Chiara Bodei

Orcid: 0000-0002-0586-9333

Affiliations:
  • University of Pisa, Italy


According to our database1, Chiara Bodei authored at least 82 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

From Hardware-Functional to Software-Defined Vehicles and their Security Issues.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

Vehicle Data Collection: A Privacy Policy Analysis and Comparison.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2021
Modelling and analysing IoT systems.
J. Parallel Distributed Comput., 2021

FWS: Analyzing, maintaining and transcompiling firewalls.
J. Comput. Secur., 2021

2020
Natural Projection as Partial Model Checking.
J. Autom. Reason., 2020

The link-calculus for open multiparty interactions.
Inf. Comput., 2020

Security Metrics at Work on the Things in IoT Systems.
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020

2019
Programming in a context-aware language.
J. Supercomput., 2019

Measuring security in IoT communications.
Theor. Comput. Sci., 2019

A formal approach to open multiparty interactions.
Theor. Comput. Sci., 2019

Analysing the Provenance of IoT Data.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Tracking Data Trajectories in IoT.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Revealing the Trajectories of KLAIM Tuples, Statically.
Proceedings of the Models, Languages, and Tools for Concurrent and Distributed Programming, 2019

2018
From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Transcompiling Firewalls.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Firewall Management With FireWall Synthesizer.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

Language-Independent Synthesis of Firewall Policies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
A static analysis for Brane Calculi providing global occurrence counting information.
Theor. Comput. Sci., 2017

Checking global usage of resources handled with local policies.
Sci. Comput. Program., 2017

Tracing where IoT data are collected and aggregated.
Log. Methods Comput. Sci., 2017

Tool Supported Analysis of IoT.
Proceedings of the Proceedings 10th Interaction and Concurrency Experience, 2017

Experimenting with a Context-Aware Language.
Proceedings of the Parallel Computing Technologies, 2017

Tracking Sensitive and Untrustworthy Data in IoT.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

2016
Context-aware security: Linguistic mechanisms and static analysis.
J. Comput. Secur., 2016

A Step Towards Checking Security in IoT.
Proceedings of the Proceedings 9th Interaction and Concurrency Experience, 2016

The Cost of Securing IoT Communications.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

Where Do Your IoT Ingredients Come From?
Proceedings of the Coordination Models and Languages, 2016

Last Mile's Resources.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Causal static analysis for Brane Calculi.
Theor. Comput. Sci., 2015

On the impact of discreteness and abstractions on modelling noise in gene regulatory networks.
Comput. Biol. Chem., 2015

A Global Occurrence Counting Analysis for Brane Calculi.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2015

Pierpaolo Degano.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Static Evidences for Attack Reconstruction.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
A Flat Process Calculus for Nested Membrane Interactions.
Sci. Ann. Comput. Sci., 2014

Linguistic Mechanisms for Context-Aware Security.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

2013
Security in Pervasive Applications: A Survey.
Eur. J. Law Technol., 2013

An Analysis for Causal Properties of Membrane Interactions.
Proceedings of the fourth International Workshop on Interactions between Computer Science and Biology, 2013

2012
Open Multiparty Interaction.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2012

Formalising Security in Ubiquitous and Cloud Scenarios.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
Control Flow Analysis of Generalised Boolean Networks.
Proceedings of the 2nd International Workshop on Static Analysis and Systems Biology, 2011

Brane Calculi Systems: A Static Preview of their Possible Behaviour
CoRR, 2011

Predicting global usages of resources endowed with local policies
Proceedings of the Proceedings 10th International Workshop on the Foundations of Coordination Languages and Software Architectures, 2011

Static Analysis Techniques for Session-Oriented Calculi.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
Detecting and preventing type flaws at static time.
J. Comput. Secur., 2010

Safer in the Clouds (Extended Abstract)
Proceedings of the Proceedings Third Interaction and Concurrency Experience: Guaranteed Interaction, 2010

A Taxonomy of Causality-Based Biological Properties
Proceedings of the Proceedings Third Workshop From Biology To Concurrency and back, 2010

2009
A Control Flow Analysis for Beta-binders with and without static compartments.
Theor. Comput. Sci., 2009

Choreography Rehearsal.
Proceedings of the Web Services and Formal Methods, 6th International Workshop, 2009

Static Detection of Logic Flaws in Service-Oriented Applications.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2008
Control Flow Analysis for Brane Calculi.
Proceedings of the Second International Meeting on Membrane Computing and Biologically Inspired Process Calculi, 2008

On deducing causality in metabolic networks.
BMC Bioinform., 2008

A Formal Analysis of Complex Type Flaw Attacks on Security Protocols.
Proceedings of the Algebraic Methodology and Software Technology, 2008

2007
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags.
Proceedings of the Fifth Workshop on Security Issues in Concurrency, 2007

A Static Analysis for Beta-Binders.
Proceedings of the First Workshop "From Biology To Concurrency and back", 2007

Knitting for Fun: A Recursive Sweater.
Proceedings of the Fun with Algorithms, 4th International Conference, 2007

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
Proceedings of the Advances in Computer Science, 2007

2005
Checking security policies through an enhanced Control Flow Analysis.
J. Comput. Secur., 2005

Static validation of security protocols.
J. Comput. Secur., 2005

Authentication primitives for secure protocol specifications.
Future Gener. Comput. Syst., 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

2004
A Quantitative Study of Two Attacks.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004

Performance Evaluation of Security Protocols Specified in LySa.
Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, 2004

A Control Flow Analysis for Safe and Boxed Ambients.
Proceedings of the Programming Languages and Systems, 2004

2003
Authentication Primitives for Protocol Specifications.
Proceedings of the Parallel Computing Technologies, 2003

Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Primitives for authentication in process algebras.
Theor. Comput. Sci., 2002

Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Gener. Comput. Syst., 2002

2001
Names of the -calculus agents handled locally.
Theor. Comput. Sci., 2001

Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput., 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001

Static Analysis for Secrecy and Non-interference in Networks of Processes.
Proceedings of the Parallel Computing Technologies, 2001

Security Analysis Using Flow Logics.
Proceedings of the Current Trends in Theoretical Computer Science, 2001

2000
Security Analysis using Flow Logics.
Bull. EATCS, 2000

Safe Ambients: Control Flow Analysis and Security.
Proceedings of the Advances in Computing Science, 2000

1999
Static Analysis of Processes for No and Read-Up nad No Write-Down.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Authentication via Localized Names.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation.
Proceedings of the Static Analysis, 5th International Symposium, 1998

Control Flow Analysis for the pi-calculus.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

1997
True Concurrency via Abstract Interpretation.
Proceedings of the Static Analysis, 4th International Symposium, 1997

1996
Mobile Processes with a Distributed Environment.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996


  Loading...