@inproceedings{MuellerSZ-CSF18,
author = {Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu},
title = {Inductive Invariants for Noninterference in Multi-agent Workflows},
booktitle = {31st IEEE Computer Security Foundations Symposium (CSF'2018)},
year = {2018},
opteditor = {},
optvolume = {},
optnumber = {},
optseries = {},
optpages = {},
optmonth = {},
optpublisher = {},
note = {accepted},
pdf = {../papers/msz__workflow_invariants__csf2018.pdf}
}
@inproceedings{FinkbeinerMSZ-CCS17,
author = {Bernd Finkbeiner and Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu},
title = {Verifying Security Policies in Multi-agent Workflows with Loops},
booktitle = {15th ACM Conference on Computer and Communications Security (CCS'17)},
year = {2017},
pages = {633--645},
opteditor = {Bhavani M. Thuraisingham and
David Evans and
Tal Malkin and
Dongyan Xu},
publisher = {ACM},
doi = {10.1145/3133956.3134080},
url = {https://arxiv.org/abs/1708.09013}
}
@inproceedings{ErbaturSZ-APLAS17,
author = {Serdar Erbatur and Martin Hofmann and Eugen Z\u{a}linescu},
title = {Enforcing Programming Guidelines with Region Types and Effects},
booktitle = {15th Asian Symposium on Programming Languages and Systems (APLAS'17)},
year = {2017},
volume = {10695},
opteditor = {Bor{-}Yuh Evan Chang},
series = {Lecture Notes in Computer Science},
pages = {85--104},
publisher = {Springer},
doi = {10.1007/978-3-319-71237-6},
url = {https://arxiv.org/abs/1801.07647}
}
@inproceedings{BasinKZ17-CAV17,
author = {David A. Basin and
Felix Klaedtke and
Eugen Z\u{a}linescu},
title = {Runtime Verification of Temporal Properties over Out-of-Order Data Streams},
booktitle = {29th Int.~Conf.~on Computer Aided Verification ({CAV}'2017)},
pages = {356--376},
year = {2017},
doi = {10.1007/978-3-319-63387-9_18},
opteditor = {Rupak Majumdar and Viktor Kuncak},
series = {Lecture Notes in Computer Science},
volume = {10426},
publisher = {Springer},
url = {https://arxiv.org/abs/1707.05555}
}
@inproceedings{BasinKZ-FSTTCS15,
author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu},
title = {Failure-aware Runtime Verification of Distributed Systems},
booktitle = {35th IARCS Annual Conference on Foundations of
Software Technology and Theoretical Computer
Science (FSTTCS 2015)},
year = {2015},
pages = {590--603},
pdf = {../papers/bkz__failure-aware_monitoring__fsttcs15.pdf},
volume = {45},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
doi = {10.4230/LIPIcs.FSTTCS.2015.590},
url = {http://drops.dagstuhl.de/opus/volltexte/2015/5619/},
optdoi = {http://dx.doi.org/10.4230/LIPIcs.FSTTCS.2015.590}
}
@inproceedings{BasinKMZ-RV14,
author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
title = {On Real-Time Monitoring with Imprecise Timestamps},
booktitle = {5th International Conference on Runtime Verification (RV'2014)},
year = {2014},
pages = {193--198},
volume = {8734},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-319-11164-3_16},
pdf = {../papers/bkmz__imprecise_ts__rv14.pdf},
url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11164-3_16}
}
@inproceedings{BasinKMZ-RV13,
author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
title = {Monitoring of Temporal First-order Properties with Aggregations},
booktitle = {4th International Conference on Runtime Verification (RV'2013)},
year = {2013},
pages = {40--58},
volume = {8174},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-642-40787-1_3},
pdf = {../papers/bkmz__aggregations__rv13.pdf},
url = {http://link.springer.com/chapter/10.1007%2F978-3-642-40787-1_3}
}
@inproceedings{BasinKMZ-RV12,
author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
title = {Monitoring Compliance Policies over Incomplete and Disagreeing Logs},
booktitle = {3rd International Conference on Runtime Verification (RV'2012)},
year = {2013},
pages = {151--167},
volume = {7687},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-642-35632-2_17},
pdf = {../papers/bkmz__incomplete_logs__rv12.pdf},
url = {http://link.springer.com/chapter/10.1007%2F978-3-642-35632-2_17}
}
@inproceedings{BasinJKZ-POST12,
author = {David Basin and Vincent Jug\'e and Felix Klaedtke and Eugen Z\u{a}linescu},
title = {Enforceable Security Policies Revisited},
booktitle = {1st Conference on Principles of Security and Trust (POST'2012)},
year = {2012},
volume = {7215},
pages = {309--328},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-642-28641-4_17},
url = {http://www.springerlink.com/content/81rn43t2n7g47212},
pdf = {../papers/bjkz__enforceable_policies__post12.pdf}
}
@inproceedings{BasinKZ-RV11,
author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu},
title = {Algorithms for Monitoring Real-time Properties},
booktitle = {2nd International Conference on Runtime Verification (RV'2011)},
year = {2011},
pages = {260--275},
volume = {7186},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-642-29860-8_20},
url = {http://www.springerlink.com/content/yl4v023178345q1p},
pdf = {../papers/monitoring_real-time__rv11.pdf}
}
@inproceedings{BasinHKZ-RV11,
author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu},
title = {{MONPOLY}: Monitoring Usage-control Policies},
booktitle = {2nd International Conference on Runtime Verification (RV'2011)},
year = {2011},
pages = {360--364},
volume = {7186},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
doi = {10.1007/978-3-642-29860-8_27},
url = {http://www.springerlink.com/content/3791275600105q22},
note = {{\bf Best tool paper award}},
pdf = {../papers/monpoly__rv11.pdf}
}
@inproceedings{BasinHKZ-TIME11,
author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu},
title = {Monitoring Usage-control Policies in Distributed Systems},
booktitle = {18th International Symposium on Temporal Representation and Reasoning (TIME'11)},
year = {2011},
pages = {88--95},
publisher = {IEEE},
doi = {10.1109/TIME.2011.14},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6065233},
pdf = {../papers/bhkz_time11_distributed_long.pdf}
}
@inproceedings{BhargavanCCZ-CCS08,
author = {Karthikeyan Bhargavan and Ricardo Corin and C\'{e}dric Fournet and Eugen Z\u{a}linescu},
title = {Cryptographically Verified Implementations for {TLS}},
booktitle = {15th ACM Conference on Computer and Communications Security (CCS'08)},
pages = {459--468},
year = {2008},
opteditor = {Peng Ning and Paul Syverson and Somesh Jha},
publisher = {ACM Press},
doi = {10.1145/1455770.1455828},
url = {http://portal.acm.org/citation.cfm?id=1455828},
pdf = {../papers/cryptographically-verified-implementations-for-tls-ccs08.pdf}
}
@inproceedings{CortierRZ-CSL06,
author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu},
title = {Relating two standard notions of secrecy},
booktitle = {{20th International Conference on Computer Science Logic (CSL'06)}},
opteditor = {Zoltan Esik},
optaddress = {Szeged, Hungary},
optmonth = {September},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4207},
pages = {303--318},
year = {2006},
doi = {10.1007/11874683_20},
url = {http://www.springerlink.com/content/t6r6w1r158182v12/},
pdf = {../papers/crz_csl06_secrecy.pdf},
optnote = {(subsumed by~\cite{CortierRZ-LMCS06})}
}
@inproceedings{CortierRZ-PPDP05,
author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu},
title = {{A Resolution Strategy for Verifying Cryptographic Protocols with CBC
Encryption and Blind Signatures}},
booktitle = {7th ACM-SIGPLAN International Conference on
Principles and Practice of Declarative Programming (PPDP'05)},
opteditor = {Pedro Barahona and Amy P. Felty},
optaddress = {Lisboa, Portugal},
optmonth = {July},
pages = {12--22},
publisher = {ACM Press},
year = {2005},
doi = {10.1145/1069774.1069776},
url = {http://portal.acm.org/citation.cfm?id=1069776},
pdf = {../papers/crz_ppdp05_prefix.pdf},
optnote = {(subsumed by~\cite{PhDZalinescu})}
}
@inproceedings{CortierWZ-ESORICS07,
author = {V\'{e}ronique Cortier and Bogdan Warinschi and Eugen Z\u{a}linescu},
title = {Synthesizing secure protocols},
booktitle = {{12th European Symposium On Research In Computer Security (ESORICS'07)}},
opteditor = {Joachim Biskup and Javier Lopez},
optaddress = {Dresden, Germany},
optmonth = {September},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4734},
pages = {406--421},
year = {2007},
doi = {10.1007/978-3-540-74835-9_27},
url = {http://www.springerlink.com/content/9t7h707130075601/},
pdf = {../papers/cwz_esorics07_compiler.pdf}
}
@inproceedings{CortierZ-LPAR06,
author = {Cortier, V\'{e}ronique and Z\u{a}linescu, Eugen},
title = {Deciding key cycles for security protocols},
booktitle = {13th International Conference on
Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06)},
opteditor = {Miki Hermann and Andrei Voronkov},
optaddress = {Phnom Penh, Cambodia},
optmonth = {November},
publisher = {Springer},
series = {Lecture Notes in Artificial Intelligence},
volume = {4246},
pages = {317 - 331},
year = {2006},
doi = {10.1007/11916277_22},
url = {http://www.springerlink.com/content/p132553rq4r63774},
pdf = {../papers/cz_lpar06_keycycles.pdf},
optnote = {(subsumed by~\cite{ComonCZ-TOCL})}
}
This file was generated by bibtex2html 1.98.