueli and A. Zaks, PSL Model Checking and Run-Time Verification Via Testers, FM'06: Proceedings of Formal Methods, pp.573-586, 2006.
DOI : 10.1007/11813040_38

A. Bauer, M. Leucker, and C. Schallhart, Comparing LTL Semantics for Runtime Verification, Journal of Logic and Computation, vol.20, issue.3, 2009.
DOI : 10.1093/logcom/exn075

URL : http://logcom.oxfordjournals.org/cgi/content/short/20/3/651

Y. Falcone, J. C. Fernandez, and L. Mounier, Runtime Verification of Safety-Progress Properties, RV'09: Proceedings of the 9 th Workshop on Runtime Verification. Revised selected Papers, pp.40-59, 2009.
DOI : 10.1137/0201010

URL : https://hal.archives-ouvertes.fr/hal-00420487

A. Bauer, M. Leucker, and C. Schallhart, Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007.
DOI : 10.1145/2000799.2000800

M. Amorim and G. Ro¸suro¸su, Efficient monitoring of ?-languages, Proceedings of 17 th Int. Conference on Computer-aided Verification (CAV'05, pp.364-378, 2005.

H. Barringer, D. E. Rydeheard, and K. Havelund, Rule Systems for Run-time Monitoring: from EAGLE to RULER, RV'07: 7 th International Workshop on Runtime Verification. Revised Selected Papers, pp.111-125, 2007.
DOI : 10.1093/logcom/exn076

J. A. Ligatti, Policy Enforcement via Program Monitoring, 2006.

Y. Falcone, L. Mounier, J. C. Fernandez, and J. L. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities (2010) under revision at Formal Methods in System Design

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, ESORICS'05 Proceedings of the 10 th European Symposium on Research in Computer Security, pp.355-373, 2005.
DOI : 10.1007/11555827_21

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

P. W. Fong, Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.43-55, 2004.
DOI : 10.1109/SECPRI.2004.1301314

C. Talhi, N. Tawbi, and M. Debbabi, Execution monitoring enforcement for limitedmemory systems, PST'06: Proceedings of the International Conference on Privacy, pp.1-12, 2006.

M. Viswanathan, Foundations for the run-time analysis of software systems, 2000.

D. Beauquier, J. Cohen, and R. Lanotte, Security Policies Enforcement Using Finite Edit Automata, Electronic Notes in Theoretical Computer Science, vol.229, issue.3, pp.19-35, 2009.
DOI : 10.1016/j.entcs.2009.06.037

D. Perrin and J. E. Pin, Infinite Words, Automata, Semigroups, Logic and Games, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00112831

F. Martinelli and I. Matteucci, Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007.
DOI : 10.1016/j.entcs.2006.08.029

I. Matteucci, Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007.
DOI : 10.1016/j.entcs.2007.03.025

Y. Falcone, J. C. Fernandez, and L. Mounier, Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, ICISS'08: Proceedings of the 4 th International Conference on Information Systems Security, pp.41-55, 2008.
DOI : 10.1145/298595.298598

URL : https://hal.archives-ouvertes.fr/hal-00346063

H. Chabot, R. Khoury, and N. Tawbi, Generating In-Line Monitors for Rabin Automata, NordSec'09: 14 th Nordic Conf. on Secure IT Systems, pp.287-301, 2009.
DOI : 10.1137/0201010