Eugen Zalinescu

According to our database1, Eugen Zalinescu authored at least 31 papers between 2005 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 





Runtime Verification over Out-of-order Streams.
ACM Trans. Comput. Log., 2020

Tenderbake - Classical BFT Style Consensus for Public Blockchains.
CoRR, 2020

First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014.
Int. J. Softw. Tools Technol. Transf., 2019

Monitoring Events that Carry Data.
Proceedings of the Lectures on Runtime Verification - Introductory and Advanced Topics, 2018

Algorithms for monitoring real-time properties.
Acta Informatica, 2018

Inductive Invariants for Noninterference in Multi-agent Workflows.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

The MonPoly Monitoring Tool.
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

Verifying Security Policies in Multi-agent Workflows with Loops.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Runtime Verification of Temporal Properties over Out-of-Order Data Streams.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

Enforcing Programming Guidelines with Region Types and Effects.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

Monitoring Metric First-Order Temporal Properties.
J. ACM, 2015

Greedily computing associative aggregations on sliding windows.
Inf. Process. Lett., 2015

Monitoring of temporal first-order properties with aggregations.
Formal Methods Syst. Des., 2015

Failure-aware Runtime Verification of Distributed Systems.
Proceedings of the 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, 2015

Deciding safety and liveness in TPTL.
Inf. Process. Lett., 2014

On Real-Time Monitoring with Imprecise Timestamps.
Proceedings of the Runtime Verification - 5th International Conference, 2014

Monitoring Data Usage in Distributed Systems.
IEEE Trans. Software Eng., 2013

Enforceable Security Policies Revisited.
ACM Trans. Inf. Syst. Secur., 2013

Verified Cryptographic Implementations for TLS.
ACM Trans. Inf. Syst. Secur., 2012

A trace-based model for multiparty contracts.
J. Log. Algebraic Methods Program., 2012

Monitoring Compliance Policies over Incomplete and Disagreeing Logs.
Proceedings of the Runtime Verification, Third International Conference, 2012

Shorter strings containing all k-element permutations.
Inf. Process. Lett., 2011

Monitoring Usage-Control Policies in Distributed Systems.
Proceedings of the Eighteenth International Symposium on Temporal Representation and Reasoning, 2011

MONPOLY: Monitoring Usage-Control Policies.
Proceedings of the Runtime Verification - Second International Conference, 2011

Deciding security properties for cryptographic protocols. application to key cycles.
ACM Trans. Comput. Log., 2010

Cryptographically verified implementations for TLS.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Sécurité des protocoles cryptographiques : décidabilité et résultats de transfert. (Security of cryptographic protocols: decidability and transfer resultats).
PhD thesis, 2007

Relating two standard notions of secrecy.
Log. Methods Comput. Sci., 2007

Synthesizing Secure Protocols.
Proceedings of the Computer Security, 2007

Deciding Key Cycles for Security Protocols.
Proceedings of the Logic for Programming, 2006

A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005