Gerardo Schneider

Orcid: 0000-0003-0629-6853

According to our database1, Gerardo Schneider authored at least 136 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng., September, 2023

LTL Synthesis on Infinite-State Arenas defined by Programs.
CoRR, 2023

Correct-by-Construction Design of Contextual Robotic Missions Using Contracts.
CoRR, 2023

CLawK: Monitoring Business Processes in Smart Contracts.
CoRR, 2023

Capturing Smart Contract Design with DCR Graphs.
Proceedings of the Software Engineering and Formal Methods - 21st International Conference, 2023

Synchronous Agents, Verification, and Blame - A Deontic View.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2023, 2023

ppLTLTT : Temporal Testing for Pure-Past Linear Temporal Logic Formulae.
Proceedings of the Automated Technology for Verification and Analysis, 2023

2022
Formal Methods for Software Engineering - Languages, Methods, Application Domains
Texts in Theoretical Computer Science. An EATCS Series, Springer, ISBN: 978-3-030-38799-0, 2022

Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci., 2022

A multidisciplinary definition of privacy labels.
Inf. Comput. Secur., 2022

Are chrome extensions compliant with the spirit of least privilege?
Int. J. Inf. Sec., 2022

Runtime Verification of Kotlin Coroutines.
Proceedings of the Runtime Verification - 22nd International Conference, 2022

An Automata-Based Formalism for Normative Documents with Real-Time.
Proceedings of the Legal Knowledge and Information Systems, 2022

Assumption Monitoring of Temporal Task Planning Using Stream Runtime Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022

Runtime Verification Meets Controller Synthesis.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022

Precise Analysis of Purpose Limitation in Data Flow Diagrams.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Gray-box monitoring of hyperproperties with an application to privacy.
Formal Methods Syst. Des., 2021

Refining Privacy-Aware Data Flow Diagrams.
Proceedings of the Software Engineering and Formal Methods - 19th International Conference, 2021

On the Specification and Monitoring of Timed Normative Systems.
Proceedings of the Runtime Verification - 21st International Conference, 2021

Transforming Data Flow Diagrams for Privacy Compliance.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

Timed Dyadic Deontic Logic.
Proceedings of the Legal Knowledge and Information Systems, 2021

Assumption Monitoring Using Runtime Verification for UAV Temporal Task Plan Executions.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

MultiCall: A Transaction-batching Interpreter for Ethereum.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

Runtime Verification: Passing on the Baton.
Proceedings of the Formal Methods in Outer Space, 2021

Incorporating Monitors in Reactive Synthesis Without Paying the Price.
Proceedings of the Automated Technology for Verification and Analysis, 2021

2020
A collaborative access control framework for online social networks.
J. Log. Algebraic Methods Program., 2020

After you, please: browser extensions order attacks and countermeasures.
Int. J. Inf. Sec., 2020

Privacy Labelling and the Story of Princess Privacy and the Seven Helpers.
CoRR, 2020

Transforming Data Flow Diagrams for Privacy Compliance (Long Version).
CoRR, 2020

Security Wrappers for Information-Flow Control in Active Object Languages with Futures.
CoRR, 2020

Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

CROME: Contract-Based Robotic Mission Specification.
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020

Reliable Smart Contracts.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Applications, 2020

HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Correction to: A survey of challenges for runtime verification from advanced application domains (beyond software).
Formal Methods Syst. Des., 2019

A survey of challenges for runtime verification from advanced application domains (beyond software).
Formal Methods Syst. Des., 2019

Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019

Gray-box Monitoring of Hyperproperties (Extended Version).
CoRR, 2019

COST Action IC 1402 ArVI: Runtime Verification Beyond Monitoring - Activity Report of Working Group 1.
CoRR, 2019

A runtime monitoring framework to enforce invariants on reinforcement learning agents exploring complex environments.
Proceedings of the 2nd International Workshop on Robotics Software Engineering, 2019

Verification of Smart Contract Business Logic - Exploiting a Java Source Code Verifier.
Proceedings of the Fundamentals of Software Engineering - 8th International Conference, 2019

Gray-Box Monitoring of Hyperproperties.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

2018
Monitoring Data Minimisation.
CoRR, 2018

A web-based tool for analysing normative documents in english.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

COST Action IC1402 Runtime Verification Beyond Monitoring.
Proceedings of the Runtime Verification - 18th International Conference, 2018

Security of Pacemakers using Runtime Verification.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Is Privacy by Construction Possible?
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Modeling, 2018

Reliable Smart Contracts: State-of-the-Art, Applications, Challenges and Future Directions.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Migrating Monitors + ABE: A Suitable Combination for Secure IoT?
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Monitoring Hyperproperties by Combining Static Analysis and Runtime Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018

MoVEMo: A Structured Approach for Engineering Reward Functions.
Proceedings of the Second IEEE International Conference on Robotic Computing, 2018

Runtime verification of hyperproperties for deterministic programs.
Proceedings of the 6th Conference on Formal Methods in Software Engineering, 2018

Testing meets static and runtime verification.
Proceedings of the 6th Conference on Formal Methods in Software Engineering, 2018

Timed Epistemic Knowledge Bases for Social Networks.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

Privacy Compliance Via Model Transformations.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Smart Contracts: A Killer Application for Deductive Source Code Verification.
Proceedings of the Principled Software Development, 2018

2017
Formalising privacy policies in social networks.
J. Log. Algebraic Methods Program., 2017

Modelling and analysis of normative documents.
J. Log. Algebraic Methods Program., 2017

Verifying data- and control-oriented properties combining static and runtime verification: theory and tools.
Formal Methods Syst. Des., 2017

Model Checking Social Network Models.
Proceedings of the Proceedings Eighth International Symposium on Games, 2017

Timed Epistemic Knowledge Bases for Social Networks (Extended Version).
CoRR, 2017

Participatory Verification of Railway Infrastructure by Representing Regulations in RailCNL.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Secure Photo Sharing in Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Data Minimisation: A Language-Based Approach.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Specification, design, and verification of an accountability-aware surveillance protocol.
Proceedings of the Symposium on Applied Computing, 2017

2016
Data Minimisation: a Language-Based Approach (Long Version).
CoRR, 2016

Contract automata - An operational view of contracts between interactive parties.
Artif. Intell. Law, 2016

Specification of Evolving Privacy Policies for Online Social Networks.
Proceedings of the 23rd International Symposium on Temporal Representation and Reasoning, 2016

An Automata-Based Approach to Evolving Privacy Policies for Social Networks.
Proceedings of the Runtime Verification - 16th International Conference, 2016

Extracting Formal Models from Normative Texts.
Proceedings of the Natural Language Processing and Information Systems, 2016

On the Specification and Enforcement of Privacy-Preserving Contractual Agreements.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

On the Runtime Enforcement of Evolving Privacy Policies in Online Social Networks.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

A Privacy-Aware Conceptual Model for Handling Personal Data.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

StaRVOOrS - Episode II - Strengthen and Distribute the Force.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

2015
SEFM: software engineering and formal methods.
Softw. Syst. Model., 2015

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Differential Privacy: Now it's Getting Personal.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Conditional Permissions in Contracts.
Proceedings of the Legal Knowledge and Information Systems, 2015

A Specification Language for Static and Runtime Verification of Data and Control Properties.
Proceedings of the FM 2015: Formal Methods, 2015

2014
Specification and Verification of NormativeTexts Using C-O Diagrams.
IEEE Trans. Software Eng., 2014

A Formal Privacy Policy Framework for Social Networks.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

A CNL for Contract-Oriented Diagrams.
Proceedings of the Controlled Natural Language - 4th International Workshop, 2014

2013
Reachability analysis of complex planar hybrid systems.
Sci. Comput. Program., 2013

A framework for conflict analysis of normative texts written in controlled natural language.
J. Log. Algebraic Methods Program., 2013

Automatic Testing of Real-Time Graphics Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

Migration of an On-Premise Application to the Cloud: Experience Report.
Proceedings of the Service-Oriented and Cloud Computing - Second European Conference, 2013

2012
Guest Editors' Foreword.
J. Log. Algebraic Methods Program., 2012

A dynamic deontic logic for complex contracts.
J. Log. Algebraic Methods Program., 2012

Low dimensional hybrid systems - decidable, undecidable, don't know.
Inf. Comput., 2012

A Unified Approach for Static and Runtime Verification: Framework and Applications.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

2011
Guest Editors' Foreword.
J. Log. Algebraic Methods Program., 2011

From Contracts in Structured English to CL Specifications
Proceedings of the Proceedings Fifth Workshop on Formal Languages and Analysis of Contract-Oriented Software, 2011

Timed Automata Semantics for Visual e-Contracts
Proceedings of the Proceedings Fifth Workshop on Formal Languages and Analysis of Contract-Oriented Software, 2011

Reachability Analysis of Non-linear Planar Autonomous Systems.
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011

2010
Automated Analysis of Conflicts in Software Product Lines.
Proceedings of the Software Product Lines - 14th International Conference, 2010

Reachability analysis of GSPDIs: theory, optimization, and implementation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Model for Visual Specification of E-contracts.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Formal languages and analysis of contract-oriented software.
J. Log. Algebraic Methods Program., 2009

Guest Editors' Foreword.
J. Log. Algebraic Methods Program., 2009

Guest Editors' Foreword.
J. Log. Algebraic Methods Program., 2009

Wrap Your Objects Safely.
Proceedings of the Sixth International Workshop on Formal Engineering approches to Software Components and Architectures, 2009

On the Specification of Full Contracts.
Proceedings of the Sixth International Workshop on Formal Engineering approches to Software Components and Architectures, 2009

: An Action-Based Logic for Reasoning about Contracts.
Proceedings of the Logic, 2009

LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper).
Proceedings of the Seventh IEEE International Conference on Software Engineering and Formal Methods, 2009

Challenges in the Specification of Full Contracts.
Proceedings of the Integrated Formal Methods, 7th International Conference, 2009

GSPeeDI - A Verification Tool for Generalized Polygonal Hybrid Systems.
Proceedings of the Theoretical Aspects of Computing, 2009

Automatic Conflict Detection on Contracts.
Proceedings of the Theoretical Aspects of Computing, 2009

Abstract specification of legal contracts.
Proceedings of the 12th International Conference on Artificial Intelligence and Law, 2009

Safe Runtime Verification of Real-Time Properties.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2009

CLAN: A Tool for Contract Analysis and Conflict Discovery.
Proceedings of the Automated Technology for Verification and Analysis, 2009

2008
Algorithmic analysis of polygonal hybrid systems, Part II: Phase portrait and tools.
Theor. Comput. Sci., 2008

Contract-Oriented Software Development for Internet Services.
ERCIM News, 2008

Computation and Visualisation of Phase Portraits for Model Checking SPDIs.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

Reachability analysis of generalized polygonal hybrid systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Relaxing Goodness Is Still Good.
Proceedings of the Theoretical Aspects of Computing, 2008

Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties.
Proceedings of the Formal Methods for Industrial Critical Systems, 2008

Run-Time Monitoring of Electronic Contracts.
Proceedings of the Automated Technology for Verification and Analysis, 2008

2007
Algorithmic analysis of polygonal hybrid systems, part I: Reachability.
Theor. Comput. Sci., 2007

Components, objects, and contracts.
Proceedings of the 2007 Conference Specification and Verification of Component-Based Systems, 2007

A Formal Language for Electronic Contracts.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2007

Model Checking Contracts - A Case Study.
Proceedings of the Automated Technology for Verification and Analysis, 2007

On the Definition and Policies of Confidentiality.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Compositional Algorithm for Parallel Model Checking of Polygonal Hybrid Systems.
Proceedings of the Theoretical Aspects of Computing, 2006

Language-based support for service oriented architectures: Future directions.
Proceedings of the ICSOFT 2006, 2006

Static Analysis for State-Space Reduction of Polygonal Hybrid Systems.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2006

2005
Precise Analysis of Memory Consumption using Program Logics.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Certified Memory Usage Analysis.
Proceedings of the FM 2005: Formal Methods, 2005

2004
Computing Invariance Kernels of Polygonal Hybrid Systems.
Nord. J. Comput., 2004

Model Checking Polygonal Differential Inclusions Using Invariance Kernels.
Proceedings of the Verification, 2004

On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi.
Proceedings of the Foundations of Software Science and Computation Structures, 2004

2002
Analyse algorithmique de systèmes hybrides polygonaux.
PhD thesis, 2002

Towards Computing Phase Portraits of Polygonal Differential Inclusions.
Proceedings of the Hybrid Systems: Computation and Control, 5th International Workshop, 2002

Widening the Boundary between Decidable and Undecidable Hybrid Systems.
Proceedings of the CONCUR 2002, 2002

SPeeDI - A Verification Tool for Polygonal Hybrid Systems.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
On the Decidability of the Reachability Problem for Planar Differential Inclusions.
Proceedings of the Hybrid Systems: Computation and Control, 4th International Workshop, 2001

1998
Towards a Formal Semantics of Verilog Using Duration Calculus.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998


  Loading...