Please use this identifier to cite or link to this item: /library/oar/handle/123456789/86156
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAceto, Luca-
dc.contributor.authorCassar, Ian-
dc.contributor.authorFrancalanza, Adrian-
dc.contributor.authorԲóڲóٳپ,ԲԲ-
dc.date.accessioned2021-12-28T14:32:13Z-
dc.date.available2021-12-28T14:32:13Z-
dc.date.issued2018-
dc.identifier.citationٴ,.,䲹,.,ԳԳ,.,&;Բóڲóٳپ,.(2018).ܲԳپԴڴǰ𳾱ԳܱDzԲ.29ٳԳٱԲپDzԲDzԴڱԳDzDzԳܰԳճǰ(䰿䱫2018),ᾱԲ.1-38.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/86156-
dc.description.abstractRuntime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime. We study the enforceability of Hennessy-Milner Logic with Recursion (muHML) with respect to suppression enforcement. We develop an operational framework for enforcement which we then use to formalise when a monitor enforces a muHML property. We also show that the safety syntactic fragment of the logic, sHML, is enforceable by providing an automated synthesis function that generates correct suppression monitors from sHML formulas.en_GB
dc.description.sponsorshipճ𲹰ɴǰ徱Dzٳ󾱲ܲپDz貹پܱǰٱٳ𳦳ٲ𱹱DZ辱ԲճǰپdzܲԻ岹پDzԲڴǰܲԳپԴڴǰ𳾱Գ”(184776-051)Ի“TǹDzѴDz:ճǰپdzܲԻ岹پDzԲڴǰѴDzԾٴǰٲ”(163406-051)ǴٳԻ徱𲹰ܲԻ,ԻٳԻ𲹱dzܰDZ󾱱𳾱(Ѳٲ),貹-ھԲԳٳܰDZ𲹲dzܲԻ()-پDzԲʰDz–dzDzʴDZ2014-2020.en_GB
dc.language.isoenen_GB
dc.publisherDzٲٳܳ–𾱲Ծ-ܱԳٰܳüԴڴǰپҳen_GB
dc.rightsinfo:eu-repo/semantics/openAccessen_GB
dc.subjectSoftware engineeringen_GB
dc.subjectComputer software -- Verificationen_GB
dc.subjectComputer logicen_GB
dc.subjectObject monitors (Computer software)en_GB
dc.titleOn runtime enforcement via suppressionsen_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencename29th International Conference on Concurrency Theory (CONCUR 2018)en_GB
dc.bibliographicCitation.conferenceplaceBeijing, China, 04-07/09/2018en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.4230/LIPIcs.CONCUR.2018.34-
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
On Runtime Enforcement via Suppressions.pdf904.76 kBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.