Pierpaolo Degano

According to our database1, Pierpaolo Degano
  • authored at least 169 papers between 1979 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Regular and context-free nominal traces.
Acta Inf., 2017

Specifying variability in service contracts.
Proceedings of the Eleventh International Workshop on Variability Modelling of Software-intensive Systems, 2017

2016
A Two-Component Language for Adaptation: Design, Semantics and Program Analysis.
IEEE Trans. Software Eng., 2016

Relating two automata-based models of orchestration and choreography.
J. Log. Algebr. Meth. Program., 2016

Context-aware security: Linguistic mechanisms and static analysis.
Journal of Computer Security, 2016

Event-driven Adaptation in COP.
Proceedings of the Ninth workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, 2016

Tracing where IoT data are collected and aggregated.
CoRR, 2016

A Step Towards Checking Security in IoT.
Proceedings of the Proceedings 9th Interaction and Concurrency Experience, 2016

Automata for Specifying and Orchestrating Service Contracts.
Logical Methods in Computer Science, 2016

A Semantics for Disciplined Concurrency in COP.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

Playing with Our CAT and Communication-Centric Applications.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Where Do Your IoT Ingredients Come From?
Proceedings of the Coordination Models and Languages, 2016

Last Mile's Resources.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Model checking usage policies.
Mathematical Structures in Computer Science, 2015

On the information leakage of differentially-private mechanisms.
Journal of Computer Security, 2015

A Context-Oriented Extension of F#.
Proceedings of the Proceedings 14th International Workshop on Foundations of Coordination Languages and Self-Adaptive Systems, 2015

Debits and Credits in Petri Nets and Linear Logic.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
A formal framework for secure and complying services.
The Journal of Supercomputing, 2014

From Models to Languages.
Fundam. Inform., 2014

From Orchestration to Choreography through Contract Automata.
Proceedings of the Proceedings 7th Interaction and Concurrency Experience, 2014

Automata for Analysing Service Contracts.
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014

A Two-Phase Static Analysis for Reliable Adaptation.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

Linguistic Mechanisms for Context-Aware Security.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

A Two-Component Language for COP.
Proceedings of 6th International Workshop on Context-Oriented Programming, 2014

2013
Security in Pervasive Applications: A Survey.
European Journal of Law and Technology, 2013

Preface.
Journal of Computer Security, 2013

Towards Nominal Context-Free Model-Checking.
Proceedings of the Implementation and Application of Automata, 2013

Secure and Unfailing Services.
Proceedings of the Parallel Computing Technologies - 12th International Conference, 2013

2012
Process Calculi, Systems Biology and Artificial Chemistry.
Proceedings of the Handbook of Natural Computing, 2012

Modular plans for secure service composition.
Journal of Computer Security, 2012

Typing Context-Dependent Behavioural Variation
Proceedings of the Proceedings Fifth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, 2012

Nominal Automata for Resource Usage Control.
Proceedings of the Implementation and Application of Automata, 2012

Types for Coordinating Secure Behavioural Variations.
Proceedings of the Coordination Models and Languages - 14th International Conference, 2012

Formalising Security in Ubiquitous and Cloud Scenarios.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
Preface.
Theor. Comput. Sci., 2011

Secure service orchestration in open networks.
Journal of Systems Architecture - Embedded Systems Design, 2011

Differential Privacy: on the trade-off between Utility and Information Leakage
CoRR, 2011

On Quantitative Security Policies.
Proceedings of the Parallel Computing Technologies - 11th International Conference, 2011

Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Call-by-Contract for Service Discovery, Orchestration and Recovery.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
Detecting and preventing type flaws at static time.
Journal of Computer Security, 2010

Differential Privacy versus Quantitative Information Flow
CoRR, 2010

Modular Plans for Secure Service Composition.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

2009
Local policies for resource usage analysis.
ACM Trans. Program. Lang. Syst., 2009

Securing Java with Local Policies.
Journal of Object Technology, 2009

Planning and verifying service composition.
Journal of Computer Security, 2009

Hard Life with Weak Binders.
Electr. Notes Theor. Comput. Sci., 2009

nu-Types for Effects and Freshness Analysis.
Proceedings of the Theoretical Aspects of Computing, 2009

2008
Semantics-Based Design for Secure Web Services.
IEEE Trans. Software Eng., 2008

Synapses as stochastic concurrent systems.
Theor. Comput. Sci., 2008

Preface.
Int. J. Inf. Sec., 2008

Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput., 2008

Stochastic models for the in silico simulation of synaptic processes.
BMC Bioinformatics, 2008

Model Checking Usage Policies.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

Cells in Silico: A Holistic Approach.
Proceedings of the Formal Methods for Computational Systems Biology, 2008

Ugo Montanari in a Nutshell.
Proceedings of the Concurrency, 2008

A Formal Analysis of Complex Type Flaw Attacks on Security Protocols.
Proceedings of the Algebraic Methodology and Software Technology, 2008

2007
A Computational Approach to the Functional Screening of Genomes.
PLoS Computational Biology, 2007

Detecting and Preventing Type flaws: a Control Flow Analysis with Tags.
Electr. Notes Theor. Comput. Sci., 2007

A Stochastic Semantics for BioAmbients.
Proceedings of the Parallel Computing Technologies, 2007

Types and Effects for Resource Usage Analysis.
Proceedings of the Foundations of Software Science and Computational Structures, 2007

Secure Service Orchestration.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Expressive Models for Synaptic Plasticity.
Proceedings of the Computational Methods in Systems Biology, International Conference, 2007

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
Proceedings of the Advances in Computer Science, 2007

2006
Preface.
Theor. Comput. Sci., 2006

Beta-binders for Biological Quantitative Experiments.
Electr. Notes Theor. Comput. Sci., 2006

Handling exp, × (and Timestamps) in Protocol Analysis.
Proceedings of the Foundations of Software Science and Computation Structures, 2006

Security Issues in Service Composition.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2006

Types and Effects for Secure Service Orchestration.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Feedbacks and Oscillations in the Virtual Cell VICE.
Proceedings of the Computational Methods in Systems Biology, International Conference, 2006

2005
Weakening the perfect encryption assumption in Dolev-Yao adversaries.
Theor. Comput. Sci., 2005

Checking security policies through an enhanced Control Flow Analysis.
Journal of Computer Security, 2005

Static validation of security protocols.
Journal of Computer Security, 2005

Authentication primitives for secure protocol specifications.
Future Generation Comp. Syst., 2005

Preface.
Electr. Notes Theor. Comput. Sci., 2005

A Quantitative Study of Two Attacks.
Electr. Notes Theor. Comput. Sci., 2005

Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci., 2005

Policy framings for access control.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

Checking Risky Events Is Enough for Local Policies.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

History-Based Access Control with Local Policies.
Proceedings of the Foundations of Software Science and Computational Structures, 2005

Enforcing Secure Service Composition.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Modelling biochemical pathways through enhanced pi-calculus.
Theor. Comput. Sci., 2004

Preface.
Sci. Comput. Program., 2004

Stack inspection and secure program transformations.
Int. J. Inf. Sec., 2004

Program Transformations under Dynamic Security Policies.
Electr. Notes Theor. Comput. Sci., 2004

A Note on the Perfect Encryption Assumption in a Process Calculus.
Proceedings of the Foundations of Software Science and Computation Structures, 2004

VICE: A VIrtual CEll.
Proceedings of the Computational Methods in Systems Biology, International Conference, 2004

2003
Authentication Primitives for Protocol Specifications.
Proceedings of the Parallel Computing Technologies, 2003

Security-Aware Program Transformations.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Reflecting Mobile Ambients into the p-Calculus.
Proceedings of the Global Computing. Programming Environments, 2003

Performance Evaluation for Global Computation.
Proceedings of the Global Computing. Programming Environments, 2003

Causality and Replication in Concurrent Processes.
Proceedings of the Perspectives of Systems Informatics, 2003

Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Enhanced Operational Semantics in Systems Biology.
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003

Causal pi-Calculus for Biochemical Modelling.
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003

2002
A causal semantics for CCS via rewriting logic.
Theor. Comput. Sci., 2002

Primitives for authentication in process algebras.
Theor. Comput. Sci., 2002

Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Generation Comp. Syst., 2002

2001
Performance Evaluation of Mobile Processes via Abstract Machines.
IEEE Trans. Software Eng., 2001

Names of the -calculus agents handled locally.
Theor. Comput. Sci., 2001

Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput., 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci., 2001

Static Analysis for Stack Inspection.
Electr. Notes Theor. Comput. Sci., 2001

Enhanced operational semantics.
ACM Comput. Surv., 2001

Static Analysis for Secrecy and Non-interference in Networks of Processes.
Proceedings of the Parallel Computing Technologies, 2001

Security Analysis Using Flow Logics.
Current Trends in Theoretical Computer Science, 2001

2000
Security Analysis using Flow Logics.
Bulletin of the EATCS, 2000

A tool for quantitative analysis of calculus processes.
ICALP Satellite Workshops, 2000

Safe Ambients: Control Flow Analysis and Security.
Proceedings of the Advances in Computing Science, 2000

1999
Non-Interleaving Semantics for Mobile Processes.
Theor. Comput. Sci., 1999

Computing Surveys' Electronic Symposium on the Theory of Computation.
ACM Comput. Surv., 1999

Causality for Debugging Mobile Agents.
Acta Inf., 1999

Static Analysis of Processes for No and Read-Up nad No Write-Down.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Semantic-Driven Performance Evaluation (Extended Abstract).
Proceedings of the Fundamental Approaches to Software Engineering, 1999

Authentication via Localized Names.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
CCS semantics via proved transition systems and rewriting logic.
Electr. Notes Theor. Comput. Sci., 1998

LR Techniques for Handling Syntax Errors.
Comput. Lang., 1998

Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation.
Proceedings of the Static Analysis, 5th International Symposium, 1998

Control Flow Analysis for the pi-calculus.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

1996
Enhanced Operational Semantics.
ACM Comput. Surv., 1996

Axiomatizing the Algebra of Net Computations and Processes.
Acta Inf., 1996

Understanding Mobile Agents via a Non-Interleaving Semantics for Facile.
Proceedings of the Static Analysis, Third International Symposium, 1996

Logical and Operational Methods in the Analysis of Programs and Systems.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Analysis of Facile Programs: A Case Study.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Mobile Processes with Local Clocks.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Mobile Processes with a Distributed Environment.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996

1995
A Causal Operational Semantics of Action Refinement
Inf. Comput., October, 1995

Comparison of Syntactic Error Handling in LR Parsers.
Softw., Pract. Exper., 1995

Fairness and Priority.
Fundam. Inform., 1995

An Efficient Verifier of Truly Concurrent Properties.
Proceedings of the Parallel Computing Technologies, 1995

Causality for Mobile Processes.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

Complexity as a Basis for Comparing Semantic Models of Concurrency.
Proceedings of the Algorithms, 1995

A Transitional Semantics of Full Prolog.
Proceedings of the 1995 Joint Conference on Declarative Programming, 1995

1993
Refinement of Actions in Event Structures and Causal Trees.
Theor. Comput. Sci., 1993

Universal Axioms for Bisimulations.
Theor. Comput. Sci., 1993

Generating the analytic component parts of syntax-directed editors with efficient-error recovery.
Journal of Systems and Software, 1993

On Relating Some Models for Concurrency.
Proceedings of the TAPSOFT'93: Theory and Practice of Software Development, 1993

1992
A Categorial View of Process Refinement.
Proceedings of the Sematics: Foundations and Applications, 1992

Observation Trees.
Proceedings of the NAPAW 92, 1992

Proved Trees.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

1991
About semantic action refinement.
Fundam. Inform., 1991

Atomic Refinement in Process Description Languages.
Proceedings of the Mathematical Foundations of Computer Science 1991, 1991

Applications of the Calculus of Trees to Process Description Languages.
Proceedings of the Category Theory and Computer Science, 1991

1990
A Partial Ordering Semantics for CCS.
Theor. Comput. Sci., 1990

Event Structures, Causal Trees, and Refinements.
Proceedings of the Mathematical Foundations of Computer Science 1990, 1990

Causal Trees: Interleaving + Causality.
Proceedings of the Semantics of Systems of Concurrent Processes, 1990

1989
A Normal Form for Restricted Exponential Functions.
ITA, 1989

Axiomatizing Net Computations and Processes
Proceedings of the Fourth Annual Symposium on Logic in Computer Science (LICS '89), 1989

Causal Trees.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989

1988
Efficient Incremental LR Parsing for Syntax-Directed Editors.
ACM Trans. Program. Lang. Syst., 1988

A Distributed Operational Semantics for CCS Based on Condition/Event Systems.
Acta Inf., 1988

Partial orderings descriptions and observations of nondeterministic concurrent processes.
Proceedings of the Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency, School/Workshop, Noordwijkerhout, The Netherlands, May 30, 1988

On the Consistency of "Truly Concurrent" Operational and Denotational Semantics (Extended Abstract)
Proceedings of the Third Annual Symposium on Logic in Computer Science (LICS '88), 1988

1987
Concurrent Histories: A Basis for Observing Distributed Systems.
J. Comput. Syst. Sci., 1987

A model for distributed systems based on graph rewriting.
J. ACM, 1987

Partial ordering models for concurrency can be defined operationally.
International Journal of Parallel Programming, 1987

An Exercise in Concurrency: a CSP Process as a Condition/ event System.
Proceedings of the Advances in Petri Nets 1988, 1987

1986
CCS is an (Augmented) Contact Free C/E System.
Proceedings of the Mathematical Models for the Semantics of Parallelism, Advanced School, Rome, Italy, September 24, 1986

1985
An Evaluation Based Theorem Prover.
IEEE Trans. Pattern Anal. Mach. Intell., 1985

Specification Languages for Distributed Systems.
Proceedings of the Mathematical Foundations of Software Development, 1985

Partial ordering derivations for CCS.
Proceedings of the Fundamentals of Computation Theory, 1985

1984
Liveness Properties as Convergence in Metric Spaces
Proceedings of the 16th Annual ACM Symposium on Theory of Computing, April 30, 1984

A Formal Model for Lazy Implementations of a Prolog-Compatible Functional Language.
Implementations of Prolog, 1984

1982
Applicative communicating processes in first order logic.
Proceedings of the International Symposium on Programming, 1982

Toward an Inductionless Technique for Proving Properties of Logic Programs.
Proceedings of the First International Logic Programming Conference, 1982

1980
On Finding the Optimal Access Path to Resolve a Relational Data Base Query.
Proceedings of the Mathematical Foundations of Computer Science 1980 (MFCS'80), 1980

1979
Inducing Function Properties from Computation Traces.
Proceedings of the Sixth International Joint Conference on Artificial Intelligence, 1979

A Flexible Environment for Program Development Based on a Symbolic Interpreter.
Proceedings of the 4th International Conference on Software Engineering, 1979


  Loading...