Nombre de documents

172

CV de Michaël Rusinowitch


Rapport39 documents

  • Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani. Intruder deducibility constraints with negation. Decidability and application to secured service compositions.. [Research Report] RR-8017, INRIA. 2012. <hal-00719011>
  • Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michael Rusinowitch. Unification modulo Block Chaining. [Research Report] 2011. <inria-00618376>
  • Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Satisfiability of General Intruder Constraints with and without a Set Constructor. [Research Report] RR-7276, INRIA. 2010, pp.50. <inria-00480632v3>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Data Structures with Arithmetic Constraints: a Non-Disjoint Combination. [Research Report] RR-6963, INRIA. 2009, pp.23. <inria-00397080>
  • Florent Jacquemard, Michael Rusinowitch. Rewrite based Verification of XML Updates. [Research Report] RR-7007, INRIA. 2009, pp.39. <inria-00408162>
  • Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch. Safe and Efficient Strategies for Updating Firewall Policies. [Research Report] RR-6940, INRIA. 2009, pp.19. <inria-00381778v2>
  • Yannick Chevalier, Michael Rusinowitch. Compiling and securing cryptographic protocols. [Research Report] 2009, pp.12. <inria-00426669>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Combinable Extensions of Abelian Groups. [Research Report] RR-6920, INRIA. 2009, pp.30. <inria-00383041>
  • Abdessamad Imine, Asma Cherif, Michaël Rusinowitch. An Optimistic Mandatory Access Control Model for Distributed Collaborative Editors. [Research Report] RR-6939, INRIA. 2009, pp.20. <inria-00381941v2>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Satisfiability Procedures for Combination of Theories Sharing Integer Offsets. [Research Report] RR-6697, INRIA. 2008, pp.22. <inria-00331735v2>
  • Najah Chridi, Mathieu Turuani, Michaël Rusinowitch. Constraints-based Verification of Parameterized Cryptographic Protocols.. [Research Report] RR-6712, INRIA. 2008, pp.54. <inria-00336539>
  • Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Toward an Automatic Analysis of Web Service Security. [Research Report] RR-6341, INRIA. 2007, pp.40. <inria-00133996v2>
  • Eugen Zalinescu, Véronique Cortier, Michaël Rusinowitch. Relating two Standard Notions of Secrecy. [Research Report] RR-5908, INRIA. 2006, pp.32. <inria-00071357>
  • Yannick Chevalier, Michaël Rusinowitch. Combining Intruder Theories. [Research Report] RR-5495, INRIA. 2005, pp.37. <inria-00070512>
  • Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron. Tree Automata with Equality Constraints Modulo Equational Theories. [Research Report] RR-5754, INRIA. 2005, pp.27. <inria-00071215>
  • Tarek Abbes, Michaël Rusinowitch, Alakesh Haloi. Network Traffic Classification for Intrusion Detection. [Research Report] RR-5230, INRIA. 2004, pp.20. <inria-00070766>
  • Abdessamad Imine, Pascal Molli, Gérald Oster, Michaël Rusinowitch. Achieving Convergence with Operational Transformation in Distributed Groupware Systems. [Research Report] RR-5188, INRIA. 2004, pp.19. <inria-00071398>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. [Research Report] RR-4869, INRIA. 2003, pp.22. <inria-00071714>
  • Julien Musset, Michaël Rusinowitch. Computing Approximations of Linear Transition Systems. [Research Report] RR-4774, INRIA. 2003, pp.20. <inria-00071812>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. [Research Report] RR-4697, INRIA. 2003, pp.22. <inria-00071889>
  • Alessandro Armando, Silvio Ranise, Michaël Rusinowitch. Uniform Derivation of Decision Procedures by Superposition. [Research Report] RR-4151, INRIA. 2001, pp.13. <inria-00072474>
  • Michaël Rusinowitch, Mathieu Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. [Research Report] RR-4134, INRIA. 2001, pp.18. <inria-00072492>
  • Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron. Compiling and Verifying Security Protocols. [Research Report] RR-3938, INRIA. 2000, pp.25. <inria-00072712>
  • Alessandro Armando, Gilles Defourneaux, Michaël Rusinowitch, Sorin Stratulat. Integrating decision procedures in Spike. [Intern report] 99-R-037 || armando99a, 1999. <inria-00098930>
  • Michaël Rusinowitch, Sorin Stratulat, Francis Klay. Mechanical Verification of a Generic Incremental ABR Conformance Algorithm. [Research Report] RR-3794, INRIA. 1999, pp.43. <inria-00072865>
  • Paliath Narendran, Michaël Rusinowitch, Rakesh Verma. RPO constraint solving is in NP. [Intern report] 98-R-023 || narendran98a, 1998, 12 p. <inria-00098428>
  • Francis Klay, Michaël Rusinowitch, Sorin Stratulat. Analysing Feature Interactions with Automated Deduction Systems. [Intern report] 98-R-230 || klay98a, 1998, 21 p. <inria-00098562>
  • Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch. Observational Proofs by Implicit Context Induction. [Research Report] RR-3151, INRIA. 1997, pp.35. <inria-00073538>
  • Rakesh M. Verma, Michaël Rusinowitch, Denis Lugiez. Algorithms and Reductions for Rewriting Problems. [Research Report] RR-3258, INRIA. 1997, pp.21. <inria-00073431>
  • Eric Monfroy, Michaël Rusinowitch, René Schott. Implementing Non-Linear Constraints with Cooperative Solvers. [Research Report] RR-2747, INRIA. 1995, pp.22. <inria-00073945>
  • Adel Bouhoula, E. Kounalis, Michaël Rusinowitch. Automated mathematical induction. [Research Report] RR-2187, INRIA. 1994, pp.42. <inria-00074484>
  • Gregory Kucherov, Michaël Rusinowitch. On the ground reducibility problem for word rewriting systems with variables. [Research Report] RR-1892, INRIA. 1993. <inria-00074779>
  • Michaël Rusinowitch, Laurent Vigneron. Automated deduction with associative commutative operators. [Research Report] RR-1896, INRIA. 1993, pp.34. <inria-00074775>
  • Adel Bouhoula, Michaël Rusinowitch. Implicit induction in conditional theories. [Research Report] RR-2045, INRIA. 1993. <inria-00074627>
  • Adel Bouhoula, Emmanuel Kounalis, Michaël Rusinowitch. Automated mathematical induction. [Research Report] RR-1663, INRIA. 1992. <inria-00074894>
  • Paliath Narendran, Michaël Rusinowitch. Any ground associative-commutative theory has a finite canonical system. [Research Report] RR-1324, INRIA. 1990, pp.11. <inria-00075236>
  • Claude Kirchner, Hélène Kirchner, Michaël Rusinowitch. Deduction with symbolic constraints. [Research Report] RR-1358, INRIA. 1990, pp.46. <inria-00077103>
  • Michaël Rusinowitch. On termination of the direct sum of term rewriting systems. [Research Report] RR-0679, INRIA. 1987, pp.10. <inria-00075874>
  • Michaël Rusinowitch, Jieh Hsiang. On word problems in equational theories. [Research Report] RR-0678, INRIA. 1987, pp.20. <inria-00075875>

Communication dans un congrès93 documents

  • Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch. Online link disclosure strategies for social networks. The 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. The 11th International Conference on Risks and Security of Internet and Systems. <hal-01402062>
  • Mathieu Turuani, Thomas Voegtlin, Michael Rusinowitch. Automated Verification of Electrum Wallet. 3rd Workshop on Bitcoin and Blockchain Research, Feb 2016, Christ Church, Barbados. <hal-01256397>
  • Hiep Nguyen, Abdessamad Imine, Michaël Rusinowitch. Detecting Communities under Differential Privacy. Workshop on Privacy in the Electronic Society - WPES 206, Oct 2016, Vienna, Austria. pp.83 - 93, 2016. <hal-01393266>
  • Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch. Anonymizing Social Graphs via Uncertainty Semantics. ASIACCS 2015 - 10th ACM Symposium on Information, Computer and Communications Security, Apr 2015, Singapour, Singapore. <hal-01108437>
  • Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch. Differentially Private Publication of Social Graphs at Linear Cost. ASONAM 2015, Aug 2015, Paris, France. <http://asonam.cpsc.ucalgary.ca/2015/>. <hal-01179528>
  • Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata. FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India. <hal-01224144>
  • Michaël Rusinowitch. Automated Verification of Security Protocols and Services. Third International Seminar on Program Verification, Automated Debugging and Symbolic Computation, Jul 2014, Vienna, Austria. <hal-01090000>
  • Walid Belkhir, Gisela Rossi, Michael Rusinowitch. A Parametrized Propositional Dynamic Logic with Application to Service Synthesis. Advances in Modal Logic, Aug 2014, Groningen, Netherlands. 10, pp.34-53, 2014, Advances in Modal Logic. <hal-01087829>
  • Ghazi Maatoug, Frédéric Dadeau, Michael Rusinowitch. Model-Based Vulnerability Testing of Payment Protocol Implementations. HotSpot'14 - 2nd Workshop on Hot Issues in Security Principles and Trust, affiliated with ETAPS 2014, Apr 2014, Grenoble, France. 2014. <hal-01089682>
  • Hiep H. Nguyen, Abdessamad Imine, Michael Rusinowitch. A Maximum Variance Approach for Graph Anonymization. The 7th International Symposium on Foundations & Practice of Security FPS’2014, Nov 2014, Montreal, Canada. <hal-01092442>
  • Hiep H. Nguyen, Abdessamad Imine, Michael Rusinowitch. Enforcing Privacy in Decentralized Mobile Social Networks. ESSoS Doctoral Symposium 2014, Feb 2014, Munich, Germany. <hal-01092447>
  • Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Fresh-Variable Automata for Service Composition. SYNASC 2013 -15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Sep 2013, Timisoara, Romania. IEEE, 2013. <hal-00914778>
  • Florent Jacquemard, Michaël Rusinowitch. Unranked Tree Rewriting and Effective Closures of Languages. Meeting of the IFIP WG 1.6 on Term Rewriting, Jun 2013, Eindhoven, Netherlands. 2013. <hal-00852379>
  • Florent Jacquemard, Michael Rusinowitch. Rewrite Closure and CF Hedge Automata. 7th International Conference on Language and Automata Theory and Application, Apr 2013, Bilbao, Spain. Springer, 2013, Lecture Notes in Computer Science. <hal-00767719>
  • Houari Mahfoud, Abdessamad Imine, Michael Rusinowitch. SVMAX: a system for secure and valid manipulation of XML data. Bipin C. Desai and Josep-Lluis Larriba-Pey and Jorge Bernardino. IDEAS'13 Proceedings of the 17th International Database Engineering & Applications Symposium, Oct 2013, Barcelone, Spain. ACM, 2013, <10.1145/2513591.2513657>. <hal-00915318>
  • Michael Rusinowitch. Automated verification of security protocols and application to services. Hanifa Boucheneb and Francesco Flammini. Verification and Evaluation of Computer and Communication Systems, Nov 2013, Florence, Italy. 2013. <hal-00915323>
  • Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michaël Rusinowitch. Unification modulo Chaining. A.-H. Dediu and C. Martín-Vide. The 6th International Conference on Language and Automata Theory and Applications, Mar 2012, A Coruna, Spain. Springer, Berlin - Heidelberg, 7183, pp. 70--82, 2012, Lecture Notes in Computer Science. <hal-00659027>
  • Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, et al.. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. Cormac Flanagan and Barbara Konig. Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Mar 2012, Tallinn, Estonia. Springer, 7214, pp.267-282, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-28756-5_19>. <hal-00759725>
  • Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Towards the Orchestration of Secured Services under Non-disclosure Policies.. Igor V. Kotenko and Victor A. Skormin. 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, Oct 2012, St. Petersburg, Russia. Springer, 7531, pp.130-145, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-33704-8_12>. <hal-00755947>
  • Hatem Ghabri, Ghazi Maatoug, Michael Rusinowitch. Compiling symbolic attacks to protocol implementation tests. Fourth International Symposium on Symbolic Computation in Software Science, Dec 2012, Tunis, Tunisia. 122, 2013, EPTCS; SCSS 2013. <10.4204/EPTCS.122.4>. <hal-00915320>
  • Siva Anantharaman, Serdar Erbatur, Christopher Lynch, Paliath Narendran, Michael Rusinowitch. Unification modulo Synchronous Distributivity. Gramlich, B. and Miller, D. and Sattler. U. IJCAR 2012 (The 6th International Joint Conference on Automated Reasoning), Jun 2012, Manchester, United Kingdom. Springer-Verlag, Berlin, Heidelberg, 7364, pp.14--29, 2012. <hal-00684185>
  • Asma Cherif, Abdessamad Imine, Michaël Rusinowitch. Optimistic access control for distributed collaborative editors. 2011 ACM Symposium on Applied Computing (SAC), Mar 2011, Taichung, Taiwan. ACM, pp.861-868, 2011, Proceedings of the 2011 ACM Symposium on Applied Computing. <http://dl.acm.org/ft_gateway.cfm?id=1982374&ftid=65264&dwn=1&CFID=154985815&CFTOKEN=77096156>. <10.1145/1982185.1982374>. <inria-00576880>
  • Jagdish Prasad Achara, Abdessamad Imine, Michaël Rusinowitch. DeSCal --- Decentralized Shared Calendar for P2P and Ad-Hoc Networks. The 10th International Symposium on Parallel and Distributed Computing - ISPDC 2011, Jul 2011, Cluj-Napoca, Romania. IEEE, pp.223 - 231, 2011, 10th International Symposium on Parallel and Distributed Computing - ISPDC 2011. <10.1109/ISPDC.2011.40>. <hal-00644749>
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch, Mathieu Turuani. Distributed Orchestration of Web Services under Security Constraints. 4th SETOP International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. Springer, 2012, Lecture Notes in Computer Science; Post-Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. <hal-00641321>
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Web Services Verification and Prudent Implementation. 4th SETOP International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. Springer, 2012, Lecture Notes in Computer Science; Post-Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. <hal-00641326>
  • Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch. Cap Unification: Application to Protocol Security modulo Homomorphic Encryption. David Basin, Peng Liu. 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2010, Apr 2010, Beijing, China. ACM, 2010. <inria-00448703>
  • Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Orchestration under Security Constraints. Bernhard K Aichernig and Frank S. de Boer and Marcello M. Bonsangue. Formal Methods for Components and Objects (FMCO 2010), Nov 2010, Graz, Austria. Springer, 6957, 2011, Lecture Notes in Computer Science; Formal Methods for Components and Objects. <hal-00642855>
  • Florent Jacquemard, Michael Rusinowitch. Rewrite-Based Verification of XML Updates. Kutsia, Temur and Schreiner, Wolfgang and Fernández, Maribel. 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming (PPDP), Jul 2010, Hagenberg, Austria. ACM, 2010, <http://portal.acm.org/citation.cfm?doid=1836089.1836105>. <10.1145/1836089.1836105>. <inria-00578916>
  • Ryma Abassi, Florent Jacquemard, Michael Rusinowitch, Sihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas. Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. IEEE Computer Society Press, pp.1-8, 2010, <http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5699810>. <10.1109/COMNET.2010.5699810>. <inria-00578884>
  • Zeeshan Ahmed, Abdessamad Imine, Michael Rusinowitch. Safe and Efficient Strategies for Updating Firewall Policies. Sokratis K. Katsikas and Javier Lopez and Miguel Soriano. 7th International Conference on Trust, Privacy & Security in Digital Business - TrustBus 2010, Aug 2010, Bilbao, Spain. Springer, 6264, pp.45-57, 2010, Lecture Notes of Computer Science; Trust, Privacy and Security in Digital Business. <inria-00529077>
  • Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Satisfiability of General Intruder Constraints with a Set Constructor. The Fifth International Conference on Risks and Security of Internet and Systems - CRiSIS 2010, Oct 2010, Montreal, Canada. 2010. <inria-00531025>
  • Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch. Unification Modulo Homomorphic Encryption. Silvio Ghilardi and Roberto Sebastiani. 7th International Symposium on Frontiers of Combining Systems - FroCoS 2009, Sep 2009, Trento, Italy. Springer, 5749, pp.100-116, 2009, Lecture Notes in Computer Science; Frontiers of Combining Systems. <10.1007/978-3-642-04222-5_6>. <inria-00426798>
  • Najah Chridi, Mathieu Turuani, Michael Rusinowitch. Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. Computer Security Foundations Symposium, Jul 2009, Port Jefferson, United States. IEEE, pp.277-289, 2009, Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09). <inria-00426919>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Combinable Extensions of Abelian Groups. Renate Schmidt. 22nd International Conference on Automated Deduction - CADE-22, Aug 2009, Montreal, Canada. Springer, 5663, pp.51-66, 2009, Lecture Notes in Artificial Intelligence; Automated Deduction – CADE-22. <10.1007/978-3-642-02959-2_4>. <inria-00428077>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Satisfiability Procedures for Combination of Theories Sharing Integer Offsets. Stefan Kowalewski and Anna Philippou. 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2009, Mar 2009, York, United Kingdom. Springer, 5505, pp.428-442, 2009, Lecture Notes in Computer Science; Tools and Algorithms for the Construction and Analysis of Systems. <inria-00427870>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Data Structures with Arithmetic Constraints: a Non-disjoint Combination. Silvio Ghilardi and Roberto Sebastiani. 7th International Symposium on Frontiers of Combining Systems - FroCoS'2009, Sep 2009, Trento, Italy. Springer, 5749, pp.335-350, 2009, Lecture Notes in Artificial Intelligence; Frontiers of Combining Systems. <10.1007/978-3-642-04222-5_20>. <inria-00428421>
  • Abdessamad Imine, Asma Cherif, Michael Rusinowitch. A Flexible Access Control Model for Distributed Collaborative Editors. Willem Jonker and Milan Petkovic. 6th VLDB Workshop on Secure Data Management - SDM 2009, Aug 2009, Lyon, France. Springer, 5776, pp.89-106, 2009, Lecture Notes in Computer Science; Secure Data Management. <10.1007/978-3-642-04219-5_6>. <inria-00431341>
  • Tarek Abbes, Adel Bouhoula, Michael Rusinowitch. An inference system for detecting firewall filtering rules anomalies. 23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. ACM, pp.2122-2128, 2008. <inria-00329730>
  • Florent Jacquemard, Michael Rusinowitch. Closure of Hedge-Automata Languages by Hedge Rewriting. A. Voronkov. 19th International Conference on Rewriting Techniques and Applications - RTA 2008, 2008, Hagenberg, Austria. Springer Berlin / Heidelberg, 5117, pp.157-171, 2008, Lecture Notes in Computer Science; Rewriting Techniques and Applications. <10.1007/978-3-540-70590-1_11>. <inria-00329803>
  • Siva Anatharaman, Hai Lin, Chris Lynch, Paliath Narendran, Michael Rusinowitch. Active Intruders with Caps. FCS-ARSPA-WITS'08, Jun 2008, Pittsburgh, United States. 2008. <inria-00330532>
  • Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Automatic Composition of Services with Security Policies. Web Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), Jul 2008, Honolulu, United States. IEEE, pp.529-537, 2008, <10.1109/SERVICES-1.2008.13>. <inria-00330338>
  • Najah Chridi, Mathieu Turuani, Michael Rusinowitch. Towards a Constrained-based Verification of Parameterized Cryptographic Protocols. Michael Hanus. 18th International Symposium on Logic-Based Program Synthesis and Transformation - LOPSTR 2008, Jul 2008, Valence, Spain. pp.191-206, 2008. <inria-00332484>
  • Humberto Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State. Abusing SIP Authentication. Information Assurance and Security ( ISIAS), Sep 2008, Naples, Italy. IEEE, pp.237-242, 2008, Information Assurance and Security, 2008. ISIAS '08. <10.1109/IAS.2008.29>. <inria-00326077>
  • Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Towards an Automatic Analysis of Web Service Security. Konev, Boris and Wolter, Franck. 6th International Symposium on Frontiers of Combining Systems - FroCoS'07, Sep 2007, Liverpool, United Kingdom. Springer, 4720, pp.133-147, 2007, Lecture Notes in Artificial Intelligence; Frontiers of Combining Systems. <10.1007/978-3-540-74621-8_9>. <inria-00557707>
  • Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Verifying Cryptographic Protocols with Subterms Constraints. Dershowitz, Nachum and Voronkov, Andrei. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning - LPAR 2007, Oct 2007, Yerevan, Armenia. Springer, 4790, pp.181-195, 2007, Lecture Notes in Artificial Intelligence; Logic for Programming, Artificial Intelligence, and Reasoning. <10.1007/978-3-540-75560-9_15>. <inria-00557710>
  • Siva Anantharaman, Paliath Narendran, Michael Rusinowitch. Intruders with Caps. F. Baader. Rewriting Techniques and Applications - RTA'07, Jun 2007, Paris, France. Springer-Verlag, pp.20--35, 2007, Lecture Notes in Computer Science. <hal-00468721>
  • Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu. Relating two standard notions of secrecy. Proc. of the 20th Int. Conference Computer Science Logic (CSL'06), Sep 2006, Szeged, Hungary, 2006. <inria-00108391>
  • Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron. Tree automata with equality constraints modulo equational theories. Ulrich Furbach and Natarajan Shankar. 3d International Joint Conference on Automated Reasoning (IJCAR), Aug 2006, Seattle, United States. Springer, 4130, pp.557-571, 2006, Lecture Notes in Computer Science; 3d International Joint Conference on Automated Reasoning (IJCAR). <http://www.springerlink.com/content/j354023699610786/>. <10.1007/11814771_45>. <inria-00579011>
  • Abdessamad Imine, Pascal Molli, Gérald Oster, Michaël Rusinowitch. Towards Synchronizing Linear Collaborative Objects with Operation Transformation. F. Wang. International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, IFIP International Federation for Information Processing 2005, 3731 (3731), pp.411-427, 2005, Lecture Notes in Computer Science. <inria-00000427>
  • Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu. A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures. 7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, ACM press, pp.12-22, 2005. <inria-00000557>
  • Alessandro Armando, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, et al.. The AVISPA Tool for the automated validation of internet security protocols and applications. Kousha Etessami and Sriram K. Rajamani. 17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. Springer, 3576, pp.281-285, 2005, Lecture Notes in Computer Science. <inria-00000408>
  • Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree. International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, 1, pp.404--408, 2004. <inria-00100006>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption.. Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 78, 11 p, 2004, Electronic Notes in Theoretical Computer Science - ENTCS. <inria-00100013>
  • Tarek Abbes, Alakesh Haloi, Michaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification. International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg, 2004. <inria-00100008>
  • Tarek Abbes, Michaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection. Urs E. Gattiker. 13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p, 2004. <inria-00100007>
  • Abdessamad Imine, Pascal Molli, Gérald Oster, Michaël Rusinowitch. Deductive Verification of Distributed Groupware Systems. Charles Rattray and Savitri Maharaj and Carron Shankland. Tenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, Springer, 3116, pp.226-240, 2004, Lecture Notes in Computer Science. <inria-00099986>
  • David Basin, Michaël Rusinowitch. Automated Reasoning. Basin, David and Rusinowitch, Michael. Second International Joint Conference on Automated Reasoning - IJCAR'2004, 2004, Cork, Irlande, Springer Verlag, 3097, XII-491 p, 2004, Lecture Notes in Computer Science. <inria-00099991>
  • Michaël Rusinowitch. A Decidable Analysis of Security Protocols. J.J. Lévy and E. Mayr and J. Mitchell. 18th IFIP World Computer Congress on Theoretical Computer Science - TCS'2004, 2004, Toulouse, France, Kluwer Academic Publishers, 1 p, 2004. <inria-00099993>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. M. Baaz and J. A. Makowsky. Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, Springer, 2803, pp.128-141, 2003, Lecture Notes in Computer Science. <inria-00099514>
  • Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions. Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p, 2003. <inria-00099496>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, Springer, 2914, pp.124-135, 2003, Lecture Notes in Computer Science. <inria-00103935>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. 18th IEEE Symposium on Logic in Computer Science (LICS 2003), Jun 2003, Ottawa, Canada, IEEE Computer Society, pp.261-270, 2003. <inria-00103954>
  • Abdessamad Imine, Pascal Molli, Gérald Oster, Michaël Rusinowitch. Proving Correctness of Transformation Functions in Real-Time Groupware. 8th European Conference of Computer-supported Cooperative Work - ECSCW'03, 2003, Helsinki, Finland, 18 p, 2003. <inria-00107652>
  • Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch. Unification modulo ACUI plus Homomorphisms/Distributivity. Franz Baader. 2003, Springer-Verlag, pp.442--457, 2003, Lecture Notes in Artificial Intelligence - 2741. <hal-00080670>
  • Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch. ACID-Unification is NEXPTIME-Decidable. Branislav Rovan, Peter Vojtáš. 2003, Springer-Verlag, pp.169--178, 2003, Lecture Notes in Computer Science - 2747. <hal-00080663>
  • Mehdi Bouallagui, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron. Analyse Automatique de Protocoles de Sécurité avec CASRUL. Sécurité et Architecture Réseaux - SAR'2002, Jul 2002, Marrackech, Maroc, Morocco. 2002. <inria-00103879>
  • Alessandro Armando, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, et al.. The AVISS Security Protocol Analysis Tool. Ed Brinksma and Kim Guldstrand Larsen. 14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, Springer, 2404, pp.349-353, 2002, Lecture Notes in Computer Science. <inria-00100915>
  • Imine Abdessamad, Pascal Molli, Gérald Oster, Michaël Rusinowitch. Development of Transformation Functions Assisted by a Theorem Prover. Fourth International Workshop on Collaborative Editing 2002 - ACM CSCW'2002, 2002, Nouvelle-Orléans, USA, 8 p, 2002. <inria-00107574>
  • Julien Musset, Michaël Rusinowitch. An effective fixed point calculus for deterministic systems applied to model checking. First International Workshop on Automated Verification of Infinite-State Systems - AVIS'01, Mar 2001, Berlin, Germany, 4 p, 2001. <inria-00100501>
  • Michaël Rusinowitch, Mathieu Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. 14th IEEE Computer Security Foundations Workshop, Jun 2001, Cape Breton, Nova Scotia, Canada, IEEE Computer Society, 14 p, 2001, <10.1109/CSFW.2001.930145>. <inria-00100411>
  • Alessandro Armando, Silvio Ranise, Michaël Rusinowitch. Uniform Derivation of Decision Procedures by Superposition. Conference of the European Association for Computer Science Logic - CSl'2001, Sep 2001, Paris, France, 15 p, 2001. <inria-00100412>
  • Michaël Rusinowitch. Rewriting for Deduction and Verification. A. Middeldorp. International Conference on Rewriting Techniques and Applications - RTA'2001, 2001, Utrecht, The Netherlands, Springer-Verlag, 2051, pp.2, 2001, Lecture notes in Computer Science. <inria-00100413>
  • Michaël Rusinowitch. Uniform Derivation of Satisfiability Procedures. Résolution de contraintes du 1er ordre dans des structures variées, 2001, Marseille, France, 2 p, 2001. <inria-00100611>
  • Alessandro Armando, Michaël Rusinowitch, Sorin Stratulat. Incorporating Decision Procedures in Implicit Induction. 9th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning - CALCULEMUS'2001, 2001, Sienne, Italy, 16 p, 2001. <inria-00100610>
  • Michaël Rusinowitch. Vérification automatique de protocoles cryptographiques avec CASRUL. Journées Systèmes et Logiciels Critiques, 2001, Grenoble, France, 2001. <inria-00100559>
  • Julien Musset, Michaël Rusinowitch. Improved Subsumption for CLP-based Verification. Workshop on (Constraint) Logic Programming and Software Engineering - CLPSE'2001, 2001, Paphos, Cyprus, 9 p, 2001. <inria-00100561>
  • Michaël Rusinowitch. The practice of cryptographic protocols verification. CAV Workshop on Logical Aspects of Cryptographic Protocols Verification, 2001, Paris, France, 1 p, 2001, ENTCS. <inria-00100414>
  • Michaël Rusinowitch. Vérification et réécriture. Journées Systèmes Infinis, 2001, Paris, France, 2001. <inria-00100557>
  • Michaël Rusinowitch, Mathieu Turuani. Deciding insecurity for non-atomic keys. Dagstuhl Seminar on Specification and Analysis of Secure Cryptographic Protocols, 2001, Dagstuhl, Germany, 2001. <inria-00100558>
  • Alessandro Armando, Michaël Rusinowitch, Sorin Stratulat. Incorporating Decision Procedures in Implicit Induction. Eight International Conference on Computer Aided Systems Theory - Eurocast'2001, Feb 2001, Casa de Colon, Las Palmas de Gran Canaria, Spain, 16 p, 2001. <inria-00100928>
  • Michaël Rusinowitch, Sorin Stratulat, Francis Klay. Mechanical Verification of an Ideal Incremental ABR Conformance Algorithm. E. Allen Emerson & A. Prasad Sistla. 12th International Conference on Computer Aided Verification - CAV'2000, 2000, Chicago, USA, Springer, 1855, pp.344-357, 2000, Lecture notes in Computer Science. <inria-00099167>
  • Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron. Compiling and Verifying Security Protocols. Michel Parigot, Andrei Voronkov. International Conference on Logic Programming & Automated Reasoning - LPAR'2000, 2000, Reunion Island, France, Springer-Verlag, 1955, pp.131-160, 2000, Lecture Notes in Computer Science. <inria-00099161>
  • Paliath Narendran, Michaël Rusinowitch. The theory of total unary RPO is decidable. John Lloyd, Veronica Dahl, Ulrich Furbach, Manfred Kerber. First International Conference on Computational Logic - Cl'2000, 2000, Londres, UK, Springer-Verlag, 1861, pp.660-672, 2000, Lecture Notes in Computer Science. <inria-00099166>
  • Adel Bouhoula, Ahmed Jebali, Michaël Rusinowitch. Reasoning about Object Behaviours with Rewriting.. Workshop on Object-Oriented Specification Techniques for Distributed Systems and Behaviours (in conjunction with Principles, Logics, and Implementations of high-level programming languages PLI99) - OOSDS'99, 1999, Paris, France, 6 p, 1999. <inria-00099000>
  • Gregory Kucherov, Michaël Rusinowitch. Patterns in words versus patterns in trees : a brief survey and new results. D. Bjorner, M. Broy, A. Zamulin. Andrei Ershov Third International Conference, Perspectives of system Informatics - PSI'99, 1999, Novosibirsk, Russia, Springer-Verlag, 1755, pp.283-296, 1999, Lecture Notes in Computer Science. <inria-00099009>
  • Francis Klay, Michaël Rusinowitch, Sorin Stratulat. Analysing Feature Interactions with Automated Deduction Systems. 7th International Conference on Telecommunication Systems Modeling & Analysis, 1999, Nashville, Tennessee, USA, 33 p, 1999. <inria-00099001>
  • Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron. Compiling and narrowing cryptographic protocols. Workshop on Verification and Modelling, 1999, Besançon, France, 1 p, 1999. <inria-00098875>
  • Michaël Rusinowitch, Sorin Stratulat, Francis Klay. Mechanical Verification of a Generic Incremental ABR Conformance Algorithm. Workshop on Modelling & Verification, Dec 1999, Besancon, France, 43 p, 1999. <inria-00099017>
  • Narjes Berregeb, Adel Bouhoula, Michaël Rusinowitch. Observational Proofs with Critical Contexts. Fundamental Approaches to Software Engineering - ETAPS'98, 1998, Lisboa, Portugal, Springer-Verlag, 1382, pp.38-53, 1998, Lecture Notes in Computer Science. <inria-00098624>
  • Rakesh Verma, Michaël Rusinowitch, Denis Lugiez. Algorithms and Reductions for Rewriting Problems. Proceedings 9th Conference on Rewriting Techniques and Applications, 1998, Tsukuba, Japan, Springer-Verlag, pp.166-180, 1998, Lecture Notes in Computer Science. <inria-00098607>
  • Richard Mayr, Michaël Rusinowitch. Reachability is decidable for ground AC Rewrite systems. INFINITY '98, 3rd International Workshop on Verification of Infinite State Systems, 1998, Aalborg, Denmark, 12 p, 1998. <inria-00098437>
  • Hubert Comon, Paliath Narendran, Robert Nieuwenhuis, Michaël Rusinowitch. Decision problems in ordered rewriting. Proceedings 13th IEEE Symposium on Logic in Computer Science, 1998, none, 11 p, 1998. <inria-00098606>
  • Paliath Narendran, Michaël Rusinowitch, Rakesh Verma. RPO constraint solving is in NP. Computer Science Logic, 1998, Brno, Tchêquie, 12 p, 1998. <inria-00098426>

Poster1 document

  • Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Marc Rigolot, et al.. Analyse d'activité et exposition de la vie privée sur les médias sociaux. 16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Jan 2016, Reims, France. 2016. <hal-01241619>

Article dans une revue32 documents

  • Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Intruder deducibility constraints with negation. Decidability and application to secured service compositions. Journal of Symbolic Computation, Elsevier, 2017, 80, pp.4 - 26. <10.1016/j.jsc.2016.07.008>. <hal-01405851>
  • Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani. Satisfiability of General Intruder Constraints with and without a Set Constructor. Journal of Symbolic Computation, Elsevier, 2017, 80, pp. 27-61. <10.1016/j.jsc.2016.07.009>. <hal-01405842>
  • Florent Jacquemard, Michael Rusinowitch. One-variable context-free hedge automata. Journal of Computer and System Sciences, Elsevier, 2016, <10.1016/j.jcss.2016.10.006>. <hal-01426626>
  • Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch. Detection of firewall configuration errors with updatable tree. International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. <http://link.springer.com/journal/10207>. <10.1007/s10207-015-0290-0>. <hal-01320646>
  • Hiep Nguyen, Abdessamad Imine, Michael Rusinowitch. Network Structure Release under Differential Privacy. Transactions on Data Privacy, IIIA-CSIC, 2016, 9 (3), pp.26. <hal-01424911>
  • Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Parametrized automata simulation and application to service composition. Journal of Symbolic Computation, Elsevier, 2015, pp.21. <hal-01089128>
  • Frédéric Dadeau, Pierre-Cyrille Héam, Rafik Kheddam, Ghazi Maatoug, Michaël Rusinowitch. Model-based mutation testing from security protocols in HLPSL. Journal of Software Testing, Verification, and Reliability, John Wiley & Sons, 2015, pp.30. <10.1002/stvr.1531>. <hal-01090881>
  • Asma Cherif, Abdessamad Imine, Michael Rusinowitch. Practical access control management for distributed collaborative editors. Pervasive and Mobile Computing, Elsevier, 2014, pp.62-86. <hal-01094068>
  • Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michaël Rusinowitch. Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining. Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2014, 10 (1:5), pp. 1--26. <10.2168/LMCS-10(1:5)2014>. <hal-00854841v3>
  • Abdessamad Imine, Michael Rusinowitch. Secure Collaboration for Smartphones. ERCIM News, ERCIM, 2013. <hal-00915317>
  • Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch. Unification modulo Homomorphic Encryption. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.135--158. <10.1007/s10817-010-9205-y>. <inria-00618336>
  • Siva Anantharaman, Paliath Narendran, Michael Rusinowitch. String rewriting and security analysis: an extension of a result of Book and Otto. Journal of Automata Languages and Combinatorics, Otto-von-Guericke-Universität Magdeburg, 2012, 16 (2--4), pp.83--98. <hal-00659009>
  • Yannick Chevalier, Michael Rusinowitch. Decidability of Equivalence of Symbolic Derivations. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.263-292. <10.1007/s10817-010-9199-5>. <inria-00527630>
  • Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch. Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator. Fundamenta Informaticae, Polskie Towarzystwo Matematyczne, 2010, 105 (1-2), pp.163--187. <10.3233/FI-2010-362>. <inria-00526683>
  • Yannick Chevalier, Michael Rusinowitch. Compiling and securing cryptographic protocols. Information Processing Letters, Elsevier, 2010, 110 (3), pp.116-122. <inria-00527633>
  • Yannick Chevalier, Michael Rusinowitch. Symbolic Protocol Analysis in the Union of Disjoint Intruder Theories: Combining Decision Procedures. Theoretical Computer Science, Elsevier, 2010, 411 (10), pp.1261-1282. <10.1016/j.tcs.2009.10.022>. <inria-00455290>
  • Tarek Abbes, Adel Bouhoula, Michael Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection. International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. <10.1504/IJSN.2010.037661>. <inria-00528201>
  • Humberto Abdelnur, Tigran Avanesov, Michael Rusinowitch, Radu State. Abusing SIP authentication. Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318. <inria-00405356>
  • Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron. Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming, Elsevier, 2008, 75 (2), pp.182-208. <10.1016/j.jlap.2007.10.006>. <inria-00329693>
  • Yannick Chevalier, Ralf Kuesters, Michael Rusinowitch, Mathieu Turuani. Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Transactions on Computational Logic, Association for Computing Machinery, 2008, 9 (4), pp.Article 24. <10.1145/1380572.1380573>. <inria-00329740>
  • Yannick Chevalier, Michael Rusinowitch. Hierarchical combination of intruder theories. Information and Computation, Elsevier, 2008, 206 (2-4), pp.352-377. <10.1016/j.ic.2007.07.004>. <inria-00329715>
  • Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu. Relating two standard notions of secrecy. Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2007, 3 (3, paper 2), pp.1-29. <10.2168/LMCS-3(3:2)2007>. <inria-00178352>
  • Abdessamad Imine, Michaël Rusinowitch, Gérald Oster, Pascal Molli. Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence. Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. <10.1016/j.tcs.2005.09.066>. <inria-00000426>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274. <inria-00103807>
  • Siva Anantharaman, Paliath Narendran, Michael Rusinowitch. Closure properties and decision problems of dag automata. Information Processing Letters, Elsevier, 2005, 94, pp.231--240. <10.1016/j.ipl.2005.02.004>. <hal-00077495>
  • Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort. Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967. <inria-00100005>
  • Siva Anantharaman, Paliath Narendran, Michael Rusinowitch. Unification modulo ACUI plus Distributivity Axioms. Journal of Automated Reasoning, Springer Verlag, 2004, 33, pp.1--28. <hal-00077499>
  • Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch. Unification Modulo ACUI Plus Distributivity Axioms. Journal of Automated Reasoning, Springer Verlag, 2004, 33 (1), pp.1-28. <inria-00099990>
  • Michaël Rusinowitch, Mathieu Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete.. Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (299), pp.451-475. <10.1016/S0304-3975(02)00490-5>. <inria-00103985>
  • Hubert Comon-Lundh, Paliath Narendran, Robert Nieuwenhuis, Michaël Rusinowitch. Deciding the Confluence of Ordered Term Rewrite Systems. ACM Transactions on Computational Logic, Association for Computing Machinery, 2003, 4 (1), pp.33-55. <inria-00099508>
  • Adel Bouhoula, Michaël Rusinowitch. Observational proofs by rewriting. Theoretical Computer Science, Elsevier, 2002, 275 (1-2), pp.675-698. <inria-00100714>
  • Rakesh Verma, Michaël Rusinowitch, Denis Lugiez. Algorithms and Reductions for Rewriting Problems. Fundamenta Informatica, 2001, 46 (3), pp.257-276. <inria-00100446>

Pré-publication, Document de travail2 documents

  • Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Guarded Variable Automata over Infinite Alphabets. 29 pages. arXiv admin note: text overlap with arXiv:1302.4205. 2013. <hal-00914779>
  • Florent Jacquemard, Michaël Rusinowitch. Rewrite Closure and CF Hedge Automata. 2012. <hal-00752496v2>

Autre publication2 documents

  • Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch. Intruders with Caps. Rapport LIFO, RR-2007-02 (Projet PRV, Catégorie Z). Version détaillée du papier accepté au RTA'07. (Version courte apparaitra dans les actes du RTA'0.. 2007. <hal-00144178>
  • Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch. How Useful are Dag Automata?. Projet PRV (du LIFO). Rapport de Recherche (LIFO). 2004. <hal-00077510>

Direction d'ouvrage, Proceedings3 documents

  • Rakesh Verma, Michael Rusinowitch. International Workshop on Security And Privacy Analytics. International Workshop on Security And Privacy Analytics, Mar 2016, New Orleans, United States. ACM, 2016, IWSPA '16: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 978-1-4503-4077-9. <http://dl.acm.org/citation.cfm?id=2875475>. <hal-01408625>
  • Siva Anantharaman, Gaétan Hains, Michael Rusinowitch, Paul Gastin, John Mullins. Journal of Automata, Languages and Combinatorics, Vol. 11(1). Otto-von-Guericke-Universität, D-39016 Magdeburg, pp.142, 2006. <hal-00468802>
  • Paliath Narendran, Michaël Rusinowitch. Rewriting Techniques & Applications. P. Narendran & M. Rusinowitch. Springer-Verlag, 396 p, 1999, Lecture Notes in Computer Science. <inria-00098862>