Eugen Zalinescu

According to our database1, Eugen Zalinescu authored at least 30 papers between 2005 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 





First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014.
STTT, 2019

Monitoring Events that Carry Data.
Proceedings of the Lectures on Runtime Verification - Introductory and Advanced Topics, 2018

Inductive Invariants for Noninterference in Multi-agent Workflows.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

The MonPoly Monitoring Tool.
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

Verifying Security Policies in Multi-agent Workflows with Loops.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Runtime Verification of Temporal Properties over Out-of-Order Data Streams.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

Enforcing Programming Guidelines with Region Types and Effects.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

Monitoring Metric First-Order Temporal Properties.
J. ACM, 2015

Greedily computing associative aggregations on sliding windows.
Inf. Process. Lett., 2015

Failure-aware Runtime Verification of Distributed Systems.
Proceedings of the 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, 2015

Deciding safety and liveness in TPTL.
Inf. Process. Lett., 2014

On Real-Time Monitoring with Imprecise Timestamps.
Proceedings of the Runtime Verification - 5th International Conference, 2014

Monitoring Data Usage in Distributed Systems.
IEEE Trans. Software Eng., 2013

Monitoring of Temporal First-Order Properties with Aggregations.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Verified Cryptographic Implementations for TLS.
ACM Trans. Inf. Syst. Secur., 2012

A trace-based model for multiparty contracts.
J. Log. Algebr. Program., 2012

Monitoring Compliance Policies over Incomplete and Disagreeing Logs.
Proceedings of the Runtime Verification, Third International Conference, 2012

Enforceable Security Policies Revisited.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Shorter strings containing all k-element permutations.
Inf. Process. Lett., 2011

Monitoring Usage-Control Policies in Distributed Systems.
Proceedings of the Eighteenth International Symposium on Temporal Representation and Reasoning, 2011

Algorithms for Monitoring Real-Time Properties.
Proceedings of the Runtime Verification - Second International Conference, 2011

MONPOLY: Monitoring Usage-Control Policies.
Proceedings of the Runtime Verification - Second International Conference, 2011

Deciding security properties for cryptographic protocols. application to key cycles.
ACM Trans. Comput. Log., 2010

Cryptographically verified implementations for TLS.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Sécurité des protocoles cryptographiques : décidabilité et résultats de transfert. (Security of cryptographic protocols: decidability and transfer resultats).
PhD thesis, 2007

Synthesizing Secure Protocols.
Proceedings of the Computer Security, 2007

Deciding Key Cycles for Security Protocols.
Proceedings of the Logic for Programming, 2006

Relating two standard notions of secrecy.
Proceedings of the Workshop "Trustworthy Software" 2006, 2006

Relating Two Standard Notions of Secrecy.
Proceedings of the Computer Science Logic, 20th International Workshop, 2006

A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005