Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguiti...
Virtual execution platforms contain many runtime subsystems that are invoked on-demand as user code executes. We have instrumented an open-source JVM to dump out information on th...
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...