Y. Falcone and H. Marchand, Various notions of opacity verified and enforced at runtime, INRIA, Tech. Rep, vol.7349, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00507143

E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, Concurrent secrets, Discrete Event Dynamic Systems, pp.425-446, 2007.
DOI : 10.1109/wodes.2006.1678407

URL : https://hal.archives-ouvertes.fr/inria-00070249

J. Bryans, M. Koutny, L. Mazaré, and P. Y. Ryan, Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008.
DOI : 10.1007/s10207-008-0058-x

R. Alur and S. Zdancewic, Preserving Secrecy Under Refinement, 33rd Internat. Colloq. on Automata, Languages and Programming, ser. LNCS, pp.107-118, 2006.
DOI : 10.1007/11787006_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.322

A. Saboori and C. N. Hadjicostis, Verification of K-step opacity and analysis of its complexity, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pp.549-559, 2011.
DOI : 10.1109/CDC.2009.5400083

J. Dubreil, P. Darondeau, and H. Marchand, Supervisory Control for Opacity, IEEE Transactions on Automatic Control, vol.55, issue.5, pp.1089-1100, 2010.
DOI : 10.1109/TAC.2010.2042008

URL : https://hal.archives-ouvertes.fr/inria-00483891

S. Takai and Y. Oka, A Formula for the Supremal Controllable and Opaque Sublanguage Arising in Supervisory Control, SICE Journal of Control, Measurement, and System Integration, vol.1, issue.4, pp.307-312, 2008.
DOI : 10.9746/jcmsi.1.307

S. Takai and R. Kumar, Verification and synthesis for secrecy in discrete-event systems, 2009 American Control Conference, pp.4741-4746, 2009.
DOI : 10.1109/ACC.2009.5160162

A. Saboori and C. N. Hadjicostis, Opacity-Enforcing Supervisory Strategies via State Estimator Constructions, IEEE Transactions on Automatic Control, vol.57, issue.5, pp.1155-1165, 2012.
DOI : 10.1109/TAC.2011.2170453

F. Cassez, J. Dubreil, and H. Marchand, Dynamic Observers for the Synthesis of Opaque Systems, 7th Int. Symposium on Automated Technology for Verification and Analysis, pp.352-367, 2009.
DOI : 10.1007/978-3-642-04761-9_26

URL : https://hal.archives-ouvertes.fr/inria-00396442

Y. Wu and S. Lafortune, Enforcement of opacity properties using insertion functions, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pp.6722-6728, 2012.
DOI : 10.1109/CDC.2012.6426760

A. Pnueli and A. Zaks, PSL Model Checking and Run-Time Verification Via Testers, Int. Symp. on Formal Methods, pp.573-586, 2006.
DOI : 10.1007/11813040_38

K. Havelund and A. Goldberg, Verify Your Runs, Verified Software: Theories, Tools, Experiments: 1st IFIP TC 2/WG 2.3 Conf., Revised Selected Papers and Discussions, pp.374-383, 2008.
DOI : 10.1007/11494881_14

Y. Falcone, J. Fernandez, and L. Mounier, Runtime Verification of Safety-Progress Properties, 9th Work. on Runtime Verification, pp.40-59, 2009.
DOI : 10.1137/0201010

URL : https://hal.archives-ouvertes.fr/hal-00420487

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

Y. Falcone, You Should Better Enforce Than Verify, 1st Int. Conf. on Runtime Verification, ser. LNCS, pp.89-105, 2010.
DOI : 10.1007/978-3-642-16612-9_9

URL : https://hal.archives-ouvertes.fr/hal-00523653

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, European Symposium on Research in Computer Security, pp.355-373, 2005.
DOI : 10.1007/11555827_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.7862

A. Saboori and C. N. Hadjicostis, Verification of K-step opacity and analysis of its complexity, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pp.5056-5061, 2009.
DOI : 10.1109/CDC.2009.5400083

H. Marchand, J. Dubreil, and T. Jéron, Automatic Testing of Access Control for Security Properties, 21th IFIP Int. Conf. on Testing of Communicating Systems, ser. LNCS, pp.113-128, 2009.
DOI : 10.1007/3-540-48320-9_6

URL : https://hal.archives-ouvertes.fr/inria-00420424

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-41, 2009.
DOI : 10.1145/1455526.1455532

J. Dubreil, T. Jéron, and H. Marchand, Monitoring confidentiality by diagnosis techniques, European Contr. Conf, pp.2584-2590, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00420420

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1007/s10703-011-0114-4

URL : https://hal.archives-ouvertes.fr/hal-00576948

A. Saboori and C. N. Hadjicostis, Verification of initial-state opacity in security applications of discrete event systems, Information Sciences, vol.246, pp.115-132, 2013.
DOI : 10.1016/j.ins.2013.05.033