L. Vue-logique-temporelle-des-r-propriétés and .. , 44 3.5.1 Syntaxe et sémantique, p.46

P. Conclusion, 60 j-VETO : a Java Verification and Enforcement TOolbox

M. Intégration-du, 147 8.5.1 Mapping2Aspect : Génération d'aspectsàaspects`aspectsà partir de mappings, p.150

.. Modèle-et-utilitaires-communs-pour-les-automates, 152 8.6.1 GraphMaker : des graphes pour les DFAs, automates de Streett, et moniteurs . 152 8.6.2 Monitor Composer : Composition de moniteurs, p.153

P. Conclusion, 155 j-POST : a Java toolchain for Property-Oriented Software Testing Sommaire 9.1 Introduction, p.159

T. Génération-des, 162 9.3.1 Vue d'ensemble de la génération de test, p.165

P. Conclusion, R. Kalam, P. Baida, S. Balbiani, F. Benferhat et al., Organization Based Access Control Aspects for trace monitoring. In Formal Approaches to Software Testing and Runtime Verification, First Combined International Workshops, FATES, AH07] Gail-Joon Ahn and Hongxin Hu. Towards Realizing a Formal RBAC Model in Real Systems. In SACMAT '07 : Proceedings of the 12th ACM symposium on Access control models and technologies, pp.20-39, 2003.

C. Artho, K. Havelund, and A. Biere, High-level data races, Software Testing, Verification and Reliability, vol.15, issue.4, pp.207-227, 2003.
DOI : 10.1002/stvr.281

F. B. Bowen-alpern, E. Schneider, R. Brinksma, J. Alderden, and . Langerak, Defining liveness, Second International Workshop on Protocol Test Systems, pp.181-185, 1985.
DOI : 10.1016/0020-0190(85)90056-0

A. Bauer, The Theory and Practice of Runtime Reflection?A Model-based Framework for Dynamic Analysis of Distributed Reactive Systems. Number 1. VDM Verlag Dr. Müller D-Finder : A tool for compositional deadlock detection and verification, Lecture Notes in Computer Science, vol.5643, pp.614-619, 2008.

Y. Springer, P. C. Bertot, F. Bouquet, F. Dadeau, J. Groslambert et al., Interactive Theorem Proving and Program Development Coq'Art : The Calculus of Inductive Constructions Texts in Theoretical Computer Science Safety property driven test generation from JML specifications, Lecture Notes in Computer Science, vol.4262, pp.225-239, 2004.

B. Beizer, Software Testing Techniques, 1990.

S. Bensalem, J. Fernandez, K. Havelund, and L. Mounier, Confirmation of deadlock potentials detected by runtime analysis, Proceeding of the 2006 workshop on Parallel and distributed systems: testing and debugging , PADTAD '06, pp.41-50, 2006.
DOI : 10.1145/1147403.1147412

A. Belinfante, L. Frantzen, and C. Schallhart, 14 Tools for Test Case Generation
DOI : 10.1007/11498490_18

[. Bensalem and K. Havelund, Dynamic Deadlock Analysis of Multi-threaded Programs, Hardware and Software Verification and Testing, First International Haifa Verification Conference, pp.208-223, 2005.
DOI : 10.1007/11678779_15

E. Bodden and K. Havelund, Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, pp.155-165, 2008.
DOI : 10.1145/1390630.1390650

E. Bodden and K. Havelund, Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, 2009.
DOI : 10.1145/1390630.1390650

H. Barringer, K. Havelund, D. Rydeheard, and A. Groce, Rule Systems for Runtime Verification: A Short Tutorial, Runtime Verification'09, 2007.
DOI : 10.1007/3-540-12896-4_374

M. Broy and B. Jonsson, Model-Based Testing of Reactive Systems, Advanced Lectures [The volume is the outcome of a research seminar that was held in Schloss Dagstuhl, Lecture Notes in Computer Science, vol.3472, 2004.

C. Baier and J. Katoen, Principles of Model Checking, 2008.

A. Bauer, M. Leucker, and C. Schallhart, Monitoring of Real-Time Properties
DOI : 10.1007/11944836_25

A. Bauer, M. Leucker, and C. Schallhart, The Good, the Bad, and the Ugly, But How Ugly Is Ugly?, Proceedings of the 7th International Workshop on Runtime Verification (RV), pp.126-138, 2007.
DOI : 10.1007/978-3-540-77395-5_11

A. Bauer, M. Leucker, and C. Schallhart, Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007.
DOI : 10.1145/2000799.2000800

A. Bauer, M. Leucker, and C. Schallhart, Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007.
DOI : 10.1145/2000799.2000800

A. Bauer, M. Leucker, and C. Schallhart, Comparing LTL Semantics for Runtime Verification, Journal of Logic and Computation, vol.20, issue.3, 2009.
DOI : 10.1093/logcom/exn075

[. Bauer, J. Ligatti, and D. Walker, Composing security policies with polymer, PLDI '05 : Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.305-314, 2005.

H. Barringer, D. Rydeheard, and K. Havelund, Rule Systems for Run-time Monitoring: from EAGLE to RULER, Journal of Logic and Computation, vol.20, issue.3, pp.111-125, 2007.
DOI : 10.1093/logcom/exn076

E. Brinksma, A theory for the derivation of tests, Protocol Specification, testing and verification VIII, pp.63-74, 1988.

E. Brinksma and J. Tretmans, Testing Transition Systems: An Annotated Bibliography, Modeling and Verification of Parallel Processes, pp.187-195, 2000.
DOI : 10.1007/3-540-45510-8_9

P. Cousot and R. Cousot, Abstraction interpretation and application to logic programs, IN SOFTWARE VERIFICATION, p.13, 2002.

F. Cuppens, N. Cuppens-boulahia, and T. Ramard, Availability enforcement by obligations and aspects identification, First International Conference on Availability, Reliability and Security (ARES'06), pp.229-239, 2006.
DOI : 10.1109/ARES.2006.36

[. Cuppens, N. Cuppens-boulahia, and T. Sans, Nomad: A Security Model with Non Atomic Actions and Deadlines, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.186-196, 2005.
DOI : 10.1109/CSFW.2005.20

[. Chen, M. D. Amorim, and G. Ro¸suro¸su, Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP, Workshop on Runtime Verification (RV'05), pp.3-20, 2005.
DOI : 10.1016/j.entcs.2006.02.002

E. M. Clarke, Orna Grumberg, and Doron Peled. Model Checking, 1999.

S. Colin and L. Mariani, 18 Run-Time Verification, Modelbased Testing of Reactive Systems, pp.525-556, 2005.
DOI : 10.1007/11498490_24

E. Chang, Z. Manna, and A. Pnueli, The Safety-Progress Classification, 1992.
DOI : 10.1007/978-3-642-58041-3_5

Y. Edward, Z. Chang, A. Manna, and . Pnueli, Characterization of Temporal Property Classes, Automata, Languages and Programming, pp.474-486, 1992.

I. Cerna and R. Pelanek, Relating the hierarchy of temporal properties to model checking, Proceedings of Mathematical Foundations of Computer Science (MFCS 2003), pp.318-327, 2003.

[. Caspi, D. Pilaud, N. Halbwachs, and J. A. Plaice, LUSTRE: a declarative language for real-time programming, Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '87, pp.178-188, 1987.
DOI : 10.1145/41625.41641

J. Crow and J. Rushby, Model-based reconfiguration : Diagnosis and recovery, NASA Contractor Report, vol.4596

[. Chen and G. Ro¸suro¸su, Java-MOP: A Monitoring Oriented Programming Environment for Java, Proceedings of the Eleventh International Conference on Tools and Algorithms for the construction and analysis of systems (TACAS'05), pp.546-550, 2005.
DOI : 10.1007/978-3-540-31980-1_36

[. Chen and G. Ro¸suro¸su, MOP : An Efficient and Generic Runtime Verification Framework, Object-Oriented Programming, Systems, Languages and Applications(OOPSLA'07), pp.569-588, 2007.

[. Chen and G. Ro¸suro¸su, Parametric Trace Slicing and Monitoring, Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'09), pp.246-261, 2009.
DOI : 10.1023/A:1011227529550

F. Chen, T. , and G. Ro¸suro¸su, jPredictor, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.221-230, 2008.
DOI : 10.1145/1368088.1368119

E. M. Clarke and J. M. Wing, Formal methods: state of the art and future directions, ACM Computing Surveys, vol.28, issue.4, pp.626-643, 1996.
DOI : 10.1145/242223.242257

URL : https://hal.archives-ouvertes.fr/hal-00444076

J. Dubreil, P. Darondeau, H. Darmaillacq, J. Fernandez, R. Groz et al., Opacity Enforcing Control Synthesis Eléments de modélisation pour le test de politique de sécurité Test Generation for Network Security Rules, Proceedings of the 9th International Workshop on Discrete Event Systems (WODES'08) CRiSIS, Bourges, 2005. [DFG + 06] Vianney Darmaillacq Testing of Communicating Systems, pp.28-35, 2008.

N. Delgado, A. Q. Gates, and S. Roach, A taxonomy and catalog of runtime software-fault monitoring tools, International Conference, pp.341-356, 2004.
DOI : 10.1109/TSE.2004.91

J. Dubreil, T. Jéron, and H. Marchand, Construction de moniteurs pour la surveillance de propriétés de sécurité, 6` eme Colloque Francophone sur la Modélisation des Systèmes Réactifs, 2007.

J. Dubreil, T. Jéron, and H. Marchand, Monitoring confidentiality by diagnosis techniques, European Control Conference, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00420420

A. Santana-de-oliveira, E. K. Wang, C. Kirchner, G. Kirchneramorim, and . Ro¸suro¸su, Weaving rewrite-based access control policies Efficient monitoring of ?-languages Test generation and execution for security rules in temporal logic, ACM Conference on Computer and Communication Security Proceedings of 17th International Conference on Computer-aided Verification (CAV'05) ICSTW '08 : Proceedings of the 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pp.364-378, 2005.

E. Dustin, J. Rashka, J. Pauldv01, ]. R. De-vriesec80, ]. E. Emerson et al., Automated software testing : introduction, management, and performance Towards formal test purposes Characterizing correctness properties of parallel programs using fixpoints, Formal Approaches to Testing of Software 2001 (FATES'01) NS-01-4 of BRICS Notes Series Proceedings of the 7th Colloquium on Automata, Languages and Programming, pp.61-76, 1980.

C. Eisner, D. Fisman, J. Havlicek, Y. Lustig, A. Mcisaac et al., Reasoning with Temporal Logic on Truncated Paths, CAV, pp.27-39, 2003.
DOI : 10.1007/978-3-540-45069-6_3

M. D. Ernst, J. H. Perkins, P. J. Guo, S. Mccamant, C. Pacheco et al., The Daikon system for dynamic detection of likely invariants, Science of Computer Programming, vol.69, issue.1-3, pp.1-335, 2007.
DOI : 10.1016/j.scico.2007.01.015

U. Erlingsson and F. B. Schneider, IRM enforcement of Java stack inspection, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.246-255, 2000.
DOI : 10.1109/SECPRI.2000.848461

[. Erlingsson and F. B. Schneider, SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, 2000.
DOI : 10.1145/335169.335201

F. Ylì, A Travel Agency Application, 2007.

Y. Falcone, A. Concha, L. Mounier, and J. Fernandez, j-VETO : a Java Verification and Enforcement Toolbox, 2009.

C. Flanagan, N. Stephen, and . Freund, Atomizer : a dynamic atomicity checker for multithreaded programs, POPL '04 : Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.256-267, 2004.

J. Ylì-es-falcone, L. Fernandez, and . Mounier, Synthesizing enforcement monitors wrt. the safety-progress classification of properties, ICISS '08 : Proceedings of the 4th International Conference on Information Systems Security, pp.41-55, 2008.

J. Ylì-es-falcone, L. Fernandez, and . Mounier, Synthesizing enforcement monitors wrt. the safety-progress classification of properties, ICISS '08 : Proceedings of the 4th International Conference on Information Systems Security, pp.41-55, 2008.

J. Ylì-es-falcone, L. Fernandez, and . Mounier, Enforcement monitoring wrt. the safety-progress classification of properties, SAC, pp.593-600, 2009.

J. Ylì-es-falcone, L. Fernandez, and . Mounier, Runtime verification of safetyprogress properties, RV'09 : Proceedings of the 9th International Workshop on Runtime Verification, 2009.

[. Falcone, J. Fernandez, and L. Mounier, Specifying properties in the safety-progress classification for runtime verification, 2009.

J. Ylì-es-falcone, L. Fernandez, J. Mounier, and . Richier, A test calculus framework applied to network security policies In Formal Approaches to Software Testing and Runtime Verification, First Combined International Workshops, FATES, pp.55-69, 2006.

J. Ylì-es-falcone, L. Fernandez, J. Mounier, and . Richier, A Compositional Testing Framework Driven by Partial Specifications, Alexandre Petrenko, Margus Veanes, pp.107-122, 2007.
DOI : 10.1007/978-3-540-73066-8_8

Y. Falcone, J. Fernandez, L. Mounier, and J. Richier, A partialspecification driven compositional testing method, 2007.

J. Ylì-es-falcone, L. Fernandez, J. Mounier, and . Richier, Runtime enforcement monitors : composition, synthesis, and enforcement abilities, 2008.

[. Fromentin, C. Jard, G. Jourdan, and M. Raynal, On-the-fly analysis of distributed computations, Information Processing Letters, vol.54, issue.5
DOI : 10.1016/0020-0190(95)00048-H

URL : https://hal.archives-ouvertes.fr/inria-00074088

R. W. Floyd, Assigning meanings to programs, Symposia in Applied Mathematics, pp.19-32, 1967.

[. Falcone, L. Mounier, J. Fernandez, and J. Richier, j-POST : a Java tool chain for Property-Oriented Software Testing, 2008.

L. Falcone, J. Mounier, J. Fernandez, and . Richier, j-POST: a Java Toolchain for Property-Oriented Software Testing, Thèse 185 Ylì es C. Falcone BIBLIOGRAPHIE, pp.29-41, 2008.
DOI : 10.1016/j.entcs.2008.11.004

URL : https://hal.archives-ouvertes.fr/hal-00346061

J. Fernandez, L. Mounier, and C. Pachon, Property Oriented Test Case Generation, Formal Approaches to Software Testing, Third International Workshop on Formal Approaches to Testing of Software, FATES 2003, pp.147-163, 2003.
DOI : 10.1007/978-3-540-24617-6_11

W. L. Philip and . Fong, Access control by tracking shallow execution history, Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp.43-55, 2004.

C. Flanagan and S. Qadeer, Types for atomicity, TLDI '03 : Proceedings of the 2003 ACM SIGPLAN international workshop on Types in languages design and implementation, pp.1-12, 2003.

[. Giannakopoulou and K. Havelund, Runtime analysis of linear temporal logic specifications, RIACS, 2001.

J. Grabowski, SDL and MSC based test case generation? an overall view of the SAMSTAG method, IAM-94-0005, 1994.

[. Gu, J. Vetter, and K. Schwan, An annotated bibliography of interactive program steering, ACM SIGPLAN Notices, vol.29, issue.9, pp.140-148, 1994.
DOI : 10.1145/185009.185038

K. W. Hamlen, Security Policy Enforcement By Automated Program-Rewriting, 2006.

J. J. Harrow, Runtime Checking of Multithreaded Applications with Visual Threads, Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification, pp.331-342, 2000.
DOI : 10.1007/10722468_20

A. Hartman, Model based test generation tools survey, 2002.

K. Havelund, Using Runtime Analysis to Guide Model Checking of Java Programs, Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification, pp.245-264, 2000.
DOI : 10.1007/10722468_15

H. Hallal, S. Boroday, A. Ulrich, and A. Petrenko, An automatabased approach to property testing in event traces, Proceedings of the IFIP TC6/WG6.1 XV International Conference on Testing of Communicating Systems, 2003.

N. Halbwachs, P. Caspi, P. Raymond, and D. Pilaud, The synchronous dataflow programming language lustre, Proceedings of the IEEE, pp.1305-1320, 1991.

C. Heitmeyer, On the need for practical formal methods In In Formal Techniques in RealTime and Real-Time Fault-Tolerant Systems, Proc., 5th Intern. Symposium (FTRTFT'98, pp.18-26, 1998.

J. [. Halbwachs, A. Fernandez, and . Bouajjanni, An executable temporal logic to express safety properties and its connection with the language lustre, Sixth International Symp. on Lucid and Intensional Programming, ISLIP'93, 1993.

K. Havelund and A. Goldberg, Verify Your Runs, Verified Software : Theories, Tools, Experiments : First IFIP TC 2/WG 2.3 Conference, VSTTE 2005 Revised Selected Papers and Discussions, pp.374-383, 2005.
DOI : 10.1007/11494881_14

[. Halbwachs, F. Lagnier, and P. Raymond, Synchronous Observers and the Verification of Reactive Systems, AMAST '93 : Proceedings of the Third International Conference on Methodology and Software Technology, pp.83-96, 1994.
DOI : 10.1007/978-1-4471-3227-1_8

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

J. Hopcroft, R. Motwani, and J. Ullman, Introduction to Automata Theory, Languages, and Computation, 1979.

]. C. Hoa69 and . Hoare, An axiomatic basis for computer programming, Communications of the ACM, vol.12, issue.10, pp.576-580, 1969.

K. Havelund and T. Pressburger, Model checking JAVA programs using JAVA PathFinder, International Journal on Software Tools for Technology Transfer (STTT), vol.2, issue.4, pp.366-381, 2000.
DOI : 10.1007/s100090050043

K. Havelund and G. Rosu, Monitoring Java Programs with Java PathExplorer, Electronic Notes in Theoretical Computer Science, vol.55, issue.2, 2001.
DOI : 10.1016/S1571-0661(04)00253-1

K. Havelund and G. Rosu, Synthesizing Monitors for Safety Properties, TACAS '02 : Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2002.
DOI : 10.1007/3-540-46002-0_24

[. Ieee, Ieee standard 1012-2004 for software verification and validation, 2005.

C. Jard and T. Jéron, On-line model-checking for finite linear temporal logic specifications, Lecture Notes in Computer Science, vol.407, pp.189-196, 1989.
DOI : 10.1007/3-540-52148-8_16

URL : https://hal.archives-ouvertes.fr/inria-00075517

C. Jard and T. Jéron, TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, pp.297-315, 2005.
DOI : 10.1007/s10009-004-0153-x

[. Jéron, C. Jard, G. Jourdan, and J. Rampon, A general approach to trace-checking in distributed computing systems, Proc. 14th IEEE Int. Conf. on DCS, pp.396-403, 1994.

J. Ligatti, L. Bauer, and D. Walker, Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2007.

[. Jéron, H. Marchand, V. Rusu, and V. Tschaen, Ensuring the conformance of reactive discrete-event systems by means of supervisory control, International Journal of Production Research, vol.17, issue.14, pp.2809-2826, 2004.
DOI : 10.1109/5.21072

H. Kamp, Tense Logic and the Theory of Linear Order, 1968.

S. Katz, Aspect categories and classes of temporal properties. Theoritical Aspect- Oriented Software Development I, pp.106-134, 2006.

[. Koch, J. Grabowski, D. Hogrefe, and M. Schmitt, Autolink-a tool for automatic test generation from SDL specifications, Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques, p.114, 1998.
DOI : 10.1109/WIFT.1998.766305

T. Ab-teknillinen-korkeakoulu, T. Hgskolan, H. Korkeakoulu, and . Tauriainen, On translating linear temporal logic into alternating and nondeterministic automata, 2003.

S. Kleene, Representation of Events in Nerve Nets and Finite Automata, pp.3-42, 1951.
DOI : 10.1515/9781400882618-002

G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes et al., Aspect-oriented programming, ECOOP, pp.220-242, 1997.

Z. Krena, R. Letko, S. Tzoref, T. Ur, and . Vojnar, Healing data races on-the-fly, Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, PADTAD '07, pp.54-64, 2007.
DOI : 10.1145/1273647.1273658

Z. Krena, R. Letko, and . Tzoref, Shmuel Ur, and Tomá? Vojnar. A concurrency testing tool and its plug-ins for dynamic analysis and runtime healing, 2009.

M. Krichen and S. Tripakis, Conformance testing for real-time systems, Formal Methods in System Design, vol.10, issue.1???2, pp.238-304, 2009.
DOI : 10.1007/s10703-009-0065-1

[. Kupferman and M. Y. Vardi, Model checking of safety properties. Form, Formal Methods in System Design, vol.19, issue.3, pp.291-314, 2001.
DOI : 10.1023/A:1011254632723

L. Lamport, Proving the Correctness of Multiprocess Programs, IEEE Transactions on Software Engineering, vol.3, issue.2, pp.125-143, 1977.
DOI : 10.1109/TSE.1977.229904

L. Lamport, What good is temporal logic ?, IFIP Congress, pp.657-668, 1983.

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, ESORICS, pp.355-373, 2005.
DOI : 10.1007/11555827_21

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-41, 2009.
DOI : 10.1145/1455526.1455532

[. Lestiennes and M. Gaudel, Testing processes from formal specifications with inputs, outputs and data types, 13th International Symposium on Software Reliability Engineering, 2002. Proceedings., pp.3-14, 2002.
DOI : 10.1109/ISSRE.2002.1173206

[. Ligatti, Policy Enforcement via Program Monitoring, 2006.

S. Lee, M. Kannan, O. Kim, M. Sokolsky, and . Viswanathan, Runtime assurance based on formal specifications, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999.

M. Leucker and C. Schallhart, A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008.
DOI : 10.1016/j.jlap.2008.08.004

[. Lee and M. Yannakakis, Principles and methods of testing finite state machines-a survey, Proceedings of the IEEE, pp.1090-1123, 1996.
DOI : 10.1109/5.533956

[. Markey, Logiques temporelles pour la vérification : expressivité, complexité, algorithmes, 2003.

[. Matteucci, Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007.
DOI : 10.1016/j.entcs.2007.03.025

[. Marchand, J. Dubreil, and T. Jéron, Génération automatique de tests pour des propriétés de sécurité, 4` eme Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, pp.157-174, 2009.

F. Martinell and I. Matteucci, Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007.
DOI : 10.1016/j.entcs.2006.08.029

W. Mallouli, A. Mammar, and A. R. Cavalli, Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines, 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, pp.173-180, 2008.
DOI : 10.1109/DS-RT.2008.22

URL : https://hal.archives-ouvertes.fr/hal-01380237

W. Mallouli, G. Morales, and A. Cavalli, Testing Security Policies for Web Applications, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pp.269-270, 2008.
DOI : 10.1109/ICSTW.2008.45

URL : https://hal.archives-ouvertes.fr/hal-00796098

J. Mallouli, A. Orset, N. Cavalli, F. Cuppens, and . Cuppens, A formal approach for testing security rules, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.127-132, 2007.
DOI : 10.1145/1266840.1266860

R. Mcnaughton and S. A. Papert, Counter-Free Automata (M.I.T. research monograph no. 65), 1971.

[. Manna and A. Pnueli, Adequate proof principles for invariance and liveness properties of concurrent programs, Science of Computer Programming, vol.4, issue.3, pp.257-289, 1984.
DOI : 10.1016/0167-6423(84)90003-0

O. Maler and A. Pnueli, Tight bounds on the complexity of cascaded decomposition of automata, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science, pp.672-682, 1990.
DOI : 10.1109/FSCS.1990.89589

[. Manna and A. Pnueli, A hierarchy of temporal properties, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing , PODC '87, 1989.
DOI : 10.1145/41840.41857

D. L. Patricia, D. A. Machado, A. C. Silva, and . Mota, Towards property oriented testing, Electron. Notes Theor. Comput. Sci, vol.184, pp.3-19, 2007.

[. Mallouli, B. Wehbi, and A. R. Cavalli, Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking, Lecture Notes in Computer Science, vol.5198, pp.345-356, 2008.
DOI : 10.1007/978-3-540-85209-4_27

URL : https://hal.archives-ouvertes.fr/hal-01327393

J. Glenford and . Myers, The Art of Software Testing, Second Edition, 2004.

[. Nahm, J. Grabowski, and D. Hogrefe, Test case generation for temporal properties, 1993.

R. De, N. , and M. Hennessy, Testing equivalence for processes, Proceedings of the 10th Colloquium on Automata, Languages and Programming, pp.548-560, 1983.

N. Nethercote and J. Seward, Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007.
DOI : 10.1145/1273442.1250746

URL : http://doi.org/10.1016/s1571-0661(04)81042-9

S. Owicki and L. Lamport, Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3
DOI : 10.1145/357172.357178

A. Pnueli and Z. Manna, The Temporal Logic of Reactive and Concurrent Systems : Specification : 001, 1991.

R. Pellizzoni, P. Meredith, M. Caccamo, and G. Rosu, Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems, 2008 Real-Time Systems Symposium, pp.481-491, 2008.
DOI : 10.1109/RTSS.2008.43

A. Jaime, L. Pavlich-mariscal, S. A. Michel, and . Demurjian, A formal enforcement framework for role-based access control using aspect-oriented programming, MoDELS, pp.537-552, 2005.

[. Pretschner, T. Mouelhi, and Y. L. Traon, Model-Based Tests for Access Control Policies, 2008 International Conference on Software Testing, Verification, and Validation, pp.338-347, 2008.
DOI : 10.1109/ICST.2008.44

URL : https://hal.archives-ouvertes.fr/inria-00456952

J. [. Plattner and . Nievergelt, Special Feature: Monitoring Program Execution: A Survey, Computer, vol.14, issue.11, pp.76-93, 1981.
DOI : 10.1109/C-M.1981.220255

A. Pnueli, The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977.
DOI : 10.1109/SFCS.1977.32

[. Pecheur, F. Raimondi, and G. Brat, A formal analysis of requirementsbased testing, ISSTA '09 : Proceedings of the eighteenth international symposium on Software testing and analysis, pp.47-56, 2009.

[. Prisacariu and G. Schneider, A Formal Language for Electronic Contracts, FMOODS'07, pp.174-189, 2007.
DOI : 10.1111/1467-9337.00106

A. Pnueli and A. Zaks, PSL Model Checking and Run-Time Verification Via Testers, In FM, pp.573-586, 2006.
DOI : 10.1007/11813040_38

F. Rogin, T. Klotz, G. Fey, R. Drechsler, and S. Rülke, Automatic generation of complex properties for hardware designs, Thèse 189 Ylì es C. Falcone BIBLIOGRAPHIE DATE '08 : Proceedings of the conference on Design, automation and test in Europe, pp.545-548, 2008.

H. Vlad-rusu, T. Marchand, and . Jéron, Verification and Symbolic Test Generation for Safety Properties, 2004.

M. [. Rajan, M. R. Whalen, and . Heimdahl, Model Validation using Automatically Generated Requirements-Based Tests, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07), pp.95-104, 2007.
DOI : 10.1109/HASE.2007.57

H. Saiedian, Guest editor's corner research directions in formal methods technology transfer, Journal of Systems and Software, vol.40, issue.3, pp.187-189, 1998.
DOI : 10.1016/S0164-1212(97)00164-7

. A. Beth and . Schroeder, On-line monitoring : A tutorial, Computer, vol.28, issue.6, pp.72-78, 1995.

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853

J. Sifakis, A unified approach for studying the properties of transition systems, Theoretical Computer Science, vol.18, issue.3, pp.227-258, 1982.
DOI : 10.1016/0304-3975(82)90067-6

J. Sifakis, Research directions for formal methods, ACM workshop on Strategic Directions in Computing Research, 1996.

]. A. Sis85 and . Sistla, On characterization of safety and liveness properties in temporal logic, PODC '85 : Proceedings of the fourth annual ACM symposium on Principles of distributed computing, pp.39-48, 1985.

[. Smith, A computational induction principle, 1991.

R. S. Streett, Propositional Dynamic Logic of looping and converse, Proceedings of the thirteenth annual ACM symposium on Theory of computing , STOC '81, pp.375-383, 1981.
DOI : 10.1145/800076.802492

R. Tarjan, Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972.
DOI : 10.1137/0201010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.327.8418

J. Tretmans and E. Brinksma, TorX : Automated Model Based Testing -Côte de Resyste, Proceedings of the First European Conference on Model-Driven Software Engineering, pp.13-25, 2003.

Y. Le-traon, T. Mouelhi, and B. Baudry, Testing Security Policies: Going Beyond Functional Testing, The 18th IEEE International Symposium on Software Reliability (ISSRE '07), pp.93-102, 2007.
DOI : 10.1109/ISSRE.2007.27

J. Tretmans, Test case derivation from lotos specifications, FORTE '89 : Proceedings of the IFIP TC/WG6.1 Second International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, pp.345-359, 1990.

]. J. Tre96 and . Tretmans, Test Generation with Inputs, Outputs, and Quiescence, Second Int. Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pp.127-146, 1996.

J. Tretmans, Repetitive quiescence in implementation and testing, pp.23-37

N. Cuppens-boulahia-thierry-sans and F. Cuppens, A framework to enforce access control, usage control and obligations, Annals of Telecommunications, 2007.

[. Tan, O. Sokolsky, and I. Lee, Specification-based testing with linear temporal logic On computable numbers, with an application to the entscheidungsproblem, IRI Proc. London Math. Soc, pp.493-498230, 1936.

A. Machiel-van-der-bijl, J. Rensink, and . Tretmans, Action Refinement in Conformance Testing, Testing of Communicating Systems, pp.81-96, 2005.
DOI : 10.1007/978-3-540-24617-6_7

[. Viswanathan, Foundations for the run-time analysis of software systems, 2000.

M. Viswanathan and M. Kim, Foundations for the Run-Time Monitoring of Reactive Systems ??? Fundamentals of the MaC Language, Lecture Notes in Computer Science, vol.3407, pp.543-556, 2004.
DOI : 10.1007/978-3-540-31862-0_38

P. Wolper, Temporal logic can be more expressive, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.340-348, 1981.
DOI : 10.1109/SFCS.1981.44

URL : http://doi.org/10.1016/s0019-9958(83)80051-5

M. W. Whalen, A. Rajan, P. E. Mats, S. P. Heimdahl, and . Miller, Coverage metrics for requirements-based testing, Proceedings of the 2006 international symposium on Software testing and analysis , ISSTA'06, pp.25-36, 2006.
DOI : 10.1145/1146238.1146242

L. Zuck, Past Temporal Logic, 1986.

E. Brinksma, R. Alderden, R. Langerak, J. Van-de-lagemaat, and J. Tretmans, A Formal Approach to Conformance Testing, Second International Workshop on Protocol Test Systems, pp.349-363, 1990.

J. Tretmans, Test generation with inputs, outputs, and quiescence, Second Int. Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96, pp.127-146, 1996.
DOI : 10.1007/3-540-61042-1_42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.9528

C. Jard and T. Jéron, TGV: theory, principles and algorithms, The Sixth World Conference on Integrated Design & Process Technology (IDPT'02), 2002.
DOI : 10.1007/s10009-004-0153-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4262

A. Belinfante, J. Feenstra, R. De-vries, J. Tretmans, N. Goga et al., Formal Test Automation: A Simple Experiment, 12th International Workshop on Testing of Communicating Systems, 1999.
DOI : 10.1007/978-0-387-35567-2_12

M. Schmitt, B. Koch, J. Grabowski, and D. Hogrefe, Autolink -A Tool for Automatic and Semi-Automatic Test Generation from SDL Specifications, 1998.

R. Groz, T. Jéron, and A. Kerbrat, Automated test generation from SDL specifications, SDL'99 The Next Millenium, 9th SDL Forum, pp.135-152, 1999.

V. Darmaillacq, J. C. Fernandez, R. Groz, L. Mounier, and J. L. Richier, Test Generation for Network Security Rules, 18th IFIP International Conference, 2006.
DOI : 10.1007/11754008_22

R. Milner, A Calculus of Communicating Systems, Lecture Notes in Computer Science, vol.92, 1980.
DOI : 10.1007/3-540-10235-3

C. A. Hoare, Communicating Sequential Processes, 1985.

Y. Falcone, Un cadre formel pour le test de politiques de sécurité. Master's thesis, 2006.

A. Hartman, Model based test generation tools survey, 2002.

M. Van-der-bijl, A. Rensink, and J. Tretmans, Action Refinement in Conformance Testing, Testing of Communicating Systems (TESTCOM) LNCS, pp.81-96, 2005.
DOI : 10.1007/978-3-540-24617-6_7

V. Darmaillacq, J. C. Fernandez, R. Groz, L. Mounier, and J. L. Richier, Test Generation for Network Security Rules, pp.341-356, 2006.
DOI : 10.1007/11754008_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.3609

Y. Falcone, J. C. Fernandez, L. Mounier, and J. L. Richier, A Test Calculus Framework Applied to Network Security Policies, Formal Approaches to Software Testing and Runtime Verification, pp.55-69, 2006.
DOI : 10.1007/11940197_4

URL : https://hal.archives-ouvertes.fr/hal-00346032

K. Havelund and G. Rosu, Synthesizing Monitors for Safety Properties, ETAPS 2002 and TACAS 2002, pp.342-356, 2002.
DOI : 10.1007/3-540-46002-0_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.5386

F. Chen, M. Amorim, and G. Ro¸suro¸su, Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP, Workshop on Runtime Verification (RV'05), ENTCS, pp.3-20, 2005.
DOI : 10.1016/j.entcs.2006.02.002

C. Artho, H. Barringer, A. Goldberg, K. Havelund, S. Khurshid et al., Combining test case generation and runtime verification, Theoretical Computer Science, vol.336, issue.2-3, pp.2-3, 2005.
DOI : 10.1016/j.tcs.2004.11.007

URL : http://doi.org/10.1016/j.tcs.2004.11.007

Z. Manna and A. Pnueli, Temporal verification of reactive systems: safety, 1995.
DOI : 10.1007/978-1-4612-4222-2

Y. Falcone, J. C. Fernandez, L. Mounier, and J. L. Richier, A partial specification driven compositional testing method and tool, Vérimag Research Report, 2007.

S. C. Kleene, Representation of Events in Nerve Nets and Finite Automata, Automata Studies, pp.3-41, 1956.
DOI : 10.1515/9781400882618-002

H. Mantel, W. Stephan, M. Ullmann, and R. Vogt, Guideline for the development and evaluation of formal security policy models in the scope of itsec and common criteria, 2004.

. Vérimag-novembre, Ylì es C. Falcone References [1] AT&T Research, Graph Visualization Software, 2007.

A. Belinfante, L. Frantzen, and C. Schallhart, 14 Tools for Test Case Generation, Model-Based Testing of Reactive Systems, pp.391-438, 2004.
DOI : 10.1007/11498490_18

URL : http://doc.utwente.nl/62839/1/chp_10.1007_11498490_18.pdf

Y. Falcone, A Travel Agency Application, Vérimag, 2007.

Y. Falcone, J. Fernandez, L. Mounier, and J. Richier, A Test Calculus Framework Applied to Network Security Policies, FATES/RV, pp.55-69, 2006.
DOI : 10.1007/11940197_4

URL : https://hal.archives-ouvertes.fr/hal-00346032

Y. Falcone, J. Fernandez, L. Mounier, and J. Richier, A Compositional Testing Framework Driven by Partial Specifications, TestCom/FATES, pp.107-122, 2007.
DOI : 10.1007/978-3-540-73066-8_8

URL : https://hal.archives-ouvertes.fr/hal-00346059

Y. Falcone, j-POST: a Java Toolchain for Property-Oriented Software Testing, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.29-41, 2008.
DOI : 10.1016/j.entcs.2008.11.004

URL : https://hal.archives-ouvertes.fr/hal-00346061

A. Hartman, Model Based Test Generation Tools Survey, 2002.

J. Page, URL http, 2007.

C. Jard and T. Jéron, TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, 2004.
DOI : 10.1007/s10009-004-0153-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4262

S. C. Kleene, Representation of Events in Nerve Nets and Finite Automata, Automata Studies, pp.3-41, 1956.
DOI : 10.1515/9781400882618-002

G. Lestiennes and M. Gaudel, Testing processes from formal specifications with inputs, outputs and data types, 13th International Symposium on Software Reliability Engineering, 2002. Proceedings., pp.3-14, 2002.
DOI : 10.1109/ISSRE.2002.1173206

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1640

Z. Manna and A. Pnueli, Temporal verification of reactive systems: safety, 1995.
DOI : 10.1007/978-1-4612-4222-2

M. Schmitt, M. Ebner, and J. Grabowski, Test Generation with Autolink and Testcomposer, in: 2nd Workshop of the SDL Forum Society on SDL and MSC -SAM, 2002.

J. Tretmans, Test Generation with Inputs, Outputs and Repetitive Quiescence, Software -Concepts and Tools, pp.103-120, 1996.
DOI : 10.1007/3-540-61042-1_42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.9528

J. Tretmans and E. Brinksma, TorX: Automated Model Based Testing -Côte de Resyste, Proceedings of the First European Conference on Model-Driven Software Engineering, pp.13-25, 2003.

Y. Falcone, j-POST: a Java Toolchain for Property-Oriented Software Testing, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.29-41, 2008.
DOI : 10.1016/j.entcs.2008.11.004

URL : https://hal.archives-ouvertes.fr/hal-00346061

T. Run, 101 41 Configurations et dérivations d'un EM(Ops), p.101

M. *. Lemme-?, B 3 ) et propriétés de reactivity qui ne sont pas des safety ou guarantee, p.70

.. Construction-de-propriétés-finitaires-et-infinitaires, 41 3 r -propriétés, p.41

T. Safety and .. , 111 23 Transformation guarantee, p.112

.. Transformation-spécifique-aux-obligations, 113 27 Transformation response, p.114

C. De and L. , 139 8.2 DFA reconnaissant la propriété finitaire ? 1, p.141

.. La-partie-j-veto, synthèse de moniteurs, p.143

.. La-partie-j-veto, Intégration du moniteur, p.148