“…Regarding applications for usage control, runtime enforcement was applied to enforce usage control policies in [73], enforcement of the usage of the Android library in [41], disabling Android advertisements in [36]. Regarding applications in the domain of security, runtime enforcement was applied to enforce the opacity of secrets in [46,55,109], access control policies in [76][77][78], confidentiality in [28,53], information-flow policies [28,49,64,64], security and authorization policies in [22,38], privacy policies in [28,56,65], control-flow integrity in [2,34,52,57,62], and memory safety in [24,25,35,100].…”