Catuscia Palamidessi

According to our database1, Catuscia Palamidessi
  • authored at least 203 papers between 1984 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Quantifying leakage in the presence of unreliable sources of information.
J. Comput. Syst. Sci., 2017

Alonzo Church Award 2017 - Call for Nominations.
Bulletin of the EATCS, 2017

Trading Optimality for Performance in Location Privacy.
CoRR, 2017

Information Leakage Games.
CoRR, 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Preserving differential privacy under finite-precision semantics.
Theor. Comput. Sci., 2016

Compositional methods for information-hiding.
Mathematical Structures in Computer Science, 2016

On the Compositionality of Quantitative Information Flow.
CoRR, 2016

Slicing Concurrent Constraint Programs.
CoRR, 2016

Slicing Concurrent Constraint Programs.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2016

Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Up-To Techniques for Generalized Bisimulation Metrics.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

2015
Abstract interpretation of temporal concurrent constraint programs.
TPLP, 2015

Location privacy via geo-indistinguishability.
SIGLOG News, 2015

Constructing elastic distinguishability metrics for location privacy.
PoPETs, 2015

Preface to the special issue on quantitative information flow.
Mathematical Structures in Computer Science, 2015

On the information leakage of differentially-private mechanisms.
Journal of Computer Security, 2015

Constructing elastic distinguishability metrics for location privacy.
CoRR, 2015

Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Location Privacy via Geo-Indistinguishability.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

Geo-indistinguishability: A Principled Approach to Location Privacy.
Proceedings of the Distributed Computing and Internet Technology, 2015

A Declarative View of Signaling Pathways.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
CoRR, 2014

Compositionality Results for Quantitative Information Flow.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

A Predictive Differentially-Private Mechanism for Mobility Traces.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Generalized Bisimulation Metrics.
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014

Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms.
Proceedings of the Horizons of the Mind. A Tribute to Prakash Panangaden, 2014

2013
Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculi.
CoRR, 2013

Preserving differential privacy under finite-precision semantics.
Proceedings of the Proceedings 11th International Workshop on Quantitative Aspects of Programming Languages and Systems, 2013

Abstract Interpretation of Temporal Concurrent Constraint Programs.
CoRR, 2013

A Predictive Differentially-Private Mechanism for Location Privacy.
CoRR, 2013

Quantitative Approaches to Information Protection.
Proceedings of the Logic, Language, Information, and Computation, 2013

A Differentially Private Mechanism of Optimal Utility for a Region of Priors.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Broadening the Scope of Differential Privacy Using Metrics.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Geo-indistinguishability: differential privacy for location-based systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Epistemic Strategies and Games on Concurrent Processes.
ACM Trans. Comput. Log., 2012

Preface.
Theor. Comput. Sci., 2012

Quantitative information flow in interactive systems.
Journal of Computer Security, 2012

Quantitative Security Analysis (Dagstuhl Seminar 12481).
Dagstuhl Reports, 2012

Geo-Indistinguishability: Differential Privacy for Location-Based Systems
CoRR, 2012

Hide and New in the Pi-Calculus
Proceedings of the Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, 2012

Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems
Proceedings of the Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012

A non-local method for robustness analysis of floating point programs
Proceedings of the Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012

Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Spatial and Epistemic Modalities in Constraint-Based Process Calculi.
Proceedings of the CONCUR 2012 - Concurrency Theory - 23rd International Conference, 2012

2011
Information hiding in probabilistic concurrent systems.
Theor. Comput. Sci., 2011

On the relation between Differential Privacy and Quantitative Information Flow
CoRR, 2011

Differential Privacy: on the trade-off between Utility and Information Leakage
CoRR, 2011

Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

On the Relation between Differential Privacy and Quantitative Information Flow.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Deriving Labels and Bisimilarity for Concurrent Constraint Programming.
Proceedings of the Foundations of Software Science and Computational Structures, 2011

Quantitative Information Flow and Applications to Differential Privacy.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Preface.
Journal of Computer Security, 2010

Making random choices invisible to the scheduler.
Inf. Comput., 2010

Differential Privacy versus Quantitative Information Flow
CoRR, 2010

Computing the Leakage of Information-Hiding Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Reconciling Belief and Vulnerability in Information Flow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Information Hiding in Probabilistic Concurrent Systems.
Proceedings of the QEST 2010, 2010

Compositionality of Secure Information Flow.
Proceedings of the Mathematics of Program Construction, 10th International Conference, 2010

Probabilistic Information Flow.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

Safe Equivalences for Security Properties.
Proceedings of the Theoretical Computer Science, 2010

Entropy and Attack Models in Information Flow - (Invited Talk).
Proceedings of the Theoretical Computer Science, 2010

Interactive Information Flow - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Information Flow in Interactive Systems.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010

Compositional modelling of signalling pathways in timed concurrent constraint programming.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010

Concurrent and Reactive Constraint Programming.
Proceedings of the A 25-Year Perspective on Logic Programming: Achievements of the Italian Association for Logic Programming, 2010

2009
Model Checking Probabilistic and Stochastic Extensions of the pi-Calculus.
IEEE Trans. Software Eng., 2009

Foreword.
Theor. Comput. Sci., 2009

Probabilistic and nondeterministic aspects of anonymity.
Theor. Comput. Sci., 2009

A quantitative doxastic logic for probabilistic processes and applications to information-hiding.
Journal of Applied Non-Classical Logics, 2009

Quantitative Notions of Leakage for One-try Attacks.
Electr. Notes Theor. Comput. Sci., 2009

Preface.
Electr. Notes Theor. Comput. Sci., 2009

Explicit fairness in testing semantics
Logical Methods in Computer Science, 2009

A framework for abstract interpretation of timed concurrent constraint programs.
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009

Probable Innocence in the Presence of Independent Knowledge.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

2008
On the Bayes risk in information-hiding protocols.
Journal of Computer Security, 2008

Anonymity protocols as noisy channels.
Inf. Comput., 2008

Preface.
Electr. Notes Theor. Comput. Sci., 2008

Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

Compositional Methods for Information-Hiding.
Proceedings of the Foundations of Software Science and Computational Structures, 2008

On the Asynchronous Nature of the Asynchronous pi-Calculus.
Proceedings of the Concurrency, 2008

2007
Tutorial on separation results in process calculi via leader election problems.
Theor. Comput. Sci., 2007

Preface.
Theor. Comput. Sci., 2007

Axiomatizations for probabilistic finite-state behaviors.
Theor. Comput. Sci., 2007

A framework for analyzing probabilistic protocols and its application to the Partial Secrets Exchange.
Theor. Comput. Sci., 2007

Separation of synchronous and asynchronous communication via testing.
Theor. Comput. Sci., 2007

Preface.
Electr. Notes Theor. Comput. Sci., 2007

Weak Probabilistic Anonymity.
Electr. Notes Theor. Comput. Sci., 2007

Fair Pi.
Electr. Notes Theor. Comput. Sci., 2007

Making Random Choices Invisible to the Scheduler
CoRR, 2007

Formal Approaches to Information-Hiding (Tutorial).
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Symbolic Bisimulations for Probabilistic Systems.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

Model checking the probabilistic pi-calculus.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

Universal Timed Concurrent Constraint Programming.
Proceedings of the Logic Programming, 23rd International Conference, 2007

Declarative Diagnosis of Temporal Concurrent Constraint Programs.
Proceedings of the Logic Programming, 23rd International Conference, 2007

Probability of Error in Information-Hiding Protocols.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Making Random Choices Invisible to the Scheduler.
Proceedings of the CONCUR 2007 - Concurrency Theory, 18th International Conference, 2007

A Probabilistic Applied Pi-Calculus.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
Probable innocence revisited.
Theor. Comput. Sci., 2006

A Congruence Format for Name-passing Calculi.
Electr. Notes Theor. Comput. Sci., 2006

Expressiveness of Probabilistic pi.
Electr. Notes Theor. Comput. Sci., 2006

Anonymity in Probabilistic and Nondeterministic Systems.
Electr. Notes Theor. Comput. Sci., 2006

Probabilistic and Nondeterministic Aspects of Anonymity.
Electr. Notes Theor. Comput. Sci., 2006

Metrics for Action-labelled Quantitative Transition Systems.
Electr. Notes Theor. Comput. Sci., 2006

Separation of Synchronous and Asynchronous Communication Via Testing.
Electr. Notes Theor. Comput. Sci., 2006

Languages for Concurrency.
Bulletin of the EATCS, 2006

Anonymity Protocols as Noisy Channels.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

On the Expressiveness of Linearity vs Persistence in the Asychronous Pi-Calculus.
Proceedings of the 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 2006

A Declarative Framework for Security: Secure Concurrent Constraint Programming.
Proceedings of the Logic Programming, 22nd International Conference, 2006

On Recursion, Replication and Scope Mechanisms in Process Calculi.
Proceedings of the Formal Methods for Components and Objects, 5th International Symposium, 2006

2005
A randomized encoding of the Pi-calculus with mixed choice.
Theor. Comput. Sci., 2005

Recursion vs Replication in Process Calculi: Expressiveness.
Bulletin of the EATCS, 2005

A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange.
Proceedings of the Trustworthy Global Computing, International Symposium, 2005

Probable Innocence Revisited.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Axiomatizations for Probabilistic Finite-State Behaviors.
Proceedings of the Foundations of Software Science and Computational Structures, 2005

Separation Results Via Leader Election Problems.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

Probabilistic Anonymity.
Proceedings of the Foundations of Global Computing, 20.-25. February 2005, 2005

Probabilistic Anonymity.
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005

Compositional Reasoning for Probabilistic Finite-State Behaviors.
Proceedings of the Processes, 2005

2003
Encoding transition systems in sequent calculus.
Theor. Comput. Sci., 2003

Comparing The Expressive Power Of The Synchronous And Asynchronous Pi-Calculi.
Mathematical Structures in Computer Science, 2003

2002
Temporal Concurrent Constraint Programming: Denotation, Logic and Applications.
Nord. J. Comput., 2002

On the Expressive Power of Temporal Concurrent Constraint Programming Languages (invited talk).
Electr. Notes Theor. Comput. Sci., 2002

Mobile calculi for distributed programming.
Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, 2002

On the expressive power of temporal concurrent constraint programming languages.
Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, 2002

A Randomized Solution to the Distributed Resource Allocation Problem.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

A Randomized Distributed Encoding of the Pi-Calculus with Mixed Choice.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

2001
Foreword.
Theor. Comput. Sci., 2001

On the generalized dining philosophers problem
CoRR, 2001

Probabilistic asynchronous pi-calculus
CoRR, 2001

On the generalized dining philosophers problem.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

A Temporal Concurrent Constraint Programming Calculus.
Proceedings of the Principles and Practice of Constraint Programming, 2001

2000
Preface.
Inf. Comput., 2000

Probabilistic Asynchronous pi-Calculus.
Proceedings of the Foundations of Software Science and Computation Structures, 2000

Concurrent Constraint Programming with Process Mobility.
Proceedings of the Computational Logic, 2000

1999
Editorial: Selected Papers from the Joint International Symposium PLILP/ALP'98
Journal of Functional and Logic Programming, 1999

Foundational Aspects of Syntax.
ACM Comput. Surv., 1999

The Replacement Operation for CCP Programs.
Proceedings of the Logic Programming Synthesis and Transformation, 1999

Expressiveness and Distributed Implementation of Conciurrent Calculi with Link Mobility.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

The Replacement Operation for CCP Programs.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
Preface.
Electr. Notes Theor. Comput. Sci., 1998

Comparing the expressive power of the Synchronous and the Asynchronous pi-calculus
CoRR, 1998

1997
Complementation in Abstract Interpretation.
ACM Trans. Program. Lang. Syst., 1997

Proving Concurrent Constraint Programs Correct.
ACM Trans. Program. Lang. Syst., 1997

Confluence in Concurrent Constraint Programming.
Theor. Comput. Sci., 1997

An Algebraic Perspective of Constraint Logic Programming.
J. Log. Comput., 1997

Constraint Logic Programming with Dynamic Scheduling: A Semantics Based on Closure Operators.
Inf. Comput., 1997

Foreword.
Electr. Notes Theor. Comput. Sci., 1997

Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculus.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

Constraint programming for concurrent and distributed computing.
Proceedings of the JFPLC'97, 1997

Partial Order and SOS Semantics for Linear Constraint Programs.
Proceedings of the Coordination Languages and Models, Second International Conference, 1997

1996
Encoding Transition Systems in Sequent Calculus.
Electr. Notes Theor. Comput. Sci., 1996

Proving Correctness of Constraint Logic Programs with Dynamic Scheduling.
Proceedings of the Static Analysis, Third International Symposium, 1996

Linear Constraint Systems as High-Level Nets.
Proceedings of the CONCUR '96, 1996

1995
Negation as Instantiation
Inf. Comput., August, 1995

Nondeterminism and Infinite Computations in Constraint Programming.
Theor. Comput. Sci., 1995

Complementation in Abstract Interpretation
Proceedings of the Static Analysis, 1995

Confluence in Concurrent Constraint Programming.
Proceedings of the Algebraic Methodology and Software Technology, 1995

1994
Embedding as a Tool for Language Comparison
Inf. Comput., January, 1994

A Declarative Approach for First-Order Built-in's of Prolog.
Appl. Algebra Eng. Commun. Comput., 1994

Proving Concurrent Constraint Programs Correct.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Concurrent Constraint Programming.
Proceedings of the Programming Language Implementation and Logic Programming, 1994

Denotational semantics for Concurrent Constraint Programs analyses.
Proceedings of the ICLP 1994 Workshop W2: Verification and Analysis of (Concurrent) Logic Languages, 1994

Proving correctness of Concurrent Constraint Programs.
Proceedings of the ICLP 1994 Workshop W2: Verification and Analysis of (Concurrent) Logic Languages, 1994

A Logical Denotational Semantics for Constraint Logic Programming.
Proceedings of the Programming Languages and Systems, 1994

Concurrent Constraint Programming.
Proceedings of the Algebraic and Logic Programming, 4th International Conference, 1994

Fixpoint Semantics of L lambda.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

Confluence and Concurrent Constraint Programming.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
A Model-Theoretic Reconstruction of the Operational Semantics of Logic Programs
Inf. Comput., March, 1993

Fixpoint Semantics of L-lambda.
Proceedings of the Logic Programming, 1993

Non-monotonic Concurrent Constraint Programming.
Proceedings of the Logic Programming, 1993

Compositional Analysis for Concurrent Constraint Programming
Proceedings of the Eighth Annual Symposium on Logic in Computer Science (LICS '93), 1993

1992
From Failure to Success: Comparing a Denotational and a Declarative Semantics for Horn Clause Logic.
Theor. Comput. Sci., 1992

Structural operational semantics for AKL.
Future Generation Comp. Syst., 1992

On Blocks: Locality and Asynchronous Communication (Extended Abstract).
Proceedings of the Sematics: Foundations and Applications, 1992

Asynchronous Communication in Process Algebra
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

A Process Algebra of Concurrent Constraint Programming.
Proceedings of the Logic Programming, 1992

On the Semantics of Concurrent Constraint Programming.
Proceedings of the ALPUK92, Proceedings of the 4th UK Conference on Logic Programming, London, 30 March, 1992

A Theory of First-Order Built-in's of Prolog.
Proceedings of the Algebraic and Logic Programming, 1992

1991
Semantic Models for Concurrent Logic Languages.
Theor. Comput. Sci., 1991

Comments on "Logic-Programming with Equations".
J. Log. Program., 1991

Kernel-LEAF: A Logic plus Functional Language.
J. Comput. Syst. Sci., 1991

A Fully Abstract Model for Concurrent Constraint Programming.
Proceedings of the TAPSOFT'91: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1991

Structural Operational Semantics for Kernel Andorra Prolog.
Proceedings of the PARLE '91: Parallel Architectures and Languages Europe, 1991

Negation as Instantitation: A New Rule for the Treatment of Negation in Logic Programming.
Proceedings of the Logic Programming, 1991

Embedding as a Tool for Language Comparison: On the CSP Hierarchy.
Proceedings of the CONCUR '91, 1991

The Failure of Failures in a Paradigm for Asynchronous Communication.
Proceedings of the CONCUR '91, 1991

1990
Failure and Success made Symmetric.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Concurrent Logic Programming: Asynchronism and Language Comparison.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Algebraic Properties of Idempotent Substitutions.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

On the Asynchronous Nature of Communication in Concurrent Logic Languages: A Fully Abstract Model Based on Sequences.
Proceedings of the CONCUR '90, 1990

1989
Declarative Modeling of the Operational Behavior of Logic Languages.
Theor. Comput. Sci., 1989

Control Flow versus Logic: A Denotational and a Declarative Model for Guarded Horn Clauses.
Proceedings of the Mathematical Foundations of Computer Science 1989, 1989

Semantic Models for a Version of PARLOG.
Proceedings of the Logic Programming, 1989

1988
Contributions to the Semantics of Logic Perpetual Processes.
Acta Inf., 1988

A New Declarative Semantics for Logic Languages.
Proceedings of the Logic Programming, 1988

1987
A Complete Semantic Characterization of K-Leaf: A Logic Language with Partial Functions.
Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31, 1987

A Two-Level Approach to Logic plus Functional Programming Integration.
Proceedings of the PARLE, 1987

An Approach to the Declarative Semantics of Synchronization in Logic Languages.
Proceedings of the Logic Programming, 1987

1985
The Declarative Semantics of Logical Read-Only Variables.
Proceedings of the 1985 Symposium on Logic Programming, 1985

1984
A Synchronization Logic: Axiomatics and Formal Semantics of Generalized Horn Clauses
Information and Control, 1984


  Loading...