@inproceedings{MuellerSZ-CSF18,
  author = {Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu},
  title = {Inductive Invariants for Noninterference in Multi-agent Workflows},
  booktitle = {31st IEEE Computer Security Foundations Symposium (CSF'2018)},
  year = {2018},
  opteditor = {},
  optvolume = {},
  optnumber = {},
  optseries = {},
  optpages = {},
  optmonth = {},
  optpublisher = {},
  note = {accepted},
  pdf = {../papers/msz__workflow_invariants__csf2018.pdf}
}
@inproceedings{FinkbeinerMSZ-CCS17,
  author = {Bernd Finkbeiner and Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu},
  title = {Verifying Security Policies in Multi-agent Workflows with Loops},
  booktitle = {15th ACM Conference on Computer and Communications Security (CCS'17)},
  year = {2017},
  pages = {633--645},
  opteditor = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  publisher = {ACM},
  doi = {10.1145/3133956.3134080},
  url = {https://arxiv.org/abs/1708.09013}
}
@inproceedings{ErbaturSZ-APLAS17,
  author = {Serdar Erbatur and Martin Hofmann and Eugen Z\u{a}linescu},
  title = {Enforcing Programming Guidelines with Region Types and Effects},
  booktitle = {15th Asian Symposium on Programming Languages and Systems (APLAS'17)},
  year = {2017},
  volume = {10695},
  opteditor = {Bor{-}Yuh Evan Chang},
  series = {Lecture Notes in Computer Science},
  pages = {85--104},
  publisher = {Springer},
  doi = {10.1007/978-3-319-71237-6},
  url = {https://arxiv.org/abs/1801.07647}
}
@inproceedings{BasinKZ17-CAV17,
  author = {David A. Basin and
               Felix Klaedtke and
               Eugen Z\u{a}linescu},
  title = {Runtime Verification of Temporal Properties over Out-of-Order Data Streams},
  booktitle = {29th Int.~Conf.~on Computer Aided Verification ({CAV}'2017)},
  pages = {356--376},
  year = {2017},
  doi = {10.1007/978-3-319-63387-9_18},
  opteditor = {Rupak Majumdar and Viktor Kuncak},
  series = {Lecture Notes in Computer Science},
  volume = {10426},
  publisher = {Springer},
  url = {https://arxiv.org/abs/1707.05555}
}
@inproceedings{BasinKZ-FSTTCS15,
  author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu},
  title = {Failure-aware Runtime Verification of Distributed Systems},
  booktitle = {35th IARCS Annual Conference on Foundations of
               Software Technology and Theoretical Computer
               Science (FSTTCS 2015)},
  year = {2015},
  pages = {590--603},
  pdf = {../papers/bkz__failure-aware_monitoring__fsttcs15.pdf},
  volume = {45},
  series = {Leibniz International Proceedings in Informatics (LIPIcs)},
  publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  doi = {10.4230/LIPIcs.FSTTCS.2015.590},
  url = {http://drops.dagstuhl.de/opus/volltexte/2015/5619/},
  optdoi = {http://dx.doi.org/10.4230/LIPIcs.FSTTCS.2015.590}
}
@inproceedings{BasinKMZ-RV14,
  author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
  title = {On Real-Time Monitoring with Imprecise Timestamps},
  booktitle = {5th International Conference on Runtime Verification (RV'2014)},
  year = {2014},
  pages = {193--198},
  volume = {8734},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-319-11164-3_16},
  pdf = {../papers/bkmz__imprecise_ts__rv14.pdf},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11164-3_16}
}
@inproceedings{BasinKMZ-RV13,
  author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
  title = {Monitoring of Temporal First-order Properties with Aggregations},
  booktitle = {4th International Conference on Runtime Verification (RV'2013)},
  year = {2013},
  pages = {40--58},
  volume = {8174},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-642-40787-1_3},
  pdf = {../papers/bkmz__aggregations__rv13.pdf},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-642-40787-1_3}
}
@inproceedings{BasinKMZ-RV12,
  author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu},
  title = {Monitoring Compliance Policies over Incomplete and Disagreeing Logs},
  booktitle = {3rd International Conference on Runtime Verification (RV'2012)},
  year = {2013},
  pages = {151--167},
  volume = {7687},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-642-35632-2_17},
  pdf = {../papers/bkmz__incomplete_logs__rv12.pdf},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-642-35632-2_17}
}
@inproceedings{BasinJKZ-POST12,
  author = {David Basin and Vincent Jug\'e and Felix Klaedtke and Eugen Z\u{a}linescu},
  title = {Enforceable Security Policies Revisited},
  booktitle = {1st Conference on Principles of Security and Trust (POST'2012)},
  year = {2012},
  volume = {7215},
  pages = {309--328},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-642-28641-4_17},
  url = {http://www.springerlink.com/content/81rn43t2n7g47212},
  pdf = {../papers/bjkz__enforceable_policies__post12.pdf}
}
@inproceedings{BasinKZ-RV11,
  author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu},
  title = {Algorithms for Monitoring Real-time Properties},
  booktitle = {2nd International Conference on Runtime Verification (RV'2011)},
  year = {2011},
  pages = {260--275},
  volume = {7186},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-642-29860-8_20},
  url = {http://www.springerlink.com/content/yl4v023178345q1p},
  pdf = {../papers/monitoring_real-time__rv11.pdf}
}
@inproceedings{BasinHKZ-RV11,
  author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu},
  title = {{MONPOLY}: Monitoring Usage-control Policies},
  booktitle = {2nd International Conference on Runtime Verification (RV'2011)},
  year = {2011},
  pages = {360--364},
  volume = {7186},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  doi = {10.1007/978-3-642-29860-8_27},
  url = {http://www.springerlink.com/content/3791275600105q22},
  note = {{\bf Best tool paper award}},
  pdf = {../papers/monpoly__rv11.pdf}
}
@inproceedings{BasinHKZ-TIME11,
  author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu},
  title = {Monitoring Usage-control Policies in Distributed Systems},
  booktitle = {18th International Symposium on Temporal Representation and Reasoning (TIME'11)},
  year = {2011},
  pages = {88--95},
  publisher = {IEEE},
  doi = {10.1109/TIME.2011.14},
  url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6065233},
  pdf = {../papers/bhkz_time11_distributed_long.pdf}
}
@inproceedings{BhargavanCCZ-CCS08,
  author = {Karthikeyan Bhargavan and Ricardo Corin and C\'{e}dric Fournet and Eugen Z\u{a}linescu},
  title = {Cryptographically Verified Implementations for {TLS}},
  booktitle = {15th ACM Conference on Computer and Communications Security (CCS'08)},
  pages = {459--468},
  year = {2008},
  opteditor = {Peng Ning and Paul Syverson and Somesh Jha},
  publisher = {ACM Press},
  doi = {10.1145/1455770.1455828},
  url = {http://portal.acm.org/citation.cfm?id=1455828},
  pdf = {../papers/cryptographically-verified-implementations-for-tls-ccs08.pdf}
}
@inproceedings{CortierRZ-CSL06,
  author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu},
  title = {Relating two standard notions of secrecy},
  booktitle = {{20th International Conference on Computer Science Logic (CSL'06)}},
  opteditor = {Zoltan Esik},
  optaddress = {Szeged, Hungary},
  optmonth = {September},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4207},
  pages = {303--318},
  year = {2006},
  doi = {10.1007/11874683_20},
  url = {http://www.springerlink.com/content/t6r6w1r158182v12/},
  pdf = {../papers/crz_csl06_secrecy.pdf},
  optnote = {(subsumed by~\cite{CortierRZ-LMCS06})}
}
@inproceedings{CortierRZ-PPDP05,
  author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu},
  title = {{A Resolution Strategy for Verifying Cryptographic Protocols with CBC
  Encryption and Blind Signatures}},
  booktitle = {7th ACM-SIGPLAN International Conference on
  Principles and Practice of Declarative Programming (PPDP'05)},
  opteditor = {Pedro Barahona and Amy P. Felty},
  optaddress = {Lisboa, Portugal},
  optmonth = {July},
  pages = {12--22},
  publisher = {ACM Press},
  year = {2005},
  doi = {10.1145/1069774.1069776},
  url = {http://portal.acm.org/citation.cfm?id=1069776},
  pdf = {../papers/crz_ppdp05_prefix.pdf},
  optnote = {(subsumed by~\cite{PhDZalinescu})}
}
@inproceedings{CortierWZ-ESORICS07,
  author = {V\'{e}ronique Cortier and Bogdan Warinschi and Eugen Z\u{a}linescu},
  title = {Synthesizing secure protocols},
  booktitle = {{12th European Symposium On Research In Computer Security (ESORICS'07)}},
  opteditor = {Joachim Biskup and Javier Lopez},
  optaddress = {Dresden, Germany},
  optmonth = {September},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4734},
  pages = {406--421},
  year = {2007},
  doi = {10.1007/978-3-540-74835-9_27},
  url = {http://www.springerlink.com/content/9t7h707130075601/},
  pdf = {../papers/cwz_esorics07_compiler.pdf}
}
@inproceedings{CortierZ-LPAR06,
  author = {Cortier, V\'{e}ronique and Z\u{a}linescu, Eugen},
  title = {Deciding key cycles for security protocols},
  booktitle = {13th International Conference on 
  Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06)},
  opteditor = {Miki Hermann and Andrei Voronkov},
  optaddress = {Phnom Penh, Cambodia},
  optmonth = {November},
  publisher = {Springer},
  series = {Lecture Notes in Artificial Intelligence},
  volume = {4246},
  pages = {317 - 331},
  year = {2006},
  doi = {10.1007/11916277_22},
  url = {http://www.springerlink.com/content/p132553rq4r63774},
  pdf = {../papers/cz_lpar06_keycycles.pdf},
  optnote = {(subsumed by~\cite{ComonCZ-TOCL})}
}

This file was generated by bibtex2html 1.98.