Chiara Bodei

According to our database1, Chiara Bodei authored at least 70 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Measuring security in IoT communications.
Theor. Comput. Sci., 2019

A formal approach to open multiparty interactions.
Theor. Comput. Sci., 2019

Tracking Data Trajectories in IoT.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Revealing the Trajectories of KLAIM Tuples, Statically.
Proceedings of the Models, Languages, and Tools for Concurrent and Distributed Programming, 2019

2018
From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Transcompiling Firewalls.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Firewall Management With FireWall Synthesizer.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

Language-Independent Synthesis of Firewall Policies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
A static analysis for Brane Calculi providing global occurrence counting information.
Theor. Comput. Sci., 2017

Checking global usage of resources handled with local policies.
Sci. Comput. Program., 2017

Tracing where IoT data are collected and aggregated.
Logical Methods in Computer Science, 2017

Tool Supported Analysis of IoT.
Proceedings of the Proceedings 10th Interaction and Concurrency Experience, 2017

Experimenting with a Context-Aware Language.
Proceedings of the Parallel Computing Technologies, 2017

Tracking Sensitive and Untrustworthy Data in IoT.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

2016
Context-aware security: Linguistic mechanisms and static analysis.
Journal of Computer Security, 2016

A Step Towards Checking Security in IoT.
Proceedings of the Proceedings 9th Interaction and Concurrency Experience, 2016

The Cost of Securing IoT Communications.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

Where Do Your IoT Ingredients Come From?
Proceedings of the Coordination Models and Languages, 2016

Last Mile's Resources.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Causal static analysis for Brane Calculi.
Theor. Comput. Sci., 2015

On the impact of discreteness and abstractions on modelling noise in gene regulatory networks.
Computational Biology and Chemistry, 2015

A Global Occurrence Counting Analysis for Brane Calculi.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2015

Pierpaolo Degano.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Static Evidences for Attack Reconstruction.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
A Flat Process Calculus for Nested Membrane Interactions.
Sci. Ann. Comp. Sci., 2014

Linguistic Mechanisms for Context-Aware Security.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

2013
Security in Pervasive Applications: A Survey.
European Journal of Law and Technology, 2013

An Analysis for Causal Properties of Membrane Interactions.
Electr. Notes Theor. Comput. Sci., 2013

2012
Control Flow Analysis of Generalised Boolean Networks.
Electr. Notes Theor. Comput. Sci., 2012

Open Multiparty Interaction.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2012

Formalising Security in Ubiquitous and Cloud Scenarios.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
Predicting global usages of resources endowed with local policies
Proceedings of the Proceedings 10th International Workshop on the Foundations of Coordination Languages and Software Architectures, 2011

Static Analysis Techniques for Session-Oriented Calculi.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
Detecting and preventing type flaws at static time.
Journal of Computer Security, 2010

Safer in the Clouds (Extended Abstract)
Proceedings of the Proceedings Third Interaction and Concurrency Experience: Guaranteed Interaction, 2010

A Taxonomy of Causality-Based Biological Properties
Proceedings of the Proceedings Third Workshop From Biology To Concurrency and back, 2010

2009
A Control Flow Analysis for Beta-binders with and without static compartments.
Theor. Comput. Sci., 2009

Control Flow Analysis for Brane Calculi.
Electr. Notes Theor. Comput. Sci., 2009

Choreography Rehearsal.
Proceedings of the Web Services and Formal Methods, 6th International Workshop, 2009

Static Detection of Logic Flaws in Service-Oriented Applications.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2008
A Static Analysis for Beta-Binders.
Electr. Notes Theor. Comput. Sci., 2008

On deducing causality in metabolic networks.
BMC Bioinformatics, 2008

A Formal Analysis of Complex Type Flaw Attacks on Security Protocols.
Proceedings of the Algebraic Methodology and Software Technology, 2008

2007
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags.
Electr. Notes Theor. Comput. Sci., 2007

Knitting for Fun: A Recursive Sweater.
Proceedings of the Fun with Algorithms, 4th International Conference, 2007

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
Proceedings of the Advances in Computer Science, 2007

2005
Checking security policies through an enhanced Control Flow Analysis.
Journal of Computer Security, 2005

Static validation of security protocols.
Journal of Computer Security, 2005

Authentication primitives for secure protocol specifications.
Future Generation Comp. Syst., 2005

A Quantitative Study of Two Attacks.
Electr. Notes Theor. Comput. Sci., 2005

Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci., 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

2004
A Control Flow Analysis for Safe and Boxed Ambients.
Proceedings of the Programming Languages and Systems, 2004

2003
Authentication Primitives for Protocol Specifications.
Proceedings of the Parallel Computing Technologies, 2003

Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Primitives for authentication in process algebras.
Theor. Comput. Sci., 2002

Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Generation Comp. Syst., 2002

2001
Names of the -calculus agents handled locally.
Theor. Comput. Sci., 2001

Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput., 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci., 2001

Static Analysis for Secrecy and Non-interference in Networks of Processes.
Proceedings of the Parallel Computing Technologies, 2001

Security Analysis Using Flow Logics.
Proceedings of the Current Trends in Theoretical Computer Science, 2001

2000
Security Analysis using Flow Logics.
Bulletin of the EATCS, 2000

Safe Ambients: Control Flow Analysis and Security.
Proceedings of the Advances in Computing Science, 2000

1999
Static Analysis of Processes for No and Read-Up nad No Write-Down.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Authentication via Localized Names.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation.
Proceedings of the Static Analysis, 5th International Symposium, 1998

Control Flow Analysis for the pi-calculus.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

1997
True Concurrency via Abstract Interpretation.
Proceedings of the Static Analysis, 4th International Symposium, 1997

1996
Mobile Processes with a Distributed Environment.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996


  Loading...