Carlos Daniel Luna

Orcid: 0000-0002-9985-5927

Affiliations:
  • University of the Republic, Montevideo, Uruguay


According to our database1, Carlos Daniel Luna authored at least 50 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Verification of Quantitative Temporal Properties in RealTime-DEVS.
CoRR, 2024

A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach.
CLEI Electron. J., 2024

Preface to the CLEI 2023 Special Issue - Volume II.
CLEI Electron. J., 2024

Preface to the CLEI 2023 Special Issue.
CLEI Electron. J., 2024

Consent validation for personal data access control using ABAC.
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024

Analysis of Security Permissions on Android and iOS from a Privacy Perspective.
Proceedings of the L Latin American Computer Conference, 2024

2023
An Automatically Verified Prototype of the Android Permissions System.
J. Autom. Reason., June, 2023

A Blockchain based and GDPR-compliant design of a system for digital education certificates.
CLEI Electron. J., May, 2023

Introduction to Strategic Planning as a Support Tool at the Beginning of a Computer Career.
Proceedings of the 42nd IEEE International Conference of the Chilean Computer Science Society, 2023

2022
An Idealized Model for the Formal Security Analysis of the Mimblewimble Cryptocurrency Protocol.
Proceedings of the XLVIII Latin American Computer Conference, 2022

2021
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol.
Sensors, 2021

Set-Based Models for Cryptocurrency Software.
CLEI Electron. J., 2021

Design principles for constructing GDPR-compliant blockchain solutions.
Proceedings of the 4th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2021

Error Finding in Real-Time Systems using Mutants of Temporal Properties.
Proceedings of the 40th International Conference of the Chilean Computer Science Society, 2021

Privacy-aware blockchain solutions: design and threat analysis.
Proceedings of the 24th Iberoamerican Conference on Software Engineering, 2021

2020
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
J. Autom. Reason., 2020

Towards a Certified Reference Monitor of the Android 10 Permission System.
Proceedings of the 26th International Conference on Types for Proofs and Programs, 2020

Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
System-Level Non-interference of Constant-Time Cryptography. Part I: Model.
J. Autom. Reason., 2019

Mutants for Metric Temporal Logic Formulas.
Proceedings of the XXII Iberoamerican Conference on Software Engineering, 2019

2018
A formal approach for the verification of the permission-based security model of Android.
CLEI Electron. J., 2018

Security in iOS and Android: A Comparative Analysis.
Proceedings of the 37th International Conference of the Chilean Computer Science Society, 2018

Mutation Testing for Java Based on Model-Driven Development.
Proceedings of the XLIV Latin American Computer Conference, 2018

2017
A Certified Reference Validation Mechanism for the Permission Model of Android.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Towards formal model-based analysis and testing of Android's security mechanisms.
Proceedings of the 2017 XLIII Latin American Computer Conference, 2017

2016
Formal Analysis of Android's Permission-Based Security Model, .
Sci. Ann. Comput. Sci., 2016

UML state machine as modeling language for DEVS formalism.
Proceedings of the XLII Latin American Computing Conference, 2016

2015
Towards an automatic model transformation mechanism from UML state machines to DEVS models.
CLEI Electron. J., 2015

Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems.
CLEI Electron. J., 2015

Verifying Android's Permission Model.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

2014
System-level non-interference for constant-time cryptography.
IACR Cryptol. ePrint Arch., 2014

Pedagogical Experiences in a Highly Populated Undergraduate Programming Course Teaching How to Develop Medium Size Information Systems.
CLEI Electron. J., 2014

Metamodel-based transformation from UML state machines to DEVS models.
Proceedings of the XL Latin American Computing Conference, 2014

2013
Formally Verified Implementation of an Idealized Model of Virtualization.
Proceedings of the 19th International Conference on Types for Proofs and Programs, 2013

Automatizacion del Proceso de Instanciacion del Comportamiento de Productos de una Linea de Productos de Software.
Proceedings of the XVI Iberoamerican Conference on Software Engineering, 2013

2012
Alternating-Time Temporal Logic in the Calculus of (Co)Inductive Constructions.
Proceedings of the Formal Methods: Foundations and Applications - 15th Brazilian Symposium, 2012

Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Delayed completion of Final Project of the career Computer Analyst: Seeking its causes.
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012

2011
A Formal Specification of the DNSSEC Model.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Formally Verifying Isolation and Availability in an Idealized Model of Virtualization.
Proceedings of the FM 2011: Formal Methods, 2011

2010
A Type-Theoretic Framework for Certified Model Transformations.
Proceedings of the Formal Methods: Foundations and Applications, 2010

2009
Specification of Products and Product Lines
Proceedings of the Proceedings Ninth International Workshop on Reduction Strategies in Rewriting and Programming, 2009

A Certified Access Controller for JME-MIDP 2.0 Enabled Mobile Devices.
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009

Formal Specification and Analysis of the MIDP 3.0 Security Model.
Proceedings of the 2009 International Conference of the Chilean Computer Science Society, 2009

2008
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices.
Proceedings of the Types for Proofs and Programs, International Conference, 2008

Behavior Specification of Product Lines via Feature Models and UML Statecharts with Variabilities.
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008

2006
A Formal Specification of the MIDP 2.0 Security Model.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2004
Especificación y Análisis de Sistemas de Tiempo Real en Teoría de Tipos.
Computación y Sistemas, 2004

2001
Una Generalizacion del Modelo AGM de Cambio de Creencias.
Inteligencia Artif., 2001

1998
Our experiences teaching functional programming at University of Rio Cuarto (Argentina).
ACM SIGCSE Bull., 1998


  Loading...