Michaël Rusinowitch

Affiliations:
  • INRIA, France


According to our database1, Michaël Rusinowitch authored at least 171 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
In-Network ACL Rules Placement using Deep Reinforcement Learning.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2024

2023
Automated Placement of In-Network ACL Rules.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

2022
Deciding Whether two Codes Have the Same Ambiguities is in co-NP.
Proceedings of the 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2022

Privacy Preserving Recommendations for Social Networks.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Differentially Private Friends Recommendation.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
Implementing Security Protocol Monitors.
Proceedings of the 9th International Symposium on Symbolic Computation in Software Science, 2021

FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
You are what emojis say about your pictures: language-independent gender inference attack on Facebook.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Double Mask: An Efficient Rule Encoding for Software Defined Networking.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

Online Attacks on Picture Owner Privacy.
Proceedings of the Database and Expert Systems Applications, 2020

R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

Your Age Revealed by Facebook Picture Metadata.
Proceedings of the ADBIS, TPDL and EDA 2020 Common Workshops and Doctoral Consortium, 2020

2019
One-variable context-free hedge automata.
J. Comput. Syst. Sci., 2019

Gender Inference for Facebook Picture Owners.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Poster : Minimizing range rules for packet filtering using a double mask representation.
Proceedings of the 2019 IFIP Networking Conference, 2019

Unification Modulo Lists with Reverse Relation with Certain Word Equations.
Proceedings of the Automated Deduction - CADE 27, 2019

2018
Sensitive Attribute Prediction for Social Networks Users.
Proceedings of the Workshops of the EDBT/ICDT 2018 Joint Conference (EDBT/ICDT 2018), 2018

Online Testing of User Profile Resilience Against Inference Attacks in Social Networks.
Proceedings of the New Trends in Databases and Information Systems, 2018

2017
Satisfiability of general intruder constraints with and without a set constructor.
J. Symb. Comput., 2017

Intruder deducibility constraints with negation. Decidability and application to secured service compositions.
J. Symb. Comput., 2017

Two-Phase Preference Disclosure in Attributed Social Networks.
Proceedings of the Database and Expert Systems Applications, 2017

2016
Network Structure Release under Differential Privacy.
Trans. Data Priv., 2016

Detection of firewall configuration errors with updatable tree.
Int. J. Inf. Sec., 2016

Private Link Exchange over Social Graphs.
CoRR, 2016

Detecting Communities under Differential Privacy.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Automated Verification of Electrum Wallet.
Proceedings of the Financial Cryptography and Data Security, 2016

Analyse d'activité et exposition de la vie privée sur les médias sociaux.
Proceedings of the 16ème Journées Francophones Extraction et Gestion des Connaissances, 2016

A Model-Based Testing Approach for Security Protocols.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Online Link Disclosure Strategies for Social Networks.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Model-based mutation testing from security protocols in HLPSL.
Softw. Test. Verification Reliab., 2015

Parametrized automata simulation and application to service composition.
J. Symb. Comput., 2015

Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata.
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015

Anonymizing Social Graphs via Uncertainty Semantics.
Proceedings of the 10th ACM Symposium on Information, 2015

Differentially Private Publication of Social Graphs at Linear Cost.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Practical access control management for distributed collaborative editors.
Pervasive Mob. Comput., 2014

Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining.
Log. Methods Comput. Sci., 2014

An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

A Maximum Variance Approach for Graph Anonymization.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Enforcing Privacy in Decentralized Mobile Social Networks.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

A Parametrized Propositional Dynamic Logic with Application to Service Synthesis.
Proceedings of the Advances in Modal Logic 10, 2014

2013
Secure Collaboration for Smartphones.
ERCIM News, 2013

Guarded Variable Automata over Infinite Alphabets
CoRR, 2013

Fresh-Variable Automata for Service Composition
CoRR, 2013

Fresh-Variable Automata: Application to Service Composition.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

Rewrite Closure and CF Hedge Automata.
Proceedings of the Language and Automata Theory and Applications, 2013

<i>SVMAX</i>: a system for secure and valid manipulation of XML data.
Proceedings of the 17th International Database Engineering & Applications Symposium, 2013

2012
Decidability of Equivalence of Symbolic Derivations.
J. Autom. Reason., 2012

Unification Modulo Homomorphic Encryption.
J. Autom. Reason., 2012

Compiling symbolic attacks to protocol implementation tests.
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Towards the Orchestration of Secured Services under Non-disclosure Policies.
Proceedings of the Computer Network Security, 2012

Unification Modulo Chaining.
Proceedings of the Language and Automata Theory and Applications, 2012

Unification Modulo Synchronous Distributivity.
Proceedings of the Automated Reasoning - 6th International Joint Conference, 2012

2011
String Rewriting and Security Analysis: An Extension of a Result of Book and Otto.
J. Autom. Lang. Comb., 2011

Optimistic access control for distributed collaborative editors.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

DeSCal - Decentralized Shared Calendar for P2P and Ad-Hoc Networks.
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011

Distributed Orchestration of Web Services under Security Constraints.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Web Services Verification and Prudent Implementation.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Verifying a bounded number of sessions and its complexity.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures.
Theor. Comput. Sci., 2010

Compiling and securing cryptographic protocols.
Inf. Process. Lett., 2010

Efficient decision tree for protocol analysis in intrusion detection.
Int. J. Secur. Networks, 2010

Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator.
Fundam. Informaticae, 2010

Safe and Efficient Strategies for Updating Firewall Policies.
Proceedings of the Trust, 2010

Rewrite-based verification of XML updates.
Proceedings of the 12th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2010

Orchestration under Security Constraints.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

Satisfiability of general intruder constraints with a set constructor.
Proceedings of the CRiSIS 2010, 2010

Cap unification: application to protocol security modulo homomorphic encryption.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Satisfiability Procedures for Combination of Theories Sharing Integer Offsets.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

A Flexible Access Control Model for Distributed Collaborative Editors.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Data Structures with Arithmetic Constraints: A Non-disjoint Combination.
Proceedings of the Frontiers of Combining Systems, 7th International Symposium, 2009

Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Combinable Extensions of Abelian Groups.
Proceedings of the Automated Deduction, 2009

2008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log., 2008

Tree automata with equality constraints modulo equational theories.
J. Log. Algebraic Methods Program., 2008

Hierarchical combination of intruder theories.
Inf. Comput., 2008

Unification modulo Homomorphic Encryption is Decidable.
Proceedings of the 22nd International Workshop on Unification, 2008

Automatic Composition of Services with Security Policies.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

An inference system for detecting firewall filtering rules anomalies.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Closure of Hedge-Automata Languages by Hedge Rewriting.
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008

08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data.
Proceedings of the Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04., 2008

08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data.
Proceedings of the Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04., 2008

Abusing SIP Authentication.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Relating two standard notions of secrecy.
Log. Methods Comput. Sci., 2007

Intruders with Caps.
Proceedings of the Term Rewriting and Applications, 18th International Conference, 2007

Verifying Cryptographic Protocols with Subterms Constraints.
Proceedings of the Logic for Programming, 2007

Towards an Automatic Analysis of Web Service Security.
Proceedings of the Frontiers of Combining Systems, 6th International Symposium, 2007

Applying a Theorem Prover to the Verification of Optimistic Replication Algorithms.
Proceedings of the Rewriting, 2007

A Traffic Classification Algorithm for Intrusion Detection.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Formal design and verification of operational transformation algorithms for copies convergence.
Theor. Comput. Sci., 2006

Automated Reasoning for Security Protocol Analysis.
J. Autom. Reason., 2006

Editorial.
J. Autom. Lang. Comb., 2006

2005
An NP decision procedure for protocol insecurity with XOR.
Theor. Comput. Sci., 2005

Closure properties and decision problems of dag automata.
Inf. Process. Lett., 2005

A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005

Combining Intruder Theories.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Towards Synchronizing Linear Collaborative Objects with Operational Transformation.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Éditorial.
Tech. Sci. Informatiques, 2004

2nd International Workshop on Complexity in Automated Deduction (CiAD) - Foreword.
Theory Comput. Syst., 2004

Unification Modulo <i>ACUI</i> Plus Distributivity Axioms.
J. Autom. Reason., 2004

Deciding the Security of Protocols with Commuting Public Key Encryption.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

On the fly pattern matching for intrusion detection with Snort.
Ann. des Télécommunications, 2004

Protocol Analysis in Intrusion Detection Using Decision Tree.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Decidable Analysis of Security Protocols.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

Deductive Verification of Distributed Groupware Systems.
Proceedings of the Algebraic Methodology and Software Technology, 2004

2003
Deciding the confluence of ordered term rewrite systems.
ACM Trans. Comput. Log., 2003

Protocol insecurity with a finite number of sessions, composed keys is NP-complete.
Theor. Comput. Sci., 2003

Mechanical Verification of an Ideal Incremental ABR Conformance Algorithm.
J. Autom. Reason., 2003

A rewriting approach to satisfiability procedures.
Inf. Comput., 2003

Automated analysis of security protocols.
Proceedings of the 12th International Workshop on Functional and Constraint Logic Programming, 2003

ACID-Unification Is NEXPTIME-Decidable.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003

Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

Computing Meta-transitions for Linear Transition Systems with Polynomials.
Proceedings of the FME 2003: Formal Methods, 2003

Proving Correctness of Transformation Functions in Real-Time Groupware.
Proceedings of the Eighth European Conference on Computer Supported Cooperative Work, 2003

Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
Proceedings of the Computer Science Logic, 17th International Workshop, 2003

Unification Modulo ACU I Plus Homomorphisms/Distributivity.
Proceedings of the Automated Deduction - CADE-19, 19th International Conference on Automated Deduction Miami Beach, FL, USA, July 28, 2003

2002
Observational proofs by rewriting.
Theor. Comput. Sci., 2002

Incorporating Decision Procedures in Implicit Induction.
J. Symb. Comput., 2002

Guest Editorial.
Inf. Comput., 2002

The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Algorithms and Reductions for Rewriting Problems.
Fundam. Informaticae, 2001

The practice of cryptographic protocol verification.
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001

Rewriting for Deduction and Verification.
Proceedings of the Rewriting Techniques and Applications, 12th International Conference, 2001

Uniform Derivation of Decision Procedures by Superposition.
Proceedings of the Computer Science Logic, 15th International Workshop, 2001

Protocol Insecurity with Finite Number of Sessions is NP-Complete.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Compiling and Verifying Security Protocols.
Proceedings of the Logic for Programming and Automated Reasoning, 2000

The Theory of Total Unary RPO Is Decidable.
Proceedings of the Computational Logic, 2000

Mechanical Verification of an Ideal Incremental <i>ABR</i> Conformance.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
Patterns in Words versus Patterns in Trees: A Brief Survey and New Results.
Proceedings of the Perspectives of System Informatics, 1999

1998
Decision Problems in Ordered Rewriting.
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998

Observational Proofs with Critical Contexts.
Proceedings of the Fundamental Approaches to Software Engineering, 1998

RPO Constraint Solving Is in NP.
Proceedings of the Computer Science Logic, 12th International Workshop, 1998

1997
Matching a Set of Strings with Variable Length don't Cares.
Theor. Comput. Sci., 1997

1996
Any Ground Associative-Commutative Theory Has a Finite Canonical System.
J. Autom. Reason., 1996

Implementing non-linear constraints with cooperative solvers.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories.
Proceedings of the Rewriting Techniques and Applications, 7th International Conference, 1996

Automated Verification by Induction with Associative-Commutative Operators.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996

1995
Automated Mathematical Induction.
J. Log. Comput., 1995

Implicit Induction in Conditional Theories.
J. Autom. Reason., 1995

Undecidability of Ground Reducibility for Word Rewriting Systems with Variables.
Inf. Process. Lett., 1995

Reasoning with Conditional Axioms.
Ann. Math. Artif. Intell., 1995

Automated deduction with associative-commutative operators.
Appl. Algebra Eng. Commun. Comput., 1995

SPIKE: A System for Automatic Inductive Proofs.
Proceedings of the Algebraic Methodology and Software Technology, 1995

1994
On ground reducibility problem for word rewriting systems with variables.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994

The Complexity of Testing Ground Reducibility for Linear Word Rewriting Systems with Variables.
Proceedings of the Conditional and Typed Rewriting Systems, 4th International Workshop, 1994

1993
Preferring diagnoses by abduction.
IEEE Trans. Syst. Man Cybern., 1993

A Logical Framework for Concept Learning with Background Knowledge.
Int. J. Artif. Intell. Tools, 1993

The Unifiability Problem in Ground AC Theories
Proceedings of the Eighth Annual Symposium on Logic in Computer Science (LICS '93), 1993

Automatic Case Analysis in Proof by Induction.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993

1992
The Term Rewriting Approach to Automated Theorem Proving.
J. Log. Program., 1992

SPIKE, an Automatic Theorem Prover.
Proceedings of the Logic Programming and Automated Reasoning, 1992

1991
Theorem-Proving with Resolution and Superposition.
J. Symb. Comput., 1991

On Word Problems in Horn Theories.
J. Symb. Comput., 1991

Proving Refutational Completeness of Theorem-Proving Strategies: The Transfinite Semantic Tree Method.
J. ACM, 1991

Any Gound Associative-Commutative Theory Has a Finite Canonical System.
Proceedings of the Rewriting Techniques and Applications, 4th International Conference, 1991

Automatic Proof Methods for Algebraic Specifications.
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991

Studies on the Ground Convergence Property of Conditional Theories.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '91), 1991

1990
Mechanizing inductive reasoning.
Bull. EATCS, 1990

A New Diagnosis Approach by Deduction and Abduction.
Proceedings of the Expert Systems in Engineering, 1990

Deductive/Abductvie Diagnosis: The DA-Principles.
Proceedings of the 9th European Conference on Artificial Intelligence, 1990

A Proof System for Conditional Algebraic Specifications.
Proceedings of the Conditional and Typed Rewriting Systems, 1990

1988
Theorem-Proving with Resolution and Superposition: An Extension of the Knuth and Bendic Procedure to a Complete Set of Inference Rules.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988

1987
Path of Subterms Ordering and Recursive Decomposition Ordering Revisited.
J. Symb. Comput., 1987

On Termination of the Direct Sum of Term-Rewriting Systems.
Inf. Process. Lett., 1987

Complete Inference Rules for the Cancellation Laws.
Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, 1987

On Word Problems in Equational Theories.
Proceedings of the Automata, Languages and Programming, 14th International Colloquium, 1987

1986
A New Method for Establishing Refutational Completeness in Theorem Proving.
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986


  Loading...