Publications

Book chapters
[1] Klaus Havelund, Giles Reger, Eugen Zălinescu, and Daniel Thoma. Monitoring events that carry data. Lectures on Runtime Verification - Introductory and Advanced Topics, volume 10457 of LNCS, pages 60--97. Springer, 2018.
bib | .pdf ]

Journals
[1] Ezio Bartocci, Yliès Falcone, Borzoo Bonakdarpour, Christian Colombo, Normann Decker, Klaus Havelund, Yogi Joshi, Felix Klaedtke, Reed Milewicz, Giles Reger, Grigore Rosu, Julien Signoles, Daniel Thoma, Eugen Zălinescu, and Yi Zhang.
First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014.
International Journal on Software Tools for Technology Transfer, pages 1--40, 2017.
bib | DOI | http ]
[2] David Basin, Felix Klaedtke, and Eugen Zălinescu.
Algorithms for monitoring real-time properties.
Acta Informatica, pages 1--30, 2017.
bib | DOI | http ]
[3] David Basin, Felix Klaedtke, Samuel Müller, and Eugen Zălinescu.
Monitoring metric first-order temporal properties.
Journal of the ACM, 62(2):15:1--15:45, April 2015.
bib | DOI | http | .pdf ]
[4] David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zălinescu.
Monitoring of temporal first-order properties with aggregations.
Formal Methods in System Design, 46(3):262--285, 2015.
bib | DOI | http | .pdf ]
[5] David Basin, Felix Klaedtke, and Eugen Zălinescu.
Greedily computing associative aggregations on sliding windows.
Information Processing Letters, 115(2):186--192, 2015.
bib | DOI | http | .pdf ]
[6] David Basin, Carlos Cotrini Jimenez, Felix Klaedtke, and Eugen Zălinescu.
Deciding safety and liveness in TPTL.
Information Processing Letters, 114(12):680--688, 2014.
bib | DOI | http | .pdf ]
[7] David Basin, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu.
Enforceable security policies revisited.
ACM Transactions on Information and System Security (TISSEC), 16(1):3:1--3:26, June 2013.
bib | DOI | http | .pdf ]
[8] David Basin, Matúš Harvan, Felix Klaedtke, and Eugen Zălinescu.
Monitoring data usage in distributed systems.
IEEE Transactions on Software Engineering, 39(10):1403--1426, 2013.
bib | DOI | http | .pdf ]
[9] Tom Hvitved, Felix Klaedtke, and Eugen Zălinescu.
A trace-based model for multi-party contracts.
Journal of Logic and Algebraic Programming, 81(2):72--98, 2012.
bib | DOI | http | .pdf ]
[10] Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zălinescu.
Cryptographically verified implementations for TLS.
ACM Transactions on Information and System Security, 15(1):3:1--3:32, 2012.
bib | DOI | files | http | .pdf ]
[11] Eugen Zălinescu.
Shorter strings containing all k-element permutations.
Information Processing Letters, 111(12):605--608, 2011.
bib | DOI | http | .pdf ]
[12] Philippe Langevin, Gregor Leander, Gary McGuire, and Eugen Zălinescu.
Analysis of Kasami-Welch Functions in Odd Dimension using Stickelberger's Theorem.
Journal of Combinatorics and Number Theory, 2(1):55--72, 2010.
bib | http | .pdf ]
[13] Hubert Comon-Lundh, Véronique Cortier, and Eugen Zălinescu.
Deciding security properties for cryptographic protocols. Application to key cycles.
ACM Transactions on Computational Logic, 11(2), 2010.
bib | DOI | http | .pdf ]
[14] Véronique Cortier, Michaël Rusinowitch, and Eugen Zălinescu.
Relating two standard notions of secrecy.
Logical Methods in Computer Science, 3(2), 2007.
bib | DOI | http | .pdf ]

Conferences
[1] Christian Müller, Helmut Seidl, and Eugen Zălinescu.
Inductive invariants for noninterference in multi-agent workflows.
31st IEEE Computer Security Foundations Symposium (CSF'2018). accepted.
bib | .pdf ]
[2] Bernd Finkbeiner, Christian Müller, Helmut Seidl, and Eugen Zălinescu.
Verifying security policies in multi-agent workflows with loops.
15th ACM Conference on Computer and Communications Security (CCS'17).
bib | DOI | http ]
[3] Serdar Erbatur, Martin Hofmann, and Eugen Zălinescu.
Enforcing programming guidelines with region types and effects.
15th Asian Symposium on Programming Languages and Systems (APLAS'17).
bib | DOI | http ]
[4] David A. Basin, Felix Klaedtke, and Eugen Zălinescu.
Runtime verification of temporal properties over out-of-order data streams.
29th Int. Conf. on Computer Aided Verification (CAV'2017).
bib | DOI | http ]
[5] David Basin, Felix Klaedtke, and Eugen Zălinescu.
Failure-aware runtime verification of distributed systems.
35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015).
bib | DOI | http | .pdf ]
[6] David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zălinescu.
On real-time monitoring with imprecise timestamps.
5th International Conference on Runtime Verification (RV'2014).
bib | DOI | http | .pdf ]
[7] David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zălinescu.
Monitoring of temporal first-order properties with aggregations.
4th International Conference on Runtime Verification (RV'2013).
bib | DOI | http | .pdf ]
[8] David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zălinescu.
Monitoring compliance policies over incomplete and disagreeing logs.
3rd International Conference on Runtime Verification (RV'2012).
bib | DOI | http | .pdf ]
[9] David Basin, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu.
Enforceable security policies revisited.
1st Conference on Principles of Security and Trust (POST'2012).
bib | DOI | http | .pdf ]
[10] David Basin, Felix Klaedtke, and Eugen Zălinescu.
Algorithms for monitoring real-time properties.
2nd International Conference on Runtime Verification (RV'2011).
bib | DOI | http | .pdf ]
[11] David Basin, Matúš Harvan, Felix Klaedtke, and Eugen Zălinescu.
MONPOLY: Monitoring usage-control policies.
2nd International Conference on Runtime Verification (RV'2011). Best tool paper award.
bib | DOI | http | .pdf ]
[12] David Basin, Matúš Harvan, Felix Klaedtke, and Eugen Zălinescu.
Monitoring usage-control policies in distributed systems.
18th International Symposium on Temporal Representation and Reasoning (TIME'11).
bib | DOI | http | .pdf ]
[13] Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zălinescu.
Cryptographically verified implementations for TLS.
15th ACM Conference on Computer and Communications Security (CCS'08).
bib | DOI | http | .pdf ]
[14] Véronique Cortier, Bogdan Warinschi, and Eugen Zălinescu.
Synthesizing secure protocols.
12th European Symposium On Research In Computer Security (ESORICS'07).
bib | DOI | http | .pdf ]
[15] Véronique Cortier, Michaël Rusinowitch, and Eugen Zălinescu.
Relating two standard notions of secrecy.
20th International Conference on Computer Science Logic (CSL'06).
bib | DOI | http | .pdf ]
[16] Véronique Cortier and Eugen Zălinescu.
Deciding key cycles for security protocols.
13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06).
bib | DOI | http | .pdf ]
[17] Véronique Cortier, Michaël Rusinowitch, and Eugen Zălinescu.
A Resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures.
7th ACM-SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP'05).
bib | DOI | http | .pdf ]

Workshops
[1] David Basin, Felix Klaedtke, and Eugen Zălinescu.
The MonPoly monitoring tool.
RV-CuBES: An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools.
bib | DOI ]

Theses
[1] Eugen Zălinescu.
Security of cryptographic protocols: decidability and transfer results.
PhD thesis, Henri Poincaré University, Nancy, December 2007.
bib | .html | .pdf ]
[2] Eugen Zălinescu.
Power functions.
Master's thesis, Institut de Mathématiques de Luminy, June 2004.
bib | .pdf ]


This file was generated by bibtex2html 1.95.