Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus – a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these pattern...
Abstract. We present patterns for expressing dependability requirements, such as confidentiality, in...
The rapid increase in the significance of software systems has made software assurance a critical re...
We describe the Monitoring and Checking (MaC) framework which provides assurance on the correctness ...
Monitoring the preservation of security and dependability (S&D) properties during the operation of s...
The Internet today provides the environment for novel applications and processes which may evolve wa...
The Internet today provides the environment for novel applications and processes which may evolve w...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
Monitoring the operation of complex softare systems at runtime can detect violations of certain prop...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
We introduce a run-time security monitor for embedded system applications that detects both known an...
We describe the Monitoring and Checking (MaC) framework which assures the correctness of the current...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Abstract. We present patterns for expressing dependability requirements, such as confidentiality, in...
The rapid increase in the significance of software systems has made software assurance a critical re...
We describe the Monitoring and Checking (MaC) framework which provides assurance on the correctness ...
Monitoring the preservation of security and dependability (S&D) properties during the operation of s...
The Internet today provides the environment for novel applications and processes which may evolve wa...
The Internet today provides the environment for novel applications and processes which may evolve w...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
Monitoring the operation of complex softare systems at runtime can detect violations of certain prop...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
We introduce a run-time security monitor for embedded system applications that detects both known an...
We describe the Monitoring and Checking (MaC) framework which assures the correctness of the current...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Abstract. We present patterns for expressing dependability requirements, such as confidentiality, in...
The rapid increase in the significance of software systems has made software assurance a critical re...
We describe the Monitoring and Checking (MaC) framework which provides assurance on the correctness ...