@inproceedings{MuellerSZ-CSF18, author = {Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu}, title = {Inductive Invariants for Noninterference in Multi-agent Workflows}, booktitle = {31st IEEE Computer Security Foundations Symposium (CSF'2018)}, year = {2018}, opteditor = {}, optvolume = {}, optnumber = {}, optseries = {}, optpages = {}, optmonth = {}, optpublisher = {}, note = {accepted}, pdf = {../papers/msz__workflow_invariants__csf2018.pdf} }
@inproceedings{FinkbeinerMSZ-CCS17, author = {Bernd Finkbeiner and Christian M\"uller and Helmut Seidl and Eugen Z\u{a}linescu}, title = {Verifying Security Policies in Multi-agent Workflows with Loops}, booktitle = {15th ACM Conference on Computer and Communications Security (CCS'17)}, year = {2017}, pages = {633--645}, opteditor = {Bhavani M. Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, publisher = {ACM}, doi = {10.1145/3133956.3134080}, url = {https://arxiv.org/abs/1708.09013} }
@inproceedings{ErbaturSZ-APLAS17, author = {Serdar Erbatur and Martin Hofmann and Eugen Z\u{a}linescu}, title = {Enforcing Programming Guidelines with Region Types and Effects}, booktitle = {15th Asian Symposium on Programming Languages and Systems (APLAS'17)}, year = {2017}, volume = {10695}, opteditor = {Bor{-}Yuh Evan Chang}, series = {Lecture Notes in Computer Science}, pages = {85--104}, publisher = {Springer}, doi = {10.1007/978-3-319-71237-6}, url = {https://arxiv.org/abs/1801.07647} }
@inproceedings{BasinKZ17-CAV17, author = {David A. Basin and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {Runtime Verification of Temporal Properties over Out-of-Order Data Streams}, booktitle = {29th Int.~Conf.~on Computer Aided Verification ({CAV}'2017)}, pages = {356--376}, year = {2017}, doi = {10.1007/978-3-319-63387-9_18}, opteditor = {Rupak Majumdar and Viktor Kuncak}, series = {Lecture Notes in Computer Science}, volume = {10426}, publisher = {Springer}, url = {https://arxiv.org/abs/1707.05555} }
@inproceedings{BasinKZ-FSTTCS15, author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {Failure-aware Runtime Verification of Distributed Systems}, booktitle = {35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015)}, year = {2015}, pages = {590--603}, pdf = {../papers/bkz__failure-aware_monitoring__fsttcs15.pdf}, volume = {45}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, doi = {10.4230/LIPIcs.FSTTCS.2015.590}, url = {http://drops.dagstuhl.de/opus/volltexte/2015/5619/}, optdoi = {http://dx.doi.org/10.4230/LIPIcs.FSTTCS.2015.590} }
@inproceedings{BasinKMZ-RV14, author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu}, title = {On Real-Time Monitoring with Imprecise Timestamps}, booktitle = {5th International Conference on Runtime Verification (RV'2014)}, year = {2014}, pages = {193--198}, volume = {8734}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-319-11164-3_16}, pdf = {../papers/bkmz__imprecise_ts__rv14.pdf}, url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11164-3_16} }
@inproceedings{BasinKMZ-RV13, author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu}, title = {Monitoring of Temporal First-order Properties with Aggregations}, booktitle = {4th International Conference on Runtime Verification (RV'2013)}, year = {2013}, pages = {40--58}, volume = {8174}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-642-40787-1_3}, pdf = {../papers/bkmz__aggregations__rv13.pdf}, url = {http://link.springer.com/chapter/10.1007%2F978-3-642-40787-1_3} }
@inproceedings{BasinKMZ-RV12, author = {David Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Z\u{a}linescu}, title = {Monitoring Compliance Policies over Incomplete and Disagreeing Logs}, booktitle = {3rd International Conference on Runtime Verification (RV'2012)}, year = {2013}, pages = {151--167}, volume = {7687}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-642-35632-2_17}, pdf = {../papers/bkmz__incomplete_logs__rv12.pdf}, url = {http://link.springer.com/chapter/10.1007%2F978-3-642-35632-2_17} }
@inproceedings{BasinJKZ-POST12, author = {David Basin and Vincent Jug\'e and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {Enforceable Security Policies Revisited}, booktitle = {1st Conference on Principles of Security and Trust (POST'2012)}, year = {2012}, volume = {7215}, pages = {309--328}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-642-28641-4_17}, url = {http://www.springerlink.com/content/81rn43t2n7g47212}, pdf = {../papers/bjkz__enforceable_policies__post12.pdf} }
@inproceedings{BasinKZ-RV11, author = {David Basin and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {Algorithms for Monitoring Real-time Properties}, booktitle = {2nd International Conference on Runtime Verification (RV'2011)}, year = {2011}, pages = {260--275}, volume = {7186}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-642-29860-8_20}, url = {http://www.springerlink.com/content/yl4v023178345q1p}, pdf = {../papers/monitoring_real-time__rv11.pdf} }
@inproceedings{BasinHKZ-RV11, author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {{MONPOLY}: Monitoring Usage-control Policies}, booktitle = {2nd International Conference on Runtime Verification (RV'2011)}, year = {2011}, pages = {360--364}, volume = {7186}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, doi = {10.1007/978-3-642-29860-8_27}, url = {http://www.springerlink.com/content/3791275600105q22}, note = {{\bf Best tool paper award}}, pdf = {../papers/monpoly__rv11.pdf} }
@inproceedings{BasinHKZ-TIME11, author = {David Basin and Mat\'u\v{s} Harvan and Felix Klaedtke and Eugen Z\u{a}linescu}, title = {Monitoring Usage-control Policies in Distributed Systems}, booktitle = {18th International Symposium on Temporal Representation and Reasoning (TIME'11)}, year = {2011}, pages = {88--95}, publisher = {IEEE}, doi = {10.1109/TIME.2011.14}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6065233}, pdf = {../papers/bhkz_time11_distributed_long.pdf} }
@inproceedings{BhargavanCCZ-CCS08, author = {Karthikeyan Bhargavan and Ricardo Corin and C\'{e}dric Fournet and Eugen Z\u{a}linescu}, title = {Cryptographically Verified Implementations for {TLS}}, booktitle = {15th ACM Conference on Computer and Communications Security (CCS'08)}, pages = {459--468}, year = {2008}, opteditor = {Peng Ning and Paul Syverson and Somesh Jha}, publisher = {ACM Press}, doi = {10.1145/1455770.1455828}, url = {http://portal.acm.org/citation.cfm?id=1455828}, pdf = {../papers/cryptographically-verified-implementations-for-tls-ccs08.pdf} }
@inproceedings{CortierRZ-CSL06, author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu}, title = {Relating two standard notions of secrecy}, booktitle = {{20th International Conference on Computer Science Logic (CSL'06)}}, opteditor = {Zoltan Esik}, optaddress = {Szeged, Hungary}, optmonth = {September}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4207}, pages = {303--318}, year = {2006}, doi = {10.1007/11874683_20}, url = {http://www.springerlink.com/content/t6r6w1r158182v12/}, pdf = {../papers/crz_csl06_secrecy.pdf}, optnote = {(subsumed by~\cite{CortierRZ-LMCS06})} }
@inproceedings{CortierRZ-PPDP05, author = {V\'{e}ronique Cortier and Micha\"{e}l Rusinowitch and Eugen Z\u{a}linescu}, title = {{A Resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures}}, booktitle = {7th ACM-SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP'05)}, opteditor = {Pedro Barahona and Amy P. Felty}, optaddress = {Lisboa, Portugal}, optmonth = {July}, pages = {12--22}, publisher = {ACM Press}, year = {2005}, doi = {10.1145/1069774.1069776}, url = {http://portal.acm.org/citation.cfm?id=1069776}, pdf = {../papers/crz_ppdp05_prefix.pdf}, optnote = {(subsumed by~\cite{PhDZalinescu})} }
@inproceedings{CortierWZ-ESORICS07, author = {V\'{e}ronique Cortier and Bogdan Warinschi and Eugen Z\u{a}linescu}, title = {Synthesizing secure protocols}, booktitle = {{12th European Symposium On Research In Computer Security (ESORICS'07)}}, opteditor = {Joachim Biskup and Javier Lopez}, optaddress = {Dresden, Germany}, optmonth = {September}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {406--421}, year = {2007}, doi = {10.1007/978-3-540-74835-9_27}, url = {http://www.springerlink.com/content/9t7h707130075601/}, pdf = {../papers/cwz_esorics07_compiler.pdf} }
@inproceedings{CortierZ-LPAR06, author = {Cortier, V\'{e}ronique and Z\u{a}linescu, Eugen}, title = {Deciding key cycles for security protocols}, booktitle = {13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06)}, opteditor = {Miki Hermann and Andrei Voronkov}, optaddress = {Phnom Penh, Cambodia}, optmonth = {November}, publisher = {Springer}, series = {Lecture Notes in Artificial Intelligence}, volume = {4246}, pages = {317 - 331}, year = {2006}, doi = {10.1007/11916277_22}, url = {http://www.springerlink.com/content/p132553rq4r63774}, pdf = {../papers/cz_lpar06_keycycles.pdf}, optnote = {(subsumed by~\cite{ComonCZ-TOCL})} }
This file was generated by bibtex2html 1.98.