default search action
Pierpaolo Degano
Person information
- affiliation: University of Pisa, Italy
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
Specifying and Verifying Information Flow Control in SELinux Configurations. ACM Trans. Priv. Secur. 27(4): 31:1-31:35 (2024) - [c125]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. ECAI 2024: 1405-1412 - [i10]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. CoRR abs/2408.09516 (2024) - 2023
- [j72]Gabriele Costa, Pierpaolo Degano, Letterio Galletta, Simone Soderi:
Formally verifying security protocols built on watermarking and jamming. Comput. Secur. 128: 103133 (2023) - 2022
- [j71]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Can my firewall system enforce this policy? Comput. Secur. 117: 102683 (2022) - [c124]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux. CSF 2022: 243-259 - [c123]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Towards effective preservation of robust safety properties. SAC 2022: 1674-1683 - [i9]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). CoRR abs/2205.15915 (2022) - [i8]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò:
Automatic Fair Exchanges. CoRR abs/2207.12326 (2022) - 2021
- [j70]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [j69]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Modelling and analysing IoT systems. J. Parallel Distributed Comput. 157: 233-242 (2021) - [j68]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Mechanical incrementalization of typing algorithms. Sci. Comput. Program. 208: 102657 (2021) - [j67]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - [c122]Pierpaolo Degano, Letterio Galletta, Selene Gerali:
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. Protocols, Strands, and Logic 2021: 124-138 - [c121]Davide Basile, Maurice H. ter Beek, Pierpaolo Degano, Axel Legay, Gian-Luigi Ferrari, Stefania Gnesi, Felicita Di Giandomenico:
Supervisory Synthesis of Configurable Behavioural Contracts with Modalities. FORTE 2021: 177-181 - 2020
- [j66]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [j65]Davide Basile, Maurice H. ter Beek, Pierpaolo Degano, Axel Legay, Gian-Luigi Ferrari, Stefania Gnesi, Felicita Di Giandomenico:
Controller synthesis of service contracts with variability. Sci. Comput. Program. 187: 102344 (2020) - [c120]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Security Metrics at Work on the Things in IoT Systems. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 233-255 - [c119]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - [c118]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy. ITASEC 2020: 82-92 - [c117]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
MuAC: Access Control Language for Mutual Benefits. ITASEC 2020: 119-127 - [i7]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - [i6]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy (Extended Version). CoRR abs/2003.05836 (2020)
2010 – 2019
- 2019
- [j64]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Programming in a context-aware language. J. Supercomput. 75(12): 7750-7764 (2019) - [c116]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Robust Declassification by Incremental Typing. Foundations of Security, Protocols, and Equational Reasoning 2019: 54-69 - [c115]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Checking the Expressivity of Firewall Languages. The Art of Modelling Computational Systems 2019: 86-100 - [c114]Davide Basile, Rosario Pugliese, Francesco Tiezzi, Pierpaolo Degano, Gian-Luigi Ferrari:
Automata-Based Behavioural Contracts with Action Correlation. From Software Engineering to Formal Methods and Tools, and Back 2019: 131-151 - [c113]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Revealing the Trajectories of KLAIM Tuples, Statically. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 437-454 - [c112]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Are All Firewall Systems Equally Powerful? PLAS@CCS 2019: 1-17 - [c111]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Using Standard Typing Algorithms Incrementally. NFM 2019: 106-122 - [e13]Pierpaolo Degano, Roberto Zunino:
Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019. CEUR Workshop Proceedings 2315, CEUR-WS.org 2019 [contents] - [i5]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Translation Validation for Security Properties. CoRR abs/1901.05082 (2019) - 2018
- [j63]Andrea Bernini, Linda Brodo, Pierpaolo Degano, Moreno Falaschi, Diana Hermith:
Process calculi for biological processes. Nat. Comput. 17(2): 345-373 (2018) - [c110]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c109]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c108]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c107]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - [i4]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Using Standard Typing Algorithms Incrementally. CoRR abs/1808.00225 (2018) - 2017
- [j62]Pierpaolo Degano, Gian-Luigi Ferrari, Gianluca Mezzetti:
Regular and context-free nominal traces. Acta Informatica 54(4): 399-433 (2017) - [j61]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. Log. Methods Comput. Sci. 13(3) (2017) - [c106]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Experimenting with a Context-Aware Language. PaCT 2017: 3-17 - [c105]Davide Basile, Felicita Di Giandomenico, Stefania Gnesi, Pierpaolo Degano, Gian-Luigi Ferrari:
Specifying variability in service contracts. VaMoS 2017: 20-27 - [c104]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto:
Tool Supported Analysis of IoT. ICE@DisCoTec 2017: 37-56 - 2016
- [j60]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari:
Automata for Specifying and Orchestrating Service Contracts. Log. Methods Comput. Sci. 12(4) (2016) - [j59]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. J. Comput. Secur. 24(4): 427-477 (2016) - [j58]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari, Emilio Tuosto:
Relating two automata-based models of orchestration and choreography. J. Log. Algebraic Methods Program. 85(3): 425-446 (2016) - [j57]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Component Language for Adaptation: Design, Semantics and Program Analysis. IEEE Trans. Software Eng. 42(6): 505-529 (2016) - [c103]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Last Mile's Resources. Semantics, Logics, and Calculi 2016: 33-53 - [c102]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Where Do Your IoT Ingredients Come From? COORDINATION 2016: 35-50 - [c101]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari, Emilio Tuosto:
Playing with Our CAT and Communication-Centric Applications. FORTE 2016: 62-73 - [c100]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
A Semantics for Disciplined Concurrency in COP. ICTCS 2016: 177-189 - [c99]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Event-driven Adaptation in COP. PLACES 2016: 37-45 - [c98]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Step Towards Checking Security in IoT. ICE 2016: 128-142 - [i3]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. CoRR abs/1610.08419 (2016) - 2015
- [j56]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
On the information leakage of differentially-private mechanisms. J. Comput. Secur. 23(4): 427-469 (2015) - [j55]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Model checking usage policies. Math. Struct. Comput. Sci. 25(3): 710-763 (2015) - [c97]Massimo Bartoletti, Pierpaolo Degano, Paolo Di Giamberardino, Roberto Zunino:
Debits and Credits in Petri Nets and Linear Logic. Logic, Rewriting, and Concurrency 2015: 135-159 - [c96]Andrea Canciani, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Context-Oriented Extension of F#. FOCLASA 2015: 18-32 - 2014
- [j54]Pierpaolo Degano, Juhani Karhumäki, Paolo Massazza:
From Models to Languages. Fundam. Informaticae 134(3-4): i (2014) - [j53]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari:
A formal framework for secure and complying services. J. Supercomput. 69(1): 43-52 (2014) - [c95]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Component Language for COP. COP@ECOOP 2014: 6:1-6:7 - [c94]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Linguistic Mechanisms for Context-Aware Security. ICTAC 2014: 61-79 - [c93]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Phase Static Analysis for Reliable Adaptation. SEFM 2014: 347-362 - [c92]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari:
Automata for Analysing Service Contracts. TGC 2014: 34-50 - [c91]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari, Emilio Tuosto:
From Orchestration to Choreography through Contract Automata. ICE 2014: 67-85 - 2013
- [j52]Pierpaolo Degano, Joshua D. Guttman:
Preface. J. Comput. Secur. 21(6): 779-780 (2013) - [j51]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Gianluca Mezzetti, Gianluigi Ferrari:
Security in Pervasive Applications: A Survey. Eur. J. Law Technol. 4(2) (2013) - [c90]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari:
Secure and Unfailing Services. PaCT 2013: 167-181 - [c89]Pierpaolo Degano, Gian-Luigi Ferrari, Gianluca Mezzetti:
Towards Nominal Context-Free Model-Checking. CIAA 2013: 109-121 - 2012
- [j50]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. J. Comput. Secur. 20(1): 81-117 (2012) - [c88]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. CISIM 2012: 1-29 - [c87]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Types for Coordinating Secure Behavioural Variations. COORDINATION 2012: 261-276 - [c86]Pierpaolo Degano, Gian-Luigi Ferrari, Gianluca Mezzetti:
Nominal Automata for Resource Usage Control. CIAA 2012: 125-137 - [c85]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Typing Context-Dependent Behavioural Variation. PLACES 2012: 28-33 - [p4]Pierpaolo Degano, Andrea Bracciali:
Process Calculi, Systems Biology and Artificial Chemistry. Handbook of Natural Computing 2012: 1863-1896 - [e12]Pierpaolo Degano, Joshua D. Guttman:
Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Lecture Notes in Computer Science 7215, Springer 2012, ISBN 978-3-642-28640-7 [contents] - 2011
- [j49]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Secure service orchestration in open networks. J. Syst. Archit. 57(3): 231-239 (2011) - [j48]Pierpaolo Degano:
Preface. Theor. Comput. Sci. 412(21): 2094 (2011) - [c84]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy: On the Trade-Off between Utility and Information Leakage. Formal Aspects in Security and Trust 2011: 39-54 - [c83]Pierpaolo Degano, Gian-Luigi Ferrari, Gianluca Mezzetti:
On Quantitative Security Policies. PaCT 2011: 23-39 - [p3]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Call-by-Contract for Service Discovery, Orchestration and Recovery. Results of the SENSORIA Project 2011: 232-261 - [e11]Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 [contents] - [i2]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy: on the trade-off between Utility and Information Leakage. CoRR abs/1103.5188 (2011) - 2010
- [j47]Chiara Bodei, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2): 229-264 (2010) - [c82]Gabriele Costa, Pierpaolo Degano, Fabio Martinelli:
Modular Plans for Secure Service Composition. ARSPA-WITS 2010: 41-58 - [e10]Pierpaolo Degano, Joshua D. Guttman:
Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5983, Springer 2010, ISBN 978-3-642-12458-7 [contents] - [i1]Mário S. Alvim, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy versus Quantitative Information Flow. CoRR abs/1012.4250 (2010)
2000 – 2009
- 2009
- [j46]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Planning and verifying service composition. J. Comput. Secur. 17(5): 799-837 (2009) - [j45]Massimo Bartoletti, Gabriele Costa, Pierpaolo Degano, Fabio Martinelli, Roberto Zunino:
Securing Java with Local Policies. J. Object Technol. 8(4): 5-32 (2009) - [j44]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6): 23:1-23:43 (2009) - [c81]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Formal Models of the Calyx of Held. Algorithmic Bioprocesses 2009: 331-366 - [c80]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
nu-Types for Effects and Freshness Analysis. ICTAC 2009: 80-95 - [e9]Pierpaolo Degano, Roberto Gorrieri:
Computational Methods in Systems Biology, 7th International Conference, CMSB 2009, Bologna, Italy, August 31-September 1, 2009. Proceedings. Lecture Notes in Computer Science 5688, Springer 2009, ISBN 978-3-642-03844-0 [contents] - [e8]Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli:
Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5491, Springer 2009 [contents] - [e7]Pierpaolo Degano, Luca Viganò:
Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5511, Springer 2009, ISBN 978-3-642-03458-9 [contents] - 2008
- [j43]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S-4) (2008) - [j42]Pierpaolo Degano, Ralf Küsters, Luca Viganò, Steve Zdancewic:
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06). Inf. Comput. 206(2-4): 129 (2008) - [j41]Pierpaolo Degano, Luca Viganò:
Preface. Int. J. Inf. Sec. 7(1): 1 (2008) - [j40]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1): 66-82 (2008) - [j39]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Semantics-Based Design for Secure Web Services. IEEE Trans. Software Eng. 34(1): 33-49 (2008) - [c79]Han Gao, Chiara Bodei, Pierpaolo Degano:
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. AMAST 2008: 167-183 - [c78]Rocco De Nicola, Pierpaolo Degano, José Meseguer:
Ugo Montanari in a Nutshell. Concurrency, Graphs and Models 2008: 1-8 - [c77]Davide Chiarugi, Pierpaolo Degano, Jan Bert Van Klinken, Roberto Marangoni:
Cells in Silico: A Holistic Approach. SFM 2008: 366-386 - [c76]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Model Checking Usage Policies. TGC 2008: 19-35 - [c75]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Hard Life with Weak Binders. EXPRESS 2008: 49-72 - [e6]Pierpaolo Degano, Rocco De Nicola, José Meseguer:
Concurrency, Graphs and Models, Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 5065, Springer 2008, ISBN 978-3-540-68676-7 [contents] - [e5]Marco Bernardo, Pierpaolo Degano, Gianluigi Zavattaro:
Formal Methods for Computational Systems Biology, 8th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2008, Bertinoro, Italy, June 2-7, 2008, Advanced Lectures. Lecture Notes in Computer Science 5016, Springer 2008, ISBN 978-3-540-68892-1 [contents] - 2007
- [j38]Davide Chiarugi, Pierpaolo Degano, Roberto Marangoni:
A Computational Approach to the Functional Screening of Genomes. PLoS Comput. Biol. 3(9) (2007) - [c74]Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. ASIAN 2007: 150-165 - [c73]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Expressive Models for Synaptic Plasticity. CMSB 2007: 152-167 - [c72]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Secure Service Orchestration. FOSAD 2007: 24-74 - [c71]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari, Roberto Zunino:
Types and Effects for Resource Usage Analysis. FoSSaCS 2007: 32-47 - [c70]Linda Brodo, Pierpaolo Degano, Corrado Priami:
A Stochastic Semantics for BioAmbients. PaCT 2007: 22-34 - [c69]Chiara Bodei, Pierpaolo Degano, Han Gao, Linda Brodo:
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. SecCO@CONCUR 2007: 3-22 - 2006
- [j37]Pierpaolo Degano, Luca Viganò:
Preface. Theor. Comput. Sci. 367(1-2): 1 (2006) - [c68]Davide Chiarugi, M. Chinellato, Pierpaolo Degano, G. Lo Brutto, Roberto Marangoni:
Feedbacks and Oscillations in the Virtual Cell VICE. CMSB 2006: 93-107 - [c67]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Types and Effects for Secure Service Orchestration. CSFW 2006: 57-69 - [c66]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Security Issues in Service Composition. FMOODS 2006: 1-16 - [c65]Roberto Zunino, Pierpaolo Degano:
Handling exp, × (and Timestamps) in Protocol Analysis. FoSSaCS 2006: 413-427 - [c64]Pierpaolo Degano, Davide Prandi, Corrado Priami, Paola Quaglia:
Beta-binders for Biological Quantitative Experiments. QAPL 2006: 101-117 - 2005
- [j36]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication primitives for secure protocol specifications. Future Gener. Comput. Syst. 21(4): 645-653 (2005) - [j35]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Checking security policies through an enhanced Control Flow Analysis. J. Comput. Secur. 13(1): 49-85 (2005) - [j34]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static validation of security protocols. J. Comput. Secur. 13(3): 347-390 (2005) - [j33]Roberto Zunino, Pierpaolo Degano:
Weakening the perfect encryption assumption in Dolev-Yao adversaries. Theor. Comput. Sci. 340(1): 154-178 (2005) - [c63]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Enforcing Secure Service Composition. CSFW 2005: 211-223 - [c62]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
History-Based Access Control with Local Policies. FoSSaCS 2005: 316-332 - [c61]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Checking Risky Events Is Enough for Local Policies. ICTCS 2005: 97-112 - [c60]Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
On Evaluating the Performance of Security Protocols. PaCT 2005: 1-15 - [c59]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Policy framings for access control. WITS 2005: 5-11 - [c58]Pierpaolo Degano, Luca Viganò:
Preface. ARSPA@ICALP 2005: 1-2 - [e4]Pierpaolo Degano, Luca Viganò:
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005. Electronic Notes in Theoretical Computer Science 135(1), Elsevier 2005 [contents] - 2004
- [j32]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Stack inspection and secure program transformations. Int. J. Inf. Sec. 2(3-4): 187-217 (2004) - [j31]Pierpaolo Degano:
Preface. Sci. Comput. Program. 50(1-3): 1 (2004) - [j30]Michele Curti, Pierpaolo Degano, Corrado Priami, Cosima Tatiana Baldari:
Modelling biochemical pathways through enhanced pi-calculus. Theor. Comput. Sci. 325(1): 111-140 (2004) - [c57]Davide Chiarugi, Michele Curti, Pierpaolo Degano, Roberto Marangoni:
VICE: A VIrtual CEll. CMSB 2004: 207-220 - [c56]Roberto Zunino, Pierpaolo Degano:
A Note on the Perfect Encryption Assumption in a Process Calculus. FoSSaCS 2004: 514-528 - [c55]Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami:
A Quantitative Study of Two Attacks. WISP@ICATPN 2004: 65-85 - [c54]Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
Performance Evaluation of Security Protocols Specified in LySa. QAPL 2004: 167-189 - 2003
- [c53]Michele Curti, Pierpaolo Degano, Cosima Tatiana Baldari:
Causal pi-Calculus for Biochemical Modelling. CMSB 2003: 21-33 - [c52]Pierpaolo Degano, Corrado Priami:
Enhanced Operational Semantics in Systems Biology. CMSB 2003: 178-181 - [c51]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Automatic Validation of Protocol Narration. CSFW 2003: 126-140 - [c50]Pierpaolo Degano, Fabio Gadducci, Corrado Priami:
Causality and Replication in Concurrent Processes. Ershov Memorial Conference 2003: 307-318 - [c49]Linda Brodo, Pierpaolo Degano, Corrado Priami:
Reflecting Mobile Ambients into the p-Calculus. Global Computing 2003: 25-56 - [c48]Linda Brodo, Pierpaolo Degano, Stephen Gilmore, Jane Hillston, Corrado Priami:
Performance Evaluation for Global Computation. Global Computing 2003: 229-253 - [c47]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Security-Aware Program Transformations. ICTCS 2003: 355-368 - [c46]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65 - [c45]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Program Transformations under Dynamic Security Policies. MEFISTO 2003: 49-86 - [e3]Pierpaolo Degano:
Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings. Lecture Notes in Computer Science 2618, Springer 2003, ISBN 3-540-00886-1 [contents] - 2002
- [j29]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comput. Syst. 18(6): 747-756 (2002) - [j28]Pierpaolo Degano, Fabio Gadducci, Corrado Priami:
A causal semantics for CCS via rewriting logic. Theor. Comput. Sci. 275(1-2): 259-282 (2002) - [j27]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002) - 2001
- [j26]Pierpaolo Degano, Corrado Priami:
Enhanced operational semantics. ACM Comput. Surv. 33(2): 135-176 (2001) - [j25]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for the pi-Calculus with Applications to Security. Inf. Comput. 168(1): 68-92 (2001) - [j24]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Names of the -calculus agents handled locally. Theor. Comput. Sci. 253(2): 155-184 (2001) - [j23]Chiara Nottegar, Corrado Priami, Pierpaolo Degano:
Performance Evaluation of Mobile Processes via Abstract Machines. IEEE Trans. Software Eng. 27(10): 867-889 (2001) - [c44]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for Secrecy and Non-interference in Networks of Processes. PaCT 2001: 27-41 - [c43]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:
Static Analysis for Stack Inspection. ConCoord 2001: 69-80 - [c42]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. TOSCA 2001: 211-228 - [p2]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis Using Flow Logics. Current Trends in Theoretical Computer Science 2001: 525-542 - 2000
- [j22]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis using Flow Logics. Bull. EATCS 70: 112-130 (2000) - [c41]Pierpaolo Degano, Francesca Levi, Chiara Bodei:
Safe Ambients: Control Flow Analysis and Security. ASIAN 2000: 199-214 - [c40]Linda Brodo, Pierpaolo Degano, Corrado Priami:
A tool for quantitative analysis of calculus processes. ICALP Satellite Workshops 2000: 535-550
1990 – 1999
- 1999
- [j21]Pierpaolo Degano, Corrado Priami, Lone Leth Thomsen, Bent Thomsen:
Causality for Debugging Mobile Agents. Acta Informatica 36(5): 335-374 (1999) - [j20]Pierpaolo Degano, Roberto Gorrieri, Alberto Marchetti-Spaccamela, Peter Wegner:
Computing Surveys' Electronic Symposium on the Theory of Computation. ACM Comput. Surv. 31(3): 223-226 (1999) - [j19]Pierpaolo Degano, Corrado Priami:
Non-Interleaving Semantics for Mobile Processes. Theor. Comput. Sci. 216(1-2): 237-270 (1999) - [c39]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication via Localized Names. CSFW 1999: 98-110 - [c38]Chiara Nottegar, Corrado Priami, Pierpaolo Degano:
Semantic-Driven Performance Evaluation (Extended Abstract). FASE 1999: 204-218 - [c37]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis of Processes for No and Read-Up nad No Write-Down. FoSSaCS 1999: 120-134 - 1998
- [j18]Pierpaolo Degano, Corrado Priami:
LR Techniques for Handling Syntax Errors. Comput. Lang. 24(2): 73-98 (1998) - [c36]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Control Flow Analysis for the pi-calculus. CONCUR 1998: 84-98 - [c35]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation. SAS 1998: 168-183 - [c34]Georgia Carabetta, Pierpaolo Degano, Fabio Gadducci:
CCS semantics via proved transition systems and rewriting logic. WRLA 1998: 369-387 - 1997
- [e2]Pierpaolo Degano, Roberto Gorrieri, Alberto Marchetti-Spaccamela:
Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings. Lecture Notes in Computer Science 1256, Springer 1997, ISBN 3-540-63165-8 [contents] - 1996
- [j17]Pierpaolo Degano, José Meseguer, Ugo Montanari:
Axiomatizing the Algebra of Net Computations and Processes. Acta Informatica 33(7): 641-667 (1996) - [j16]Pierpaolo Degano, Corrado Priami:
Enhanced Operational Semantics. ACM Comput. Surv. 28(2): 352-354 (1996) - [c33]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Mobile Processes with a Distributed Environment. ICALP 1996: 490-501 - [c32]Flemming Nielson, Patrick Cousot, Mads Dam, Pierpaolo Degano, Pierre Jouvelot, Alan Mycroft, Bent Thomsen:
Logical and Operational Methods in the Analysis of Programs and Systems. LOMAPS 1996: 1-21 - [c31]Pierpaolo Degano, Jean-Vincent Loddo, Corrado Priami:
Mobile Processes with Local Clocks. LOMAPS 1996: 296-319 - [c30]Pierpaolo Degano, Corrado Priami, Lone Leth Thomsen, Bent Thomsen:
Analysis of Facile Programs: A Case Study. LOMAPS 1996: 345-369 - [c29]Roberta Borgia, Pierpaolo Degano, Corrado Priami, Lone Leth Thomsen, Bent Thomsen:
Understanding Mobile Agents via a Non-Interleaving Semantics for Facile. SAS 1996: 98-112 - 1995
- [j15]Pierpaolo Degano, Leonarda Raffoni:
Fairness and Priority. Fundam. Informaticae 22(3): 299-306 (1995) - [j14]Pierpaolo Degano, Roberto Gorrieri:
A Causal Operational Semantics of Action Refinement. Inf. Comput. 122(1): 97-119 (1995) - [j13]Pierpaolo Degano, Corrado Priami:
Comparison of Syntactic Error Handling in LR Parsers. Softw. Pract. Exp. 25(6): 657-679 (1995) - [c28]Pierpaolo Degano, Corrado Priami:
A Transitional Semantics of Full Prolog. GULP-PRODE 1995: 511-520 - [c27]Alan Mycroft, Pierpaolo Degano, Corrado Priami:
Complexity as a Basis for Comparing Semantic Models of Concurrency. ASIAN 1995: 141-155 - [c26]Pierpaolo Degano, Corrado Priami:
Causality for Mobile Processes. ICALP 1995: 660-671 - [c25]Alessandro Bianchi, Stefano Coluccini, Pierpaolo Degano, Corrado Priami:
An Efficient Verifier of Truly Concurrent Properties. PaCT 1995: 36-50 - 1993
- [j12]U. Bianchi, Pierpaolo Degano, Stefano Mannucci, Simone Martini, Bruno Mojana, Corrado Priami, E. Salvatori:
Generating the analytic component parts of syntax-directed editors with efficient-error recovery. J. Syst. Softw. 23(1): 65-79 (1993) - [j11]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
Universal Axioms for Bisimulations. Theor. Comput. Sci. 114(1): 63-91 (1993) - [j10]Philippe Darondeau, Pierpaolo Degano:
Refinement of Actions in Event Structures and Causal Trees. Theor. Comput. Sci. 118(1): 21-48 (1993) - [c24]Pierpaolo Degano, Roberto Gorrieri, Sebastiano Vigna:
On Relating Some Models for Concurrency. TAPSOFT 1993: 15-30 - 1992
- [c23]Pierpaolo Degano, Corrado Priami:
Proved Trees. ICALP 1992: 629-640 - [c22]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
Observation Trees. NAPAW 1992: 103-118 - [c21]Pierpaolo Degano, Roberto Gorrieri, Giuseppe Rosolini:
A Categorial View of Process Refinement. REX Workshop 1992: 138-153 - 1991
- [j9]Philippe Darondeau, Pierpaolo Degano:
About semantic action refinement. Fundam. Informaticae 14(2): 221-234 (1991) - [c20]Pierpaolo Degano, Stefano Kasangian, Sebastiano Vigna:
Applications of the Calculus of Trees to Process Description Languages. Category Theory and Computer Science 1991: 282-301 - [c19]Pierpaolo Degano, Roberto Gorrieri:
Atomic Refinement in Process Description Languages. MFCS 1991: 121-130 - 1990
- [j8]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
A Partial Ordering Semantics for CCS. Theor. Comput. Sci. 75(3): 223-262 (1990) - [c18]Philippe Darondeau, Pierpaolo Degano:
Causal Trees: Interleaving + Causality. Semantics of Systems of Concurrent Processes 1990: 239-255 - [c17]Philippe Darondeau, Pierpaolo Degano:
Event Structures, Causal Trees, and Refinements. MFCS 1990: 239-245
1980 – 1989
- 1989
- [j7]Pierpaolo Degano, Patrizia M. Gianni:
A Normal Form for Restricted Exponential Functions. RAIRO Theor. Informatics Appl. 23(2): 217-231 (1989) - [c16]Philippe Darondeau, Pierpaolo Degano:
Causal Trees. ICALP 1989: 234-248 - [c15]Pierpaolo Degano, José Meseguer, Ugo Montanari:
Axiomatizing Net Computations and Processes. LICS 1989: 175-185 - 1988
- [j6]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
A Distributed Operational Semantics for CCS Based on Condition/Event Systems. Acta Informatica 26(1/2): 59-91 (1988) - [j5]Pierpaolo Degano, Stefano Mannucci, Bruno Mojana:
Efficient Incremental LR Parsing for Syntax-Directed Editors. ACM Trans. Program. Lang. Syst. 10(3): 345-373 (1988) - [c14]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
On the Consistency of "Truly Concurrent" Operational and Denotational Semantics (Extended Abstract). LICS 1988: 133-141 - [c13]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
Partial orderings descriptions and observations of nondeterministic concurrent processes. REX Workshop 1988: 438-466 - 1987
- [j4]Pierpaolo Degano, Sergio Marchetti:
Partial ordering models for concurrency can be defined operationally. Int. J. Parallel Program. 16(6): 451-478 (1987) - [j3]Pierpaolo Degano, Ugo Montanari:
A model for distributed systems based on graph rewriting. J. ACM 34(2): 411-449 (1987) - [j2]Pierpaolo Degano, Ugo Montanari:
Concurrent Histories: A Basis for Observing Distributed Systems. J. Comput. Syst. Sci. 34(2/3): 422-461 (1987) - [c12]Pierpaolo Degano, Roberto Gorrieri, Sergio Marchetti:
An Exercise in Concurrency: a CSP Process as a Condition/ event System. European Workshop on Applications and Theory of Petri Nets 1987: 85-105 - [c11]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
Observational equivalences for concurrency models. Formal Description of Programming Concepts 1987: 105-134 - 1986
- [c10]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
CCS is an (Augmented) Contact Free C/E System. Mathematical Models for the Semantics of Parallelism 1986: 144-165 - 1985
- [j1]Pierpaolo Degano, Franco Sirovich:
An Evaluation Based Theorem Prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1): 70-79 (1985) - [c9]Pierpaolo Degano, Rocco De Nicola, Ugo Montanari:
Partial ordering derivations for CCS. FCT 1985: 520-533 - [c8]Pierpaolo Degano, Ugo Montanari:
Specification Languages for Distributed Systems. TAPSOFT, Vol.1 1985: 29-51 - 1984
- [c7]Pierpaolo Degano, Ugo Montanari:
Liveness Properties as Convergence in Metric Spaces. STOC 1984: 31-38 - [p1]Marco Bellia, Enrico Dameri, Pierpaolo Degano, Giorgio Levi, Maurizio Martelli:
A Formal Model for Lazy Implementations of a Prolog-Compatible Functional Language. Implementations of Prolog 1984: 309-326 - 1983
- [c6]Pierpaolo Degano, Stefano Diomedi:
A First Order Semantics of a Connective Suitable to Express Concurrency. Logic Programming Workshop 1983: 506-517 - [e1]Pierpaolo Degano, Erik Sandewall:
Integrated Interactive Computing Systems: Proceedings of the European Conference on Integrated Interactive Computing Systems, ECICS 82, Stresa, Italy, 1-3 September, 1982. North-Holland 1983, ISBN 0-444-86595-0 [contents] - 1982
- [c5]Roberto Barbuti, Pierpaolo Degano, Giorgio Levi:
Toward an Inductionless Technique for Proving Properties of Logic Programs. ICLP 1982: 175-181 - [c4]Marco Bellia, Enrico Dameri, Pierpaolo Degano, Giorgio Levi, Maurizio Martelli:
Applicative communicating processes in first order logic. Symposium on Programming 1982: 1-14 - 1980
- [c3]Pierpaolo Degano, A. Lomanto, Franco Sirovich:
On Finding the Optimal Access Path to Resolve a Relational Data Base Query. MFCS 1980: 219-230
1970 – 1979
- 1979
- [c2]Patrizia Asirelli, Pierpaolo Degano, Giorgio Levi, Alberto Martelli, Ugo Montanari, Giuliano Pacini, Franco Sirovich, Franco Turini:
A Flexible Environment for Program Development Based on a Symbolic Interpreter. ICSE 1979: 251-264 - [c1]Pierpaolo Degano, Franco Sirovich:
Inducing Function Properties from Computation Traces. IJCAI 1979: 208-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint