Decentralized Enforcement of Artifact Lifecycles, 2016 IEEE 20th International Enterprise Distributed Object Computing Conference (EDOC), 2016. ,
DOI : 10.1109/EDOC.2016.7579380
Towards Practical Enforcement Theories, Proceedings of The 14th Nordic Conference on Secure IT Systems, pp.239-254, 2009. ,
DOI : 10.1016/j.ic.2007.07.009
Predictability of Enforcement, Proceedings of the International Symposium on Engineering Secure Software and Systems 2011, pp.73-86, 2011. ,
DOI : 10.1016/j.ic.2007.07.009
The resultmaker online consultant: From declarative workflow management in practice to LTL, EDOCW, pp.135-14257, 2008. ,
Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.43-551301314, 2004. ,
DOI : 10.1109/SECPRI.2004.1301314
A practical alternative to hierarchical integrity policies, 1985. ,
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-21436295, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
URL : http://www.comp.nus.edu.sg/~cs4236/readings/chwall.pdf
Alves-Foss, A trace-based model of the Chinese wall security policy, Proc. of the 22nd National Information Systems Security Conference, 1999. ,
Integrity considerations for secure computer systems, Tech. rep., MITRE Corporation, 1977. ,
Enforcing Privacy Policies with Meta-Code, Proceedings of the 6th Asia-Pacific Workshop on Systems, APSys '15, pp.2015-2031 ,
DOI : 10.1109/CSF.2014.28
Business artifacts: An approach to operational specification, IBM Syst, J, vol.42, issue.3, pp.428-445, 2003. ,
DOI : 10.1147/sj.423.0428
Towards Formal Analysis of Artifact-Centric Business Process Models, BPM, pp.288-304, 2007. ,
DOI : 10.1007/978-3-540-75183-0_21
URL : http://www-db.research.bell-labs.com/project/e-services-composition/BPM-2007-analysis-of-artifact-workflows.pdf
On the Duality of Information-Centric and Activity-Centric Models of Business Processes, CAiSE, pp.32-47, 2008. ,
DOI : 10.1007/978-3-540-69534-9_3
Business artifacts with guard-stage-milestone lifecycles, Proceedings of the 5th ACM international conference on Distributed event-based system, DEBS '11, pp.51-62, 2011. ,
DOI : 10.1145/2002259.2002270
Declarative business artifact centric modeling of decision and knowledge intensive business processes, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference, pp.151-160, 2011. ,
DOI : 10.1109/EDOC.2011.36
Modeling and Enacting Complex Data Dependencies in Business Processes, BPM, pp.171-186, 2013. ,
DOI : 10.1007/978-3-642-40176-3_14
PHILharmonicFlows: towards a framework for object-aware process management, Journal of Software Maintenance and Evolution: Research and Practice, vol.23, issue.2, pp.205-244, 2011. ,
DOI : 10.1007/s00450-009-0057-9
Foundations of Relational Artifacts Verification, BPM, pp.379-395, 2011. ,
DOI : 10.1147/sj.423.0428
Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011. ,
DOI : 10.1109/MC.2011.225
Fine-grained user privacy from avenance tags, p.36285 ,
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
URL : http://www.zurich.ibm.com/~jca/papers/cssf05.pdf
Enforcing Constraints on Life Cycles of Business Artifacts, 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering, pp.111-11846, 2009. ,
DOI : 10.1109/TASE.2009.46
Business policy modeling and enforcement in databases, PVLDB, vol.4, issue.11, pp.921-931, 2011. ,
Artifact-Centric Workflow Dominance, ICSOC-ServiceWave, pp.130-143, 2009. ,
DOI : 10.1007/978-3-642-10383-4_9
URL : http://www.cs.ucsb.edu/%7Esu/papers/2009/ICSOC2009.pdf
Specification and Verification of Artifact Behaviors in Business Process Models, ICSOC, pp.181-192, 2007. ,
DOI : 10.1007/978-3-540-74974-5_15
Specifying and Validating Data-Aware Temporal Web Service Properties, IEEE Transactions on Software Engineering, vol.35, issue.5, p.29, 2009. ,
DOI : 10.1109/TSE.2009.29
Verifying GSM-Based Business Artifacts, 2012 IEEE 19th International Conference on Web Services, pp.25-32, 2012. ,
DOI : 10.1109/ICWS.2012.31
URL : http://www.doc.ic.ac.uk/~alessio/papers/12/ICWS-PG+.pdf
Verifiable UML artifactcentric business process models, Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management , CIKM 2014, pp.1289-1298, 2014. ,
DOI : 10.1145/2661829.2662050
Runtime Enforcement of Web Service Message Contracts with Data, IEEE Transactions on Services Computing, vol.5, issue.2 ,
DOI : 10.1109/TSC.2011.10
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1145/1273442.1250746
URL : https://hal.archives-ouvertes.fr/hal-00576948
Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016. ,
DOI : 10.1016/j.scico.2016.02.008
URL : https://hal.archives-ouvertes.fr/hal-01281727
You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-04766-4_20
URL : https://hal.archives-ouvertes.fr/hal-00523653
Pathchecker: an RFID application for tracing products in supply-chains, pp.1-14, 2009. ,
Decentralised LTL Monitoring, FM, pp.85-100, 2012. ,
DOI : 10.1007/978-3-642-32759-9_10
URL : https://hal.archives-ouvertes.fr/hal-01313730
Organising LTL Monitors over Distributed Systems with a Global Clock, RV, pp.140-155, 2014. ,
DOI : 10.1007/978-3-319-11164-3_12
URL : https://hal.archives-ouvertes.fr/hal-01120551
Decentralised LTL monitoring, Formal Methods in System Design, vol.48, pp.1-2 ,
DOI : 10.1007/978-3-642-32759-9_10
URL : https://hal.archives-ouvertes.fr/hal-01313730
Organising LTL monitors over distributed systems with a global clock, Formal Methods in System Design, vol.49, issue.12 ,
DOI : 10.1007/978-3-319-11164-3_12
URL : https://hal.archives-ouvertes.fr/hal-01120551
Efficient and Generalized Decentralized Monitoring of Regular Languages, Lecture Notes in Computer Science, vol.8461, pp.66-83, 2014. ,
DOI : 10.1007/978-3-662-43613-4_5
URL : https://hal.archives-ouvertes.fr/hal-00972559
Cooperative runtime monitoring, Enterprise Information Systems, vol.7, issue.4, pp.395-423, 2013. ,
DOI : 10.1080/17517575.2012.683812
Sticky policy enabled authenticated OOXML, 2016 SAI Computing Conference (SAI) ,
DOI : 10.1109/SAI.2016.7556117
Bitcoin: A peer-to-peer electronic cash system URL https, 2008. ,
Bitcoin developer reference (2016) URL https://github.com/minium/Bitcoin-Spec ,
Role-based access control, pp.554-563, 1992. ,
Web service description language, 2001. ,
Classifying Discrete Temporal Properties, STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science Proceedings, pp.32-46, 1999. ,
DOI : 10.1007/3-540-49116-3_3
URL : http://www-i7.informatik.rwth-aachen.de/~wilke/publications/STACS99.html.ps.gz
New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 2000. ,
DOI : 10.1109/49.839937
SealTest: a simple library for test sequence generation, in: Bultan and Sen, pp.392-395 ,
LabPal: repeatable computer experiments made easy, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis , ISSTA 2017, pp.404-407 ,
DOI : 10.1109/EDOC.2016.7579380