Abstract. Fragments of first-order temporal logic are useful for repre-senting many practical privacy and security policies. Past work has pro-posed two strategies for checking event trace (audit log) compliance with policies: online monitoring and offline audit. Although online monitor-ing is space- and time-efficient, existing techniques insist that satisfying instances of all subformulas of the policy be amenable to caching, which limits expressiveness when some subformulas have infinite support. In contrast, offline audit is brute force and can handle more policies but is not as efficient. This paper proposes a new online monitoring algorithm that caches satisfying instances when it can, and falls back to the brute force search when it ...
Abstract. We introduce a novel approach to the runtime monitoring of complex system properties. In p...
Abstract. We present a design and an implementation of a security policy specification language base...
This is the author version of the manuscript of the same name published in the proceedings of the 31...
Abstract. Fragments of first-order temporal logic are useful for repre-senting many practical privac...
<p>Fragments of first-order temporal logic are useful for representing many practical privacy and se...
Fragments of first-order temporal logic are useful for representing many practical privacy and secu-...
Abstract. We present an approach to monitoring system policies. As a specification language, we use ...
1 Introduction Runtime verification and monitoring have been proposed as lightweight formal verifica...
Log auditing is a basic intrusion detection mechanism, whereby attacks are detected by uncovering ma...
Identifying a temporal pattern of events is a fundamental task of online (real-time) verification. W...
It is a growing concern of companies and end users whether the agents of an IT system, i.e., its pro...
Abstract. It is a growing concern of companies and end users whether the agents of an IT system, i.e...
Online Social Networks are ubiquitous, bringing not only numerous new possibilities but also big thr...
Runtime monitoring (or runtime verification) is an approach to checking compliance of a system’s exe...
Online Social Networks have increased the need to understand well and extend the expressiveness of p...
Abstract. We introduce a novel approach to the runtime monitoring of complex system properties. In p...
Abstract. We present a design and an implementation of a security policy specification language base...
This is the author version of the manuscript of the same name published in the proceedings of the 31...
Abstract. Fragments of first-order temporal logic are useful for repre-senting many practical privac...
<p>Fragments of first-order temporal logic are useful for representing many practical privacy and se...
Fragments of first-order temporal logic are useful for representing many practical privacy and secu-...
Abstract. We present an approach to monitoring system policies. As a specification language, we use ...
1 Introduction Runtime verification and monitoring have been proposed as lightweight formal verifica...
Log auditing is a basic intrusion detection mechanism, whereby attacks are detected by uncovering ma...
Identifying a temporal pattern of events is a fundamental task of online (real-time) verification. W...
It is a growing concern of companies and end users whether the agents of an IT system, i.e., its pro...
Abstract. It is a growing concern of companies and end users whether the agents of an IT system, i.e...
Online Social Networks are ubiquitous, bringing not only numerous new possibilities but also big thr...
Runtime monitoring (or runtime verification) is an approach to checking compliance of a system’s exe...
Online Social Networks have increased the need to understand well and extend the expressiveness of p...
Abstract. We introduce a novel approach to the runtime monitoring of complex system properties. In p...
Abstract. We present a design and an implementation of a security policy specification language base...
This is the author version of the manuscript of the same name published in the proceedings of the 31...