Lehrstuhl Informatik II   
Sprachen und Beschreibungsstrukturen      
   Home Personen Lehrstuhl Mitarbeiter Dr. Eugen Zalinescu login

Dr. Eugen Zalinescu

Name:Dr. Eugen Zalinescu
Raum:02.07.043
Tel:+49 89 289 18186
eMail:eugen.zalinescu<at>in.tum.de
Visitenkarte:


Publications of Eugen Zalinescu

Journal Articles

The following articles appeared in peer-reviewed journals. The copyright of these articles lies with the respective journals.

  1. David Basin, Felix Klaedtke and Eugen Zalinescu. Algorithms for monitoring real-time properties. Acta Informatica, :1--30, 2017.

    Reference: Bibtex Electronic Copy: DOI

  2. Ezio and Falcone, Yliès and Bonakdarpour, Borzoo and Colombo, Christian and Decker, Normann and Havelund, Klaus and Joshi, Yogi and Klaedtke, Felix and Milewicz, Reed and Reger, Giles and Rosu, Grigore and Signoles, Julien and Thoma, Daniel and Zalinescu, Eugen and Zhang, Yi Bartocci. First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014. International Journal on Software Tools for Technology Transfer, :1--40, 2017.

    Reference: Bibtex Electronic Copy: DOI

  3. David Basin, Felix Klaedtke, Samuel Muller and Eugen Zalinescu. Monitoring Metric First-order Temporal Properties. Journal of the ACM, 62(2):15:1--15:45, April 2015.

    Reference: Bibtex Electronic Copy: DOI

  4. David Basin, Felix Klaedtke and Eugen Zalinescu. Greedily computing associative aggregations on sliding windows. Information Processing Letters, 115(2):186--192, 2015.

    Reference: Bibtex Electronic Copy: DOI

  5. David Basin, Felix Klaedtke, Srdjan Marinovic and Eugen Zalinescu. Monitoring of Temporal First-order Properties with Aggregations. Formal Methods in System Design, 46(3):262--285, 2015.

    Reference: Bibtex Electronic Copy: DOI

  6. David Basin, Carlos Cotrini Jimenez, Felix Klaedtke and Eugen Zalinescu. Deciding safety and liveness in TPTL. Information Processing Letters, 114(12):680--688, 2014.

    Reference: Bibtex Electronic Copy: DOI

  7. David Basin, Vincent Jugé, Felix Klaedtke and Eugen Zalinescu. Enforceable Security Policies Revisited. ACM Transactions on Information and System Security (TISSEC), 16(1):3:1--3:26, June 2013.

    Reference: Bibtex Electronic Copy: DOI

  8. David Basin, Matus Harvan, Felix Klaedtke and Eugen Zalinescu. Monitoring Data Usage in Distributed Systems. IEEE Transactions on Software Engineering, 39(10):1403--1426, 2013.

    Reference: Bibtex Electronic Copy: DOI

  9. Tom Hvitved, Felix Klaedtke and Eugen Zalinescu. A Trace-based Model for Multi-Party Contracts. Journal of Logic and Algebraic Programming, 81(2):72--98, 2012.

    Reference: Bibtex Electronic Copy: DOI

  10. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet and Eugen Zalinescu. Cryptographically Verified Implementations for TLS. ACM Transactions on Information and System Security, 15(1):3:1--3:32, 2012.

    Reference: Bibtex Electronic Copy: DOI

  11. Eugen Zalinescu. Shorter strings containing all $k$-element permutations. Information Processing Letters, 111(12):605--608, 2011.

    Reference: Bibtex Electronic Copy: DOI

  12. Philippe Langevin, Gregor Leander,  Gary McGuire and Eugen Zalinescu. Analysis of Kasami-Welch Functions in Odd Dimension using Stickelberger's Theorem. Journal of Combinatorics and Number Theory, 2(1):55--72, 2010.

    Reference: Bibtex

  13. Hubert Comon-Lundh, Véronique Cortier and Eugen Zalinescu. Deciding security properties for cryptographic protocols. Application to key cycles. ACM Transactions on Computational Logic, 11(2), 2010.

    Download: PDF Reference: Bibtex Electronic Copy: DOI

  14. Véronique Cortier, Michaël Rusinowitch and Eugen Zalinescu. Relating two standard notions of secrecy. Logical Methods in Computer Science, 3(2), 2007.

    Reference: Bibtex Electronic Copy: DOI


Conference Papers

The following papers were published in peer-reviewed conferences. The copyright of these papers lies with the respective publishers.

  1. Bernd Finkbeiner, Christian Müller, Helmut Seidl and Eugen Zalinescu. Verifying Security Policies in Multi-agent Workflows with Loops. 15th ACM Conference on Computer and Communications Security (CCS'17), 2017. to appear. ACM Press.

    Reference: Bibtex Electronic Copy: DOI

  2. Serdar Erbatur, Martin Hofmann and Eugen Zalinescu. Enforcing Programming Guidelines with Region Types and Effects. 15th Asian Symposium on Programming Languages and Systems (APLAS'17), Lecture Notes in Computer Science, 2017. to appear. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  3. David Basin, Felix Klaedtke and Eugen Zalinescu. The MonPoly Monitoring Tool. RV-CuBES: An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, Kalpa Publications, 2017. to appear. EasyChair.

    Reference: Bibtex

  4. David Basin, Felix Klaedtke and Eugen Zalinescu. Failure-aware Runtime Verification of Distributed Systems. 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015), volume 45 of Leibniz International Proceedings in Informatics (LIPIcs), pages 590--603, 2015. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.

    Reference: Bibtex Electronic Copy: DOI

  5. David Basin, Felix Klaedtke, Srdjan Marinovic and Eugen Zalinescu. On Real-Time Monitoring with Imprecise Timestamps. 5th International Conference on Runtime Verification (RV'2014), volume 8734 of Lecture Notes in Computer Science, pages 193--198, 2014. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  6. David Basin, Felix Klaedtke, Srdjan Marinovic and Eugen Zalinescu. Monitoring of Temporal First-order Properties with Aggregations. 4th International Conference on Runtime Verification (RV'2013), volume 8174 of Lecture Notes in Computer Science, pages 40--58, 2013. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  7. David Basin, Felix Klaedtke, Srdjan Marinovic and Eugen Zalinescu. Monitoring Compliance Policies over Incomplete and Disagreeing Logs. 3rd International Conference on Runtime Verification (RV'2012), volume 7687 of Lecture Notes in Computer Science, pages 151--167, 2013. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  8. David Basin, Vincent Jugé, Felix Klaedtke and Eugen Zalinescu. Enforceable Security Policies Revisited. 1st Conference on Principles of Security and Trust (POST'2012), volume 7215 of Lecture Notes in Computer Science, pages 309--328, 2012. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  9. David Basin, Felix Klaedtke and Eugen Zalinescu. Algorithms for Monitoring Real-time Properties. 2nd International Conference on Runtime Verification (RV'2011), volume 7186 of Lecture Notes in Computer Science, pages 260--275, 2011. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  10. David Basin, Matus Harvan, Felix Klaedtke and Eugen Zalinescu. Monitoring Usage-control Policies in Distributed Systems. 18th International Symposium on Temporal Representation and Reasoning (TIME'11), pages 88--95, 2011. IEEE.

    Reference: Bibtex Electronic Copy: DOI

  11. David Basin, Matus Harvan, Felix Klaedtke and Eugen Zalinescu. MONPOLY: Monitoring Usage-control Policies. 2nd International Conference on Runtime Verification (RV'2011), volume 7186 of Lecture Notes in Computer Science, pages 360--364, 2011. Best tool paper award. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  12. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet and Eugen Zalinescu. Cryptographically Verified Implementations for TLS. 15th ACM Conference on Computer and Communications Security (CCS'08), pages 459--468, 2008. ACM Press.

    Reference: Bibtex Electronic Copy: DOI

  13. Véronique Cortier, Bogdan Warinschi and Eugen Zalinescu. Synthesizing secure protocols. 12th European Symposium On Research In Computer Security (ESORICS'07), volume 4734 of Lecture Notes in Computer Science, pages 406--421, 2007. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  14. Véronique Cortier and Eugen Zalinescu. Deciding key cycles for security protocols. 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 317 - 331, 2006. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  15. Véronique Cortier, Michaël Rusinowitch and Eugen Zalinescu. Relating two standard notions of secrecy. 20th International Conference on Computer Science Logic (CSL'06), volume 4207 of Lecture Notes in Computer Science, pages 303--318, 2006. Springer.

    Reference: Bibtex The original publication is available at www.springerlink.com

  16. Véronique Cortier, Michaël Rusinowitch and Eugen Zalinescu. A Resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures. 7th ACM-SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP'05), pages 12--22, 2005. ACM Press.

    Reference: Bibtex Electronic Copy: DOI



TUM - Lehrstuhl Informatik II (Sprachen und Beschreibungsstrukturen) Thanks: Tango and TinyMCE     Generationszeit: 9 ms