Please use this identifier to cite or link to this item:
/library/oar/handle/123456789/86156Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Aceto, Luca | - |
| dc.contributor.author | Cassar, Ian | - |
| dc.contributor.author | Francalanza, Adrian | - |
| dc.contributor.author | Բóڲóٳپ,ԲԲ | - |
| dc.date.accessioned | 2021-12-28T14:32:13Z | - |
| dc.date.available | 2021-12-28T14:32:13Z | - |
| dc.date.issued | 2018 | - |
| dc.identifier.citation | ٴ,.,䲹,.,ԳԳ,.,&;Բóڲóٳپ,.(2018).ܲԳپԴڴǰԳܱDzԲ.29ٳԳٱԲپDzԲDzԴڱԳDzDzԳܰԳճǰ(䰿䱫2018),ᾱԲ.1-38. | en_GB |
| dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/86156 | - |
| dc.description.abstract | Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime. We study the enforceability of Hennessy-Milner Logic with Recursion (muHML) with respect to suppression enforcement. We develop an operational framework for enforcement which we then use to formalise when a monitor enforces a muHML property. We also show that the safety syntactic fragment of the logic, sHML, is enforceable by providing an automated synthesis function that generates correct suppression monitors from sHML formulas. | en_GB |
| dc.description.sponsorship | ճɴǰ徱DzٳܲپDz貹پܱǰٱٳٲ𱹱DZ辱ԲճǰپdzܲԻ岹پDzԲڴǰܲԳپԴڴǰԳ”(184776-051)Ի“TǹDzѴDz:ճǰپdzܲԻ岹پDzԲڴǰѴDzԾٴǰٲ”(163406-051)ǴٳԻ徱ܲԻ,ԻٳԻdzܰDZ(Ѳٲ),貹-ھԲԳٳܰDZdzܲԻ()-پDzԲʰDz–dzDzʴDZ2014-2020. | en_GB |
| dc.language.iso | en | en_GB |
| dc.publisher | Dzٲٳܳ–Ծ-ܱԳٰܳüԴڴǰپҳ | en_GB |
| dc.rights | info:eu-repo/semantics/openAccess | en_GB |
| dc.subject | Software engineering | en_GB |
| dc.subject | Computer software -- Verification | en_GB |
| dc.subject | Computer logic | en_GB |
| dc.subject | Object monitors (Computer software) | en_GB |
| dc.title | On runtime enforcement via suppressions | en_GB |
| dc.type | conferenceObject | en_GB |
| dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
| dc.bibliographicCitation.conferencename | 29th International Conference on Concurrency Theory (CONCUR 2018) | en_GB |
| dc.bibliographicCitation.conferenceplace | Beijing, China, 04-07/09/2018 | en_GB |
| dc.description.reviewed | peer-reviewed | en_GB |
| dc.identifier.doi | 10.4230/LIPIcs.CONCUR.2018.34 | - |
| Appears in Collections: | Scholarly Works - FacICTCS | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| On Runtime Enforcement via Suppressions.pdf | 904.76 kB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.
