C. Arthoa, H. Barringer, A. Goldberg, K. Havelund, S. Khurshid et al., Combining test case generation and runtime verification, Theoretical Computer Science, vol.336, issue.2-3, pp.209-234, 2005.

B. Alcalde, A. R. Cavalli, D. Chen, D. Khuu, and D. Lee, Network protocol system passive testing for fault management: A backward checking approach, Lecture Notes in Computer Science, vol.3235, pp.150-166, 2004.

C. Andres, M. Cambronero, and M. Nunez, Passive testing of web services, 2011.

M. Bravetti and T. Bultan, Lecture Notes in Computer Science, vol.6551, pp.56-70

E. Bayse, A. Cavalli, M. Nunez, and F. Zaidi, A passive testing approach based on invariants: application to the wap, Computer Networks, vol.48, pp.247-266, 2005.

H. Barringer, A. Goldberg, K. Havelund, and K. Sen, Rule based runtime verification, 2004.

, Lecture Notes in Computer Science, vol.2937, pp.44-57

H. Barringer, D. Gabbay, and D. Rydeheard, From runtime verification to evolvable systems, the 7th international conference on Runtime verification, RV'07, pp.97-110, 2007.

A. Cavalli, A. Benameur, A. Mallouli, and K. Li, A Passive Testing Approach for Security Checking and its Practical Usage for Web Services Monitoring, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01360187

C. Constant, T. Jéron, H. Marchand, and V. Rusu, Integrating formal verification and conformance testing for reactive systems, IEEE Trans. Softw. Eng, vol.33, issue.8, pp.558-574, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00422904

X. Che, F. Lalanne, and S. Maag, A logic-based passive testing approach for the validation of communicating protocols, ENASE 2012-Proceedings of the 7th International Conference on Evaluation of Novel Approaches to Software Engineering, pp.53-64, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00738523

H. Chen and D. Wagner, Mops: an infrastructure for examining security properties of software, the 9th ACM Conference on Computer and Communications Security, pp.235-244, 2002.

D. Amorim, M. Havelund, and K. , Event-based runtime verification of java programs, the 3rd international workshop on Dynamic analysis, 2005.

D. Angelo, B. Sankaranarayanan, S. Sanchez, C. Robinson, W. Finkbeiner et al., Lola: Runtime monitoring of synchronous systems, the 12th International Symposium on Temporal Representation and Reasoning, pp.166-174, 2005.

Y. Falcone, M. Jaber, T. H. Nguyen, M. Bozga, and S. Bensalem, Runtime Verification of Component-Based Systems, 9th International Conference on Software Engineering and Formal Methods, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00642969

K. Havelund and G. Rosu, Synthesizing monitors for safety properties, the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2002.

T. Jéron, H. Marchand, and V. Rusu, Symbolic determinisation of extended automata, 2006.

I. Navarro, G. Bertossi, L. Kohayakawa, and Y. , Fourth IFIP International Conference on Theoretical Computer Science, vol.209, pp.197-212

D. Jordan and J. Evdemon, Web Services Business Process Execution Language Version 2.0, OASIS Standard, pp.179-183, 2007.

F. Lalanne, X. Che, and S. Maag, Data-centric property formulation for passive testing of communication protocols, Proceedings of the 13th IASME/WSEAS, ACC'11/MMACTEE'11, pp.176-181, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01303064

D. Lee, D. Chen, R. Hao, R. E. Miller, J. Wu et al., Network protocol system monitoring: a formal approach with passive testing, IEEE/ACM Trans. Netw, vol.14, pp.424-437, 2006.

M. Leucker and C. Schallhart, A brief account of runtime verification, Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009.

R. E. Miller and K. A. Arisha, On fault location in networks by passive testing, IEEE International Conference on Performance, Computing, and Communications, pp.281-287, 2000.

F. Montesi and M. Carbone, Programming services with correlation sets, ICSOC, vol.7084, pp.125-141, 2011.

N. Noroozi, R. Khosravi, M. R. Mousavi, and T. A. Willemse, Synchronizing asynchronous conformance testing, Proceedings of the 9th international conference on Software engineering and formal methods, SEFM'11, pp.334-349, 2009.

R. Pellizzoni, P. Meredith, M. Caccamo, and G. Rosu, Hardware runtime monitoring for dependable cots-based real-time embedded systems, Real-Time Systems Symposium, pp.481-491, 2008.

A. Petrenko, N. Yevtushenko, L. Huo, and J. , Testing Transition Systems with Input and Output Testers, TESTERS, PROC TESTCOM, pp.129-145, 2003.

. Identificationremoved, , 2013.

F. B. Schneider, Enforceable security policies, ACM Trans. Inf. Syst. Secur, vol.3, issue.1, pp.30-50, 2000.

J. Tretmans, Test generation with inputs, outputs and repetitive quiescence. SoftwareConcepts and Tools, vol.17, pp.103-120, 1996.