Information Technology Reference
In-Depth Information
optimizations for our monitor. In general, it remains to be seen how logic-
based monitoring approaches can benefit from the techniques used in stream
processing.
Acknowledgements. This work was partially supported by the Zurich Infor-
mation Security and Privacy Center. It represents the views of the authors.
References
1. Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley
Longman Publishing Co., Inc., Boston (1995)
2. Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Motwani, R., Nishizawa,
I.,Srivastava,U.,Thomas,D.,Varma,R.,Widom,J.:STREAM:TheStanford
stream data manager. IEEE Data Eng. Bull. 26(1), 19-26 (2003)
3. Arasu, A., Babu, S., Widom, J.: The CQL continuous query language: semantic
foundations and query execution. The VLDB Journal 15(2), 121-144 (2006)
4. Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification.
In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44-57. Springer,
Heidelberg (2004)
5. Basin, D., Harvan, M., Klaedtke, F., Zalinescu, E.: MONPOLY: Monitoring usage-
control policies. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186,
pp. 360-364. Springer, Heidelberg (2012)
6.Basin,D.,Harvan,M.,Klaedtke,F.,Zalinescu, E.: Monitoring data usage in dis-
tributed systems. IEEE Trans. Software Eng., (to appear),
http://doi.ieeecomputersociety.org/10.1109/TSE.2013.18
7. Basin, D., Klaedtke, F., Muller, S., Pfitzmann, B.: Runtime monitoring of metric
first-order temporal properties. In: Proceedings of the 28th Conference on Founda-
tions of Software Technology and Theoretical Computer Science (FSTTCS 2008).
Leibniz International Proceedings in Informatics (LIPIcs), vol. 2, pp. 49-60 (2008)
8. Basin, D., Klaedtke, F., Zalinescu, E.: Algorithms for monitoring real-time prop-
erties. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 260-275.
Springer, Heidelberg (2012)
9. Bauer, A., Gore, R., Tiu, A.: A first-order policy language for history-based transac-
tion monitoring. In: Leucker, M., Morgan, C. (eds.) ICTAC 2009. LNCS, vol. 5684,
pp. 96-111. Springer, Heidelberg (2009)
10. Bianculli, D., Ghezzi, C., San Pietro, P.: The tale of SOLOIST: A specification lan-
guage for service compositions interactions. In: Pasareanu, C.S., Salaun, G. (eds.)
FACS 2012. LNCS, vol. 7684, pp. 55-72. Springer, Heidelberg (2013)
11. Chomicki, J.: E cient checking of temporal integrity constraints using bounded
history encoding. ACM Trans. Database Syst. 20(2), 149-186 (1995)
12. Chomicki, J., Toman, D., Bohlen, M.H.: Querying ATSQL databases with temporal
logic. ACM Trans. Database Syst. 26(2), 145-178 (2001)
13. Colombo, C., Gauci, A., Pace, G.J.: LarvaStat: Monitoring of statistical properties.
In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 480-484. Springer,
Heidelberg (2010)
14. Cranor, C., Johnson, T., Spataschek, O., Shkapenyuk, V.: Gigascope: A stream
database for network applications. In: Proceedings of the 2003 ACM SIGMOD
International Conference on Management of Data, pp. 647-651 (2003)
 
Search WWH ::




Custom Search