Publications related to security and verification

This section contains papers that are related to aspects of computer security and runtime verification. It includes both refereed publications and reports, but not edited books or volumes. Entries in this section may appear in the others as well.

Journal and conference papers

  • M. Droste, T. Kutsia, G. Rahonis, W. Schreiner. McCarthy-Kleene fuzzy automata and MSO logics. Information and Computation. Vol. 272, 104499. 2020. DOI: 10.1016/j.ic.2019.104499.
    PDF, BibTeX.
  • B. Dundua, T. Kutsia, M. Marin, M. Rukhaia. Specification and Analysis of ABAC Policies in a Rule-Based Framework. In: G. Jaiani and D. Natroshvili, editors. Applications of Mathematics and Informatics in Natural Sciences and Engineering, AMINSE 2019. Volume 334 of Springer Proceedings in Mathematics & Statistics. Springer, Cham. 2020. 101–116.
    PDF, BibTeX.
  • M. Marin, T. Kutsia, B. Dundua. A Rule-based Approach to the Decidability of Safety of ABACα. In: F. Kerschbaum, A. Mashatan, J. Niu, A. J. Lee, editors. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019. June 3–6, 2019, Toronto, Canada. ACM, 2019, 173–178.
    PDF, BibTeX.
  • M. Droste, T. Kutsia, G. Rahonis, W. Schreiner. MK-fuzzy automata and MSO logics. In: P. Bouyer, A. Orlandini, and P. San Pietro, editors. Eighth International Symposium on Games, Automata, Logics, and Formal Verification, GandALF 2017. Electronic Proceedings in Theoretical Computer Science, 256, pages 106–120.
    PDF, BibTeX.
  • D. Cerna, W. Schreiner, T. Kutsia. Predicting Space Requirements for a Stream Monitor Specification Language. In: Y. Falcone and C. Sanchez, editors. Proceedings of the 16th International Conference on Runtime Verification, RV 2016. Volume 10012 of Lecture Notes in Computer Science. Springer, 2016. 135–151. © Springer.
    PDF, BibTeX.
  • D. Cerna, W. Schreiner, T. Kutsia. Space Analysis of a Predicate Logic Fragment for the Specification of Stream Monitors. In: J. H. Davenport and F. Ghourabi, editors. Proceedings of the 7th International Symposium on Symbolic Computation in Software Science, SCSS 2016. EPiC Series, Volume 39, EasyChair, 2016. 29–41.
    PDF, BibTeX.

Workshop papers and technical reports

  • W. Schreiner, T. Kutsia, M. Krieger, B. Ahmad, H. Otto, M. Rummerstorfer. Securing Device Communication by Predicate Logic Specifications. In: Matthias Sturm, editor, Embedded World Conference 2015. February 24–26 2015, Nuremberg, Germany.
    PDF, BibTeX.
  • W. Schreiner, T. Kutsia, D. Cerna, M Krieger, B Ahmad, H Otto, M Rummerstorfer, T. Gössl. The LogicGuard Stream Monitor Specification Language Tutorial and Reference Manual. RISC, Johannes Kepler University, Linz, Austria. Technical report, October 2015.
    PDF, BibTeX.
  • T. Kutsia, W. Schreiner. Verifying the Soundness of Resource Analysis for LogicGuard Monitors (Revised Version). Technical report no. 14-08 in RISC Report Series, RISC, Johannes Kepler University Linz, Austria. 2014.
    PDF, BibTeX.
  • W. Schreiner, T. Kutsia, M. Krieger, B. Ahmad, H. Otto, M. Rummerstorfer. Monitoring Network Traffic by Predicate Logic. RISC, Johannes Kepler University, Linz, Austria. Technical report, September 2014.
    PDF, BibTeX.
  • T. Kutsia, W. Schreiner. Verifying the Soundness of Resource Analysis for LogicGuard Monitors, Part 1. RISC, Johannes Kepler University, Linz, Austria. Technical report, December 16 2013.
    PDF, BibTeX.
  • W. Schreiner, T. Kutsia. A Resource Analysis for LogicGuard Monitors. RISC, Johannes Kepler University, Linz, Austria. Technical report, December 17 2013.
    PDF, BibTeX.