Eugen Zalinescu

According to our database1, Eugen Zalinescu authored at least 29 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Monitoring Events that Carry Data.
Proceedings of the Lectures on Runtime Verification - Introductory and Advanced Topics, 2018

Inductive Invariants for Noninterference in Multi-agent Workflows.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
The MonPoly Monitoring Tool.
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

Verifying Security Policies in Multi-agent Workflows with Loops.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Runtime Verification of Temporal Properties over Out-of-Order Data Streams.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

Enforcing Programming Guidelines with Region Types and Effects.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

2015
Monitoring Metric First-Order Temporal Properties.
J. ACM, 2015

Greedily computing associative aggregations on sliding windows.
Inf. Process. Lett., 2015

Failure-aware Runtime Verification of Distributed Systems.
Proceedings of the 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, 2015

2014
Deciding safety and liveness in TPTL.
Inf. Process. Lett., 2014

On Real-Time Monitoring with Imprecise Timestamps.
Proceedings of the Runtime Verification - 5th International Conference, 2014

2013
Monitoring Data Usage in Distributed Systems.
IEEE Trans. Software Eng., 2013

Monitoring of Temporal First-Order Properties with Aggregations.
Proceedings of the Runtime Verification - 4th International Conference, 2013

2012
Verified Cryptographic Implementations for TLS.
ACM Trans. Inf. Syst. Secur., 2012

A trace-based model for multiparty contracts.
J. Log. Algebr. Program., 2012

Monitoring Compliance Policies over Incomplete and Disagreeing Logs.
Proceedings of the Runtime Verification, Third International Conference, 2012

Enforceable Security Policies Revisited.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

2011
Shorter strings containing all k-element permutations.
Inf. Process. Lett., 2011

Monitoring Usage-Control Policies in Distributed Systems.
Proceedings of the Eighteenth International Symposium on Temporal Representation and Reasoning, 2011

Algorithms for Monitoring Real-Time Properties.
Proceedings of the Runtime Verification - Second International Conference, 2011

MONPOLY: Monitoring Usage-Control Policies.
Proceedings of the Runtime Verification - Second International Conference, 2011

2010
Deciding security properties for cryptographic protocols. application to key cycles.
ACM Trans. Comput. Log., 2010

2008
Cryptographically verified implementations for TLS.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Sécurité des protocoles cryptographiques : décidabilité et résultats de transfert. (Security of cryptographic protocols: decidability and transfer resultats).
PhD thesis, 2007

Synthesizing Secure Protocols.
Proceedings of the Computer Security, 2007

2006
Deciding Key Cycles for Security Protocols.
Proceedings of the Logic for Programming, 2006

Relating two standard notions of secrecy.
Proceedings of the Workshop "Trustworthy Software" 2006, 2006

Relating Two Standard Notions of Secrecy.
Proceedings of the Computer Science Logic, 20th International Workshop, 2006

2005
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005


  Loading...