44 3.5.1 Syntaxe et sémantique, p.46 ,
60 j-VETO : a Java Verification and Enforcement TOolbox ,
147 8.5.1 Mapping2Aspect : Génération d'aspectsàaspects`aspectsà partir de mappings, p.150 ,
152 8.6.1 GraphMaker : des graphes pour les DFAs, automates de Streett, et moniteurs . 152 8.6.2 Monitor Composer : Composition de moniteurs, p.153 ,
155 j-POST : a Java toolchain for Property-Oriented Software Testing Sommaire 9.1 Introduction, p.159 ,
162 9.3.1 Vue d'ensemble de la génération de test, p.165 ,
Organization Based Access Control Aspects for trace monitoring. In Formal Approaches to Software Testing and Runtime Verification, First Combined International Workshops, FATES, AH07] Gail-Joon Ahn and Hongxin Hu. Towards Realizing a Formal RBAC Model in Real Systems. In SACMAT '07 : Proceedings of the 12th ACM symposium on Access control models and technologies, pp.20-39, 2003. ,
High-level data races, Software Testing, Verification and Reliability, vol.15, issue.4, pp.207-227, 2003. ,
DOI : 10.1002/stvr.281
Defining liveness, Second International Workshop on Protocol Test Systems, pp.181-185, 1985. ,
DOI : 10.1016/0020-0190(85)90056-0
The Theory and Practice of Runtime Reflection?A Model-based Framework for Dynamic Analysis of Distributed Reactive Systems. Number 1. VDM Verlag Dr. Müller D-Finder : A tool for compositional deadlock detection and verification, Lecture Notes in Computer Science, vol.5643, pp.614-619, 2008. ,
Interactive Theorem Proving and Program Development Coq'Art : The Calculus of Inductive Constructions Texts in Theoretical Computer Science Safety property driven test generation from JML specifications, Lecture Notes in Computer Science, vol.4262, pp.225-239, 2004. ,
Software Testing Techniques, 1990. ,
Confirmation of deadlock potentials detected by runtime analysis, Proceeding of the 2006 workshop on Parallel and distributed systems: testing and debugging , PADTAD '06, pp.41-50, 2006. ,
DOI : 10.1145/1147403.1147412
14 Tools for Test Case Generation ,
DOI : 10.1007/11498490_18
Dynamic Deadlock Analysis of Multi-threaded Programs, Hardware and Software Verification and Testing, First International Haifa Verification Conference, pp.208-223, 2005. ,
DOI : 10.1007/11678779_15
Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, pp.155-165, 2008. ,
DOI : 10.1145/1390630.1390650
Racer, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, 2009. ,
DOI : 10.1145/1390630.1390650
Rule Systems for Runtime Verification: A Short Tutorial, Runtime Verification'09, 2007. ,
DOI : 10.1007/3-540-12896-4_374
Model-Based Testing of Reactive Systems, Advanced Lectures [The volume is the outcome of a research seminar that was held in Schloss Dagstuhl, Lecture Notes in Computer Science, vol.3472, 2004. ,
Principles of Model Checking, 2008. ,
Monitoring of Real-Time Properties ,
DOI : 10.1007/11944836_25
The Good, the Bad, and the Ugly, But How Ugly Is Ugly?, Proceedings of the 7th International Workshop on Runtime Verification (RV), pp.126-138, 2007. ,
DOI : 10.1007/978-3-540-77395-5_11
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007. ,
DOI : 10.1145/2000799.2000800
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2007. ,
DOI : 10.1145/2000799.2000800
Comparing LTL Semantics for Runtime Verification, Journal of Logic and Computation, vol.20, issue.3, 2009. ,
DOI : 10.1093/logcom/exn075
Composing security policies with polymer, PLDI '05 : Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.305-314, 2005. ,
Rule Systems for Run-time Monitoring: from EAGLE to RULER, Journal of Logic and Computation, vol.20, issue.3, pp.111-125, 2007. ,
DOI : 10.1093/logcom/exn076
A theory for the derivation of tests, Protocol Specification, testing and verification VIII, pp.63-74, 1988. ,
Testing Transition Systems: An Annotated Bibliography, Modeling and Verification of Parallel Processes, pp.187-195, 2000. ,
DOI : 10.1007/3-540-45510-8_9
Abstraction interpretation and application to logic programs, IN SOFTWARE VERIFICATION, p.13, 2002. ,
Availability enforcement by obligations and aspects identification, First International Conference on Availability, Reliability and Security (ARES'06), pp.229-239, 2006. ,
DOI : 10.1109/ARES.2006.36
Nomad: A Security Model with Non Atomic Actions and Deadlines, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.186-196, 2005. ,
DOI : 10.1109/CSFW.2005.20
Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP, Workshop on Runtime Verification (RV'05), pp.3-20, 2005. ,
DOI : 10.1016/j.entcs.2006.02.002
Orna Grumberg, and Doron Peled. Model Checking, 1999. ,
18 Run-Time Verification, Modelbased Testing of Reactive Systems, pp.525-556, 2005. ,
DOI : 10.1007/11498490_24
The Safety-Progress Classification, 1992. ,
DOI : 10.1007/978-3-642-58041-3_5
Characterization of Temporal Property Classes, Automata, Languages and Programming, pp.474-486, 1992. ,
Relating the hierarchy of temporal properties to model checking, Proceedings of Mathematical Foundations of Computer Science (MFCS 2003), pp.318-327, 2003. ,
LUSTRE: a declarative language for real-time programming, Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '87, pp.178-188, 1987. ,
DOI : 10.1145/41625.41641
Model-based reconfiguration : Diagnosis and recovery, NASA Contractor Report, vol.4596 ,
Java-MOP: A Monitoring Oriented Programming Environment for Java, Proceedings of the Eleventh International Conference on Tools and Algorithms for the construction and analysis of systems (TACAS'05), pp.546-550, 2005. ,
DOI : 10.1007/978-3-540-31980-1_36
MOP : An Efficient and Generic Runtime Verification Framework, Object-Oriented Programming, Systems, Languages and Applications(OOPSLA'07), pp.569-588, 2007. ,
Parametric Trace Slicing and Monitoring, Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'09), pp.246-261, 2009. ,
DOI : 10.1023/A:1011227529550
jPredictor, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.221-230, 2008. ,
DOI : 10.1145/1368088.1368119
Formal methods: state of the art and future directions, ACM Computing Surveys, vol.28, issue.4, pp.626-643, 1996. ,
DOI : 10.1145/242223.242257
URL : https://hal.archives-ouvertes.fr/hal-00444076
Opacity Enforcing Control Synthesis Eléments de modélisation pour le test de politique de sécurité Test Generation for Network Security Rules, Proceedings of the 9th International Workshop on Discrete Event Systems (WODES'08) CRiSIS, Bourges, 2005. [DFG + 06] Vianney Darmaillacq Testing of Communicating Systems, pp.28-35, 2008. ,
A taxonomy and catalog of runtime software-fault monitoring tools, International Conference, pp.341-356, 2004. ,
DOI : 10.1109/TSE.2004.91
Construction de moniteurs pour la surveillance de propriétés de sécurité, 6` eme Colloque Francophone sur la Modélisation des Systèmes Réactifs, 2007. ,
Monitoring confidentiality by diagnosis techniques, European Control Conference, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00420420
Weaving rewrite-based access control policies Efficient monitoring of ?-languages Test generation and execution for security rules in temporal logic, ACM Conference on Computer and Communication Security Proceedings of 17th International Conference on Computer-aided Verification (CAV'05) ICSTW '08 : Proceedings of the 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pp.364-378, 2005. ,
Automated software testing : introduction, management, and performance Towards formal test purposes Characterizing correctness properties of parallel programs using fixpoints, Formal Approaches to Testing of Software 2001 (FATES'01) NS-01-4 of BRICS Notes Series Proceedings of the 7th Colloquium on Automata, Languages and Programming, pp.61-76, 1980. ,
Reasoning with Temporal Logic on Truncated Paths, CAV, pp.27-39, 2003. ,
DOI : 10.1007/978-3-540-45069-6_3
The Daikon system for dynamic detection of likely invariants, Science of Computer Programming, vol.69, issue.1-3, pp.1-335, 2007. ,
DOI : 10.1016/j.scico.2007.01.015
IRM enforcement of Java stack inspection, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.246-255, 2000. ,
DOI : 10.1109/SECPRI.2000.848461
SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, 2000. ,
DOI : 10.1145/335169.335201
A Travel Agency Application, 2007. ,
j-VETO : a Java Verification and Enforcement Toolbox, 2009. ,
Atomizer : a dynamic atomicity checker for multithreaded programs, POPL '04 : Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.256-267, 2004. ,
Synthesizing enforcement monitors wrt. the safety-progress classification of properties, ICISS '08 : Proceedings of the 4th International Conference on Information Systems Security, pp.41-55, 2008. ,
Synthesizing enforcement monitors wrt. the safety-progress classification of properties, ICISS '08 : Proceedings of the 4th International Conference on Information Systems Security, pp.41-55, 2008. ,
Enforcement monitoring wrt. the safety-progress classification of properties, SAC, pp.593-600, 2009. ,
Runtime verification of safetyprogress properties, RV'09 : Proceedings of the 9th International Workshop on Runtime Verification, 2009. ,
Specifying properties in the safety-progress classification for runtime verification, 2009. ,
A test calculus framework applied to network security policies In Formal Approaches to Software Testing and Runtime Verification, First Combined International Workshops, FATES, pp.55-69, 2006. ,
A Compositional Testing Framework Driven by Partial Specifications, Alexandre Petrenko, Margus Veanes, pp.107-122, 2007. ,
DOI : 10.1007/978-3-540-73066-8_8
A partialspecification driven compositional testing method, 2007. ,
Runtime enforcement monitors : composition, synthesis, and enforcement abilities, 2008. ,
On-the-fly analysis of distributed computations, Information Processing Letters, vol.54, issue.5 ,
DOI : 10.1016/0020-0190(95)00048-H
URL : https://hal.archives-ouvertes.fr/inria-00074088
Assigning meanings to programs, Symposia in Applied Mathematics, pp.19-32, 1967. ,
j-POST : a Java tool chain for Property-Oriented Software Testing, 2008. ,
j-POST: a Java Toolchain for Property-Oriented Software Testing, Thèse 185 Ylì es C. Falcone BIBLIOGRAPHIE, pp.29-41, 2008. ,
DOI : 10.1016/j.entcs.2008.11.004
URL : https://hal.archives-ouvertes.fr/hal-00346061
Property Oriented Test Case Generation, Formal Approaches to Software Testing, Third International Workshop on Formal Approaches to Testing of Software, FATES 2003, pp.147-163, 2003. ,
DOI : 10.1007/978-3-540-24617-6_11
Access control by tracking shallow execution history, Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp.43-55, 2004. ,
Types for atomicity, TLDI '03 : Proceedings of the 2003 ACM SIGPLAN international workshop on Types in languages design and implementation, pp.1-12, 2003. ,
Runtime analysis of linear temporal logic specifications, RIACS, 2001. ,
SDL and MSC based test case generation? an overall view of the SAMSTAG method, IAM-94-0005, 1994. ,
An annotated bibliography of interactive program steering, ACM SIGPLAN Notices, vol.29, issue.9, pp.140-148, 1994. ,
DOI : 10.1145/185009.185038
Security Policy Enforcement By Automated Program-Rewriting, 2006. ,
Runtime Checking of Multithreaded Applications with Visual Threads, Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification, pp.331-342, 2000. ,
DOI : 10.1007/10722468_20
Model based test generation tools survey, 2002. ,
Using Runtime Analysis to Guide Model Checking of Java Programs, Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification, pp.245-264, 2000. ,
DOI : 10.1007/10722468_15
An automatabased approach to property testing in event traces, Proceedings of the IFIP TC6/WG6.1 XV International Conference on Testing of Communicating Systems, 2003. ,
The synchronous dataflow programming language lustre, Proceedings of the IEEE, pp.1305-1320, 1991. ,
On the need for practical formal methods In In Formal Techniques in RealTime and Real-Time Fault-Tolerant Systems, Proc., 5th Intern. Symposium (FTRTFT'98, pp.18-26, 1998. ,
An executable temporal logic to express safety properties and its connection with the language lustre, Sixth International Symp. on Lucid and Intensional Programming, ISLIP'93, 1993. ,
Verify Your Runs, Verified Software : Theories, Tools, Experiments : First IFIP TC 2/WG 2.3 Conference, VSTTE 2005 Revised Selected Papers and Discussions, pp.374-383, 2005. ,
DOI : 10.1007/11494881_14
Synchronous Observers and the Verification of Reactive Systems, AMAST '93 : Proceedings of the Third International Conference on Methodology and Software Technology, pp.83-96, 1994. ,
DOI : 10.1007/978-1-4471-3227-1_8
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
Introduction to Automata Theory, Languages, and Computation, 1979. ,
An axiomatic basis for computer programming, Communications of the ACM, vol.12, issue.10, pp.576-580, 1969. ,
Model checking JAVA programs using JAVA PathFinder, International Journal on Software Tools for Technology Transfer (STTT), vol.2, issue.4, pp.366-381, 2000. ,
DOI : 10.1007/s100090050043
Monitoring Java Programs with Java PathExplorer, Electronic Notes in Theoretical Computer Science, vol.55, issue.2, 2001. ,
DOI : 10.1016/S1571-0661(04)00253-1
Synthesizing Monitors for Safety Properties, TACAS '02 : Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2002. ,
DOI : 10.1007/3-540-46002-0_24
Ieee standard 1012-2004 for software verification and validation, 2005. ,
On-line model-checking for finite linear temporal logic specifications, Lecture Notes in Computer Science, vol.407, pp.189-196, 1989. ,
DOI : 10.1007/3-540-52148-8_16
URL : https://hal.archives-ouvertes.fr/inria-00075517
TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, pp.297-315, 2005. ,
DOI : 10.1007/s10009-004-0153-x
A general approach to trace-checking in distributed computing systems, Proc. 14th IEEE Int. Conf. on DCS, pp.396-403, 1994. ,
Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2007. ,
Ensuring the conformance of reactive discrete-event systems by means of supervisory control, International Journal of Production Research, vol.17, issue.14, pp.2809-2826, 2004. ,
DOI : 10.1109/5.21072
Tense Logic and the Theory of Linear Order, 1968. ,
Aspect categories and classes of temporal properties. Theoritical Aspect- Oriented Software Development I, pp.106-134, 2006. ,
Autolink-a tool for automatic test generation from SDL specifications, Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques, p.114, 1998. ,
DOI : 10.1109/WIFT.1998.766305
On translating linear temporal logic into alternating and nondeterministic automata, 2003. ,
Representation of Events in Nerve Nets and Finite Automata, pp.3-42, 1951. ,
DOI : 10.1515/9781400882618-002
Aspect-oriented programming, ECOOP, pp.220-242, 1997. ,
Healing data races on-the-fly, Proceedings of the 2007 ACM workshop on Parallel and distributed systems: testing and debugging, PADTAD '07, pp.54-64, 2007. ,
DOI : 10.1145/1273647.1273658
Shmuel Ur, and Tomá? Vojnar. A concurrency testing tool and its plug-ins for dynamic analysis and runtime healing, 2009. ,
Conformance testing for real-time systems, Formal Methods in System Design, vol.10, issue.1???2, pp.238-304, 2009. ,
DOI : 10.1007/s10703-009-0065-1
Model checking of safety properties. Form, Formal Methods in System Design, vol.19, issue.3, pp.291-314, 2001. ,
DOI : 10.1023/A:1011254632723
Proving the Correctness of Multiprocess Programs, IEEE Transactions on Software Engineering, vol.3, issue.2, pp.125-143, 1977. ,
DOI : 10.1109/TSE.1977.229904
What good is temporal logic ?, IFIP Congress, pp.657-668, 1983. ,
Enforcing Non-safety Security Policies with Program Monitors, ESORICS, pp.355-373, 2005. ,
DOI : 10.1007/11555827_21
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-41, 2009. ,
DOI : 10.1145/1455526.1455532
Testing processes from formal specifications with inputs, outputs and data types, 13th International Symposium on Software Reliability Engineering, 2002. Proceedings., pp.3-14, 2002. ,
DOI : 10.1109/ISSRE.2002.1173206
Policy Enforcement via Program Monitoring, 2006. ,
Runtime assurance based on formal specifications, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999. ,
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2008. ,
DOI : 10.1016/j.jlap.2008.08.004
Principles and methods of testing finite state machines-a survey, Proceedings of the IEEE, pp.1090-1123, 1996. ,
DOI : 10.1109/5.533956
Logiques temporelles pour la vérification : expressivité, complexité, algorithmes, 2003. ,
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007. ,
DOI : 10.1016/j.entcs.2007.03.025
Génération automatique de tests pour des propriétés de sécurité, 4` eme Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, pp.157-174, 2009. ,
Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007. ,
DOI : 10.1016/j.entcs.2006.08.029
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines, 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, pp.173-180, 2008. ,
DOI : 10.1109/DS-RT.2008.22
URL : https://hal.archives-ouvertes.fr/hal-01380237
Testing Security Policies for Web Applications, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pp.269-270, 2008. ,
DOI : 10.1109/ICSTW.2008.45
URL : https://hal.archives-ouvertes.fr/hal-00796098
A formal approach for testing security rules, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.127-132, 2007. ,
DOI : 10.1145/1266840.1266860
Counter-Free Automata (M.I.T. research monograph no. 65), 1971. ,
Adequate proof principles for invariance and liveness properties of concurrent programs, Science of Computer Programming, vol.4, issue.3, pp.257-289, 1984. ,
DOI : 10.1016/0167-6423(84)90003-0
Tight bounds on the complexity of cascaded decomposition of automata, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science, pp.672-682, 1990. ,
DOI : 10.1109/FSCS.1990.89589
A hierarchy of temporal properties, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing , PODC '87, 1989. ,
DOI : 10.1145/41840.41857
Towards property oriented testing, Electron. Notes Theor. Comput. Sci, vol.184, pp.3-19, 2007. ,
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking, Lecture Notes in Computer Science, vol.5198, pp.345-356, 2008. ,
DOI : 10.1007/978-3-540-85209-4_27
URL : https://hal.archives-ouvertes.fr/hal-01327393
The Art of Software Testing, Second Edition, 2004. ,
Test case generation for temporal properties, 1993. ,
Testing equivalence for processes, Proceedings of the 10th Colloquium on Automata, Languages and Programming, pp.548-560, 1983. ,
Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007. ,
DOI : 10.1145/1273442.1250746
URL : http://doi.org/10.1016/s1571-0661(04)81042-9
Proving Liveness Properties of Concurrent Programs, ACM Transactions on Programming Languages and Systems, vol.4, issue.3 ,
DOI : 10.1145/357172.357178
The Temporal Logic of Reactive and Concurrent Systems : Specification : 001, 1991. ,
Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems, 2008 Real-Time Systems Symposium, pp.481-491, 2008. ,
DOI : 10.1109/RTSS.2008.43
A formal enforcement framework for role-based access control using aspect-oriented programming, MoDELS, pp.537-552, 2005. ,
Model-Based Tests for Access Control Policies, 2008 International Conference on Software Testing, Verification, and Validation, pp.338-347, 2008. ,
DOI : 10.1109/ICST.2008.44
URL : https://hal.archives-ouvertes.fr/inria-00456952
Special Feature: Monitoring Program Execution: A Survey, Computer, vol.14, issue.11, pp.76-93, 1981. ,
DOI : 10.1109/C-M.1981.220255
The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977. ,
DOI : 10.1109/SFCS.1977.32
A formal analysis of requirementsbased testing, ISSTA '09 : Proceedings of the eighteenth international symposium on Software testing and analysis, pp.47-56, 2009. ,
A Formal Language for Electronic Contracts, FMOODS'07, pp.174-189, 2007. ,
DOI : 10.1111/1467-9337.00106
PSL Model Checking and Run-Time Verification Via Testers, In FM, pp.573-586, 2006. ,
DOI : 10.1007/11813040_38
Automatic generation of complex properties for hardware designs, Thèse 189 Ylì es C. Falcone BIBLIOGRAPHIE DATE '08 : Proceedings of the conference on Design, automation and test in Europe, pp.545-548, 2008. ,
Verification and Symbolic Test Generation for Safety Properties, 2004. ,
Model Validation using Automatically Generated Requirements-Based Tests, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07), pp.95-104, 2007. ,
DOI : 10.1109/HASE.2007.57
Guest editor's corner research directions in formal methods technology transfer, Journal of Systems and Software, vol.40, issue.3, pp.187-189, 1998. ,
DOI : 10.1016/S0164-1212(97)00164-7
On-line monitoring : A tutorial, Computer, vol.28, issue.6, pp.72-78, 1995. ,
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
A unified approach for studying the properties of transition systems, Theoretical Computer Science, vol.18, issue.3, pp.227-258, 1982. ,
DOI : 10.1016/0304-3975(82)90067-6
Research directions for formal methods, ACM workshop on Strategic Directions in Computing Research, 1996. ,
On characterization of safety and liveness properties in temporal logic, PODC '85 : Proceedings of the fourth annual ACM symposium on Principles of distributed computing, pp.39-48, 1985. ,
A computational induction principle, 1991. ,
Propositional Dynamic Logic of looping and converse, Proceedings of the thirteenth annual ACM symposium on Theory of computing , STOC '81, pp.375-383, 1981. ,
DOI : 10.1145/800076.802492
Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972. ,
DOI : 10.1137/0201010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.327.8418
TorX : Automated Model Based Testing -Côte de Resyste, Proceedings of the First European Conference on Model-Driven Software Engineering, pp.13-25, 2003. ,
Testing Security Policies: Going Beyond Functional Testing, The 18th IEEE International Symposium on Software Reliability (ISSRE '07), pp.93-102, 2007. ,
DOI : 10.1109/ISSRE.2007.27
Test case derivation from lotos specifications, FORTE '89 : Proceedings of the IFIP TC/WG6.1 Second International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, pp.345-359, 1990. ,
Test Generation with Inputs, Outputs, and Quiescence, Second Int. Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pp.127-146, 1996. ,
Repetitive quiescence in implementation and testing, pp.23-37 ,
A framework to enforce access control, usage control and obligations, Annals of Telecommunications, 2007. ,
Specification-based testing with linear temporal logic On computable numbers, with an application to the entscheidungsproblem, IRI Proc. London Math. Soc, pp.493-498230, 1936. ,
Action Refinement in Conformance Testing, Testing of Communicating Systems, pp.81-96, 2005. ,
DOI : 10.1007/978-3-540-24617-6_7
Foundations for the run-time analysis of software systems, 2000. ,
Foundations for the Run-Time Monitoring of Reactive Systems ??? Fundamentals of the MaC Language, Lecture Notes in Computer Science, vol.3407, pp.543-556, 2004. ,
DOI : 10.1007/978-3-540-31862-0_38
Temporal logic can be more expressive, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.340-348, 1981. ,
DOI : 10.1109/SFCS.1981.44
URL : http://doi.org/10.1016/s0019-9958(83)80051-5
Coverage metrics for requirements-based testing, Proceedings of the 2006 international symposium on Software testing and analysis , ISSTA'06, pp.25-36, 2006. ,
DOI : 10.1145/1146238.1146242
Past Temporal Logic, 1986. ,
A Formal Approach to Conformance Testing, Second International Workshop on Protocol Test Systems, pp.349-363, 1990. ,
Test generation with inputs, outputs, and quiescence, Second Int. Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96, pp.127-146, 1996. ,
DOI : 10.1007/3-540-61042-1_42
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.9528
TGV: theory, principles and algorithms, The Sixth World Conference on Integrated Design & Process Technology (IDPT'02), 2002. ,
DOI : 10.1007/s10009-004-0153-x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4262
Formal Test Automation: A Simple Experiment, 12th International Workshop on Testing of Communicating Systems, 1999. ,
DOI : 10.1007/978-0-387-35567-2_12
Autolink -A Tool for Automatic and Semi-Automatic Test Generation from SDL Specifications, 1998. ,
Automated test generation from SDL specifications, SDL'99 The Next Millenium, 9th SDL Forum, pp.135-152, 1999. ,
Test Generation for Network Security Rules, 18th IFIP International Conference, 2006. ,
DOI : 10.1007/11754008_22
A Calculus of Communicating Systems, Lecture Notes in Computer Science, vol.92, 1980. ,
DOI : 10.1007/3-540-10235-3
Communicating Sequential Processes, 1985. ,
Un cadre formel pour le test de politiques de sécurité. Master's thesis, 2006. ,
Model based test generation tools survey, 2002. ,
Action Refinement in Conformance Testing, Testing of Communicating Systems (TESTCOM) LNCS, pp.81-96, 2005. ,
DOI : 10.1007/978-3-540-24617-6_7
Test Generation for Network Security Rules, pp.341-356, 2006. ,
DOI : 10.1007/11754008_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.3609
A Test Calculus Framework Applied to Network Security Policies, Formal Approaches to Software Testing and Runtime Verification, pp.55-69, 2006. ,
DOI : 10.1007/11940197_4
URL : https://hal.archives-ouvertes.fr/hal-00346032
Synthesizing Monitors for Safety Properties, ETAPS 2002 and TACAS 2002, pp.342-356, 2002. ,
DOI : 10.1007/3-540-46002-0_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.5386
Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP, Workshop on Runtime Verification (RV'05), ENTCS, pp.3-20, 2005. ,
DOI : 10.1016/j.entcs.2006.02.002
Combining test case generation and runtime verification, Theoretical Computer Science, vol.336, issue.2-3, pp.2-3, 2005. ,
DOI : 10.1016/j.tcs.2004.11.007
URL : http://doi.org/10.1016/j.tcs.2004.11.007
Temporal verification of reactive systems: safety, 1995. ,
DOI : 10.1007/978-1-4612-4222-2
A partial specification driven compositional testing method and tool, Vérimag Research Report, 2007. ,
Representation of Events in Nerve Nets and Finite Automata, Automata Studies, pp.3-41, 1956. ,
DOI : 10.1515/9781400882618-002
Guideline for the development and evaluation of formal security policy models in the scope of itsec and common criteria, 2004. ,
Ylì es C. Falcone References [1] AT&T Research, Graph Visualization Software, 2007. ,
14 Tools for Test Case Generation, Model-Based Testing of Reactive Systems, pp.391-438, 2004. ,
DOI : 10.1007/11498490_18
URL : http://doc.utwente.nl/62839/1/chp_10.1007_11498490_18.pdf
A Travel Agency Application, Vérimag, 2007. ,
A Test Calculus Framework Applied to Network Security Policies, FATES/RV, pp.55-69, 2006. ,
DOI : 10.1007/11940197_4
URL : https://hal.archives-ouvertes.fr/hal-00346032
A Compositional Testing Framework Driven by Partial Specifications, TestCom/FATES, pp.107-122, 2007. ,
DOI : 10.1007/978-3-540-73066-8_8
URL : https://hal.archives-ouvertes.fr/hal-00346059
j-POST: a Java Toolchain for Property-Oriented Software Testing, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.29-41, 2008. ,
DOI : 10.1016/j.entcs.2008.11.004
URL : https://hal.archives-ouvertes.fr/hal-00346061
Model Based Test Generation Tools Survey, 2002. ,
URL http, 2007. ,
TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, 2004. ,
DOI : 10.1007/s10009-004-0153-x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4262
Representation of Events in Nerve Nets and Finite Automata, Automata Studies, pp.3-41, 1956. ,
DOI : 10.1515/9781400882618-002
Testing processes from formal specifications with inputs, outputs and data types, 13th International Symposium on Software Reliability Engineering, 2002. Proceedings., pp.3-14, 2002. ,
DOI : 10.1109/ISSRE.2002.1173206
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1640
Temporal verification of reactive systems: safety, 1995. ,
DOI : 10.1007/978-1-4612-4222-2
Test Generation with Autolink and Testcomposer, in: 2nd Workshop of the SDL Forum Society on SDL and MSC -SAM, 2002. ,
Test Generation with Inputs, Outputs and Repetitive Quiescence, Software -Concepts and Tools, pp.103-120, 1996. ,
DOI : 10.1007/3-540-61042-1_42
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.9528
TorX: Automated Model Based Testing -Côte de Resyste, Proceedings of the First European Conference on Model-Driven Software Engineering, pp.13-25, 2003. ,
j-POST: a Java Toolchain for Property-Oriented Software Testing, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.29-41, 2008. ,
DOI : 10.1016/j.entcs.2008.11.004
URL : https://hal.archives-ouvertes.fr/hal-00346061
101 41 Configurations et dérivations d'un EM(Ops), p.101 ,
B 3 ) et propriétés de reactivity qui ne sont pas des safety ou guarantee, p.70 ,
41 3 r -propriétés, p.41 ,
111 23 Transformation guarantee, p.112 ,
113 27 Transformation response, p.114 ,
139 8.2 DFA reconnaissant la propriété finitaire ? 1, p.141 ,
synthèse de moniteurs, p.143 ,
Intégration du moniteur, p.148 ,