Abstract. We propose a formal model of runtime safety enforcement for large-scale, cross-language distributed applications with possibly untrusted endpoints. The underlying theory is based on multiparty session types with logical assertions (MPSA), an expressive protocol specification language that supports runtime val-idation through monitoring. Our method starts from global specifications based on MPSAs which the participants should obey. Distributed monitors use local specifications, projected from global specifications, to detect whether the interac-tions are well-behaved, and take appropriate actions, such as suppressing illegal messages. We illustrate the design of our model with examples from real-world distributed applications. We p...
The Internet and the services it provides have become an omnipresent part of our lives. Asynchronous...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Network Monitoring is a complex distributed activity: we distinguish agents that issue requests and ...
Abstract. We propose a formal model of runtime safety enforcement for large-scale, cross-language di...
In large-scale distributed infrastructures, applications are realised through com- munications among...
Abstract. In large-scale distributed infrastructures, applications are re-alised through communicati...
In large-scale distributed infrastructures, applications are realised through communications among d...
Large-scale distributed systems and distributed computing are the pillars of IT infrastructure and s...
Abstract We consider a calculus for multiparty sessions enriched with security levels for messages. ...
Abstract We consider a calculus for multiparty sessions enriched with security levels for messages. ...
We present a framework for the distributed monitoring of networks of components that coordinate by m...
Session types provide a means to prescribe the communication behavior between concurrent message-pas...
International audienceRuntime Verification (RV) is a lightweight method for monitoring the formal sp...
Decentralized monitors can have robustness and security risks. Among robustness risks are attacks on...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
The Internet and the services it provides have become an omnipresent part of our lives. Asynchronous...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Network Monitoring is a complex distributed activity: we distinguish agents that issue requests and ...
Abstract. We propose a formal model of runtime safety enforcement for large-scale, cross-language di...
In large-scale distributed infrastructures, applications are realised through com- munications among...
Abstract. In large-scale distributed infrastructures, applications are re-alised through communicati...
In large-scale distributed infrastructures, applications are realised through communications among d...
Large-scale distributed systems and distributed computing are the pillars of IT infrastructure and s...
Abstract We consider a calculus for multiparty sessions enriched with security levels for messages. ...
Abstract We consider a calculus for multiparty sessions enriched with security levels for messages. ...
We present a framework for the distributed monitoring of networks of components that coordinate by m...
Session types provide a means to prescribe the communication behavior between concurrent message-pas...
International audienceRuntime Verification (RV) is a lightweight method for monitoring the formal sp...
Decentralized monitors can have robustness and security risks. Among robustness risks are attacks on...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
The Internet and the services it provides have become an omnipresent part of our lives. Asynchronous...
International audienceRuntime enforcement is a powerful technique to ensure that a program will resp...
Network Monitoring is a complex distributed activity: we distinguish agents that issue requests and ...