The theory of timed automata, Real-Time: Theory in Practice, pp.45-73, 1992. ,
DOI : 10.1007/BFb0031987
Enforceable security policies revisited, ACM Trans. Inf. Syst. Secur, vol.163, issue.1, pp.1-3, 2013. ,
DOI : 10.1007/978-3-642-28641-4_17
Algorithms for Monitoring Real-Time Properties, Proceedings of the 2nd International Conference on Runtime Verification, pp.260-275, 2011. ,
DOI : 10.1007/978-3-642-29860-8_20
Shield Synthesis:, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.533-548, 2015. ,
DOI : 10.1007/978-3-662-46681-0_51
Runtime enforcement for componentbased systems, Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp.1789-1796, 2015. ,
DOI : 10.1145/2695664.2695879
URL : https://hal.archives-ouvertes.fr/hal-01248353
LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper), 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009. ,
DOI : 10.1109/SEFM.2009.13
Safe Runtime Verification of Real-Time Properties, Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems, pp.103-117, 2009. ,
DOI : 10.1016/0020-0190(91)90122-X
Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015. ,
DOI : 10.1007/s10207-014-0239-8
A tutorial on runtime verification, Engineering Dependable Software Systems NATO Science for Peace and Security Series, D: Information and Communication Security, pp.141-175, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853727
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1007/s10703-011-0114-4
URL : https://hal.archives-ouvertes.fr/hal-00576948
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
DOI : 10.1016/j.jlap.2008.08.004
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, pp.420-427, 2014. ,
DOI : 10.3182/20140514-3-FR-4046.00041
URL : https://hal.archives-ouvertes.fr/hal-00974548
Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014. ,
DOI : 10.1145/2554850.2554967
URL : https://hal.archives-ouvertes.fr/hal-00907571
Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.45381-422, 2014. ,
DOI : 10.1007/s10703-014-0215-y
URL : https://hal.archives-ouvertes.fr/hal-01088136
Runtime Enforcement of Timed Properties, Third International Conference ??(nobs(? d , t)).?e). This means that P(?.(t , a), t) holds, pp.229-244, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
Since w b ? G(Reach(?s, t ), ??(nobs(? b , t )).?c), w b satisfies ?? ,
By construction, ? d satisfies ??(? d ) ??(nobs(? b , t )).?c and ? d = =? date(? d (1)) ? t . ?Projection on ?u: Since a ? ?u, ? t|?u = (?s.(t , a). obs(? d , t)) |?u . ? d ? tw(?c), thus ? t|?u = ? s|?u ,
By construction, ? d satisfies ??(? d ) ??(? b ).?c.a, and ? d = =? date(? d (1)) ? t . ?Projection on ?u: ? t|?u = (?s . obs(? d , t)) |?u . Since ? d ? tw(?c) ,