Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
20
views
51
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,256
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
other
Author(s):
François Hublet
,
David Basin
,
Srđan Krstić
Publication date
(Online):
September 22 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Policy Perspectives
Most cited references
51
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On the synthesis of a reactive module
R Rosner
,
A. Pnueli
(1989)
0
comments
Cited
145
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Enforceable security policies
Fred B. Schneider
(2000)
0
comments
Cited
64
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the synthesis of an asynchronous reactive module
Amir Pnueli
,
Roni Rosner
(1989)
0
comments
Cited
54
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
François Hublet:
(View ORCID Profile)
David Basin:
(View ORCID Profile)
Srđan Krstić:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2022
Publication date (Online):
September 22 2022
Pages
: 211-232
DOI:
10.1007/978-3-031-17146-8_11
SO-VID:
39ce0dc1-a92d-4abd-9983-8b2c837c645b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. C1
Correction to: Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 3
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
pp. 24
Utility-Preserving Biometric Information Anonymization
pp. 42
Anonymous Traceback for End-to-End Encryption
pp. 65
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
pp. 86
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
pp. 105
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
pp. 126
Verifying the Quality of Outsourced Training on Clouds
pp. 145
SecQuant: Quantifying Container System Call Exposure
pp. 167
Robust and Scalable Process Isolation Against Spectre in the Cloud
pp. 189
Administration of Machine Learning Based Access Control
pp. 211
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 233
A Tale of Four Gates
pp. 255
Sequential Digital Signatures for Cryptographic Software-Update Authentication
pp. 275
On Committing Authenticated-Encryption
pp. 295
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
pp. 317
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
pp. 337
Fuzzy Authenticated Key Exchange with Tight Security
pp. 361
Continuous Authentication in Secure Messaging
pp. 385
Half-Aggregation of Schnorr Signatures with Tight Reductions
pp. 405
Ring Signatures with User-Controlled Linkability
pp. 427
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
pp. 447
Efficient Unique Ring Signatures from Lattices
pp. 467
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
pp. 487
Deterministic Wallets for Adaptor Signatures
pp. 507
Puncturable Signature: A Generic Construction and Instantiations
pp. 531
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
pp. 549
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
pp. 569
IoTEnsemble: Detection of Botnet Attacks on Internet of Things
pp. 589
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
pp. 610
No-Label User-Level Membership Inference for ASR Model Auditing
pp. 631
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
pp. 653
How to Verifiably Encrypt Many Bits for an Election?
pp. 672
A Framework for Constructing Single Secret Leader Election from MPC
pp. 692
AppBastion: Protection from Untrusted Apps and OSes on ARM
pp. 716
Collaborative Anomaly Detection System for Charging Stations
Similar content
2,256
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Authors:
Mariam Nouh
,
Jason Nurse
,
Helena Webb
…
A Guide to Planning Enforcement in Ireland
Authors:
Community Department of Environment
Multi-Tiered Political Questions: The Ecj's Mandate in Enforcing Subsidiarity
Authors:
Werner Vandenbruwaene
See all similar
Cited by
1
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
Authors:
François Hublet
,
David Basin
,
Srđan Krstić
See all cited by