


default search action
Pierpaolo Degano
Person information
- affiliation: University of Pisa, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j73]Lorenzo Ceragioli
, Letterio Galletta
, Pierpaolo Degano
, David A. Basin
:
Specifying and Verifying Information Flow Control in SELinux Configurations. ACM Trans. Priv. Secur. 27(4): 31:1-31:35 (2024) - [c125]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. ECAI 2024: 1405-1412 - [i11]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. CoRR abs/2408.09516 (2024) - [i10]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
Policies for Fair Exchanges of Resources. CoRR abs/2410.21214 (2024) - 2023
- [j72]Gabriele Costa, Pierpaolo Degano
, Letterio Galletta
, Simone Soderi
:
Formally verifying security protocols built on watermarking and jamming. Comput. Secur. 128: 103133 (2023) - 2022
- [j71]Lorenzo Ceragioli
, Pierpaolo Degano, Letterio Galletta
:
Can my firewall system enforce this policy? Comput. Secur. 117: 102683 (2022) - [c124]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin
:
IFCIL: An Information Flow Configuration Language for SELinux. CSF 2022: 243-259 - [c123]Matteo Busi
, Pierpaolo Degano, Letterio Galletta
:
Towards effective preservation of robust safety properties. SAC 2022: 1674-1683 - [i9]Lorenzo Ceragioli, Letterio Galletta
, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). CoRR abs/2205.15915 (2022) - [i8]Lorenzo Ceragioli, Letterio Galletta
, Pierpaolo Degano, Luca Viganò:
Automatic Fair Exchanges. CoRR abs/2207.12326 (2022) - 2021
- [j70]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi
, Letterio Galletta
, Flaminia L. Luccio
, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [j69]Chiara Bodei
, Pierpaolo Degano
, Gian-Luigi Ferrari
, Letterio Galletta
:
Modelling and analysing IoT systems. J. Parallel Distributed Comput. 157: 233-242 (2021) - [j68]Matteo Busi
, Pierpaolo Degano, Letterio Galletta
:
Mechanical incrementalization of typing algorithms. Sci. Comput. Program. 208: 102657 (2021) - [j67]Matteo Busi
, Job Noorman, Jo Van Bulck
, Letterio Galletta
, Pierpaolo Degano, Jan Tobias Mühlberg
, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - [c122]Pierpaolo Degano
, Letterio Galletta
, Selene Gerali
:
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. Protocols, Strands, and Logic 2021: 124-138 - [c121]Davide Basile
, Maurice H. ter Beek
, Pierpaolo Degano
, Axel Legay
, Gian-Luigi Ferrari
, Stefania Gnesi
, Felicita Di Giandomenico
:
Supervisory Synthesis of Configurable Behavioural Contracts with Modalities. FORTE 2021: 177-181 - 2020
- [j66]Gabriele Costa
, Letterio Galletta
, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [j65]Davide Basile
, Maurice H. ter Beek, Pierpaolo Degano, Axel Legay, Gian-Luigi Ferrari
, Stefania Gnesi, Felicita Di Giandomenico:
Controller synthesis of service contracts with variability. Sci. Comput. Program. 187: 102344 (2020) - [c120]Chiara Bodei
, Pierpaolo Degano
, Gian-Luigi Ferrari
, Letterio Galletta
:
Security Metrics at Work on the Things in IoT Systems. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 233-255 - [c119]Matteo Busi
, Job Noorman, Jo Van Bulck
, Letterio Galletta
, Pierpaolo Degano, Jan Tobias Mühlberg
, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - [c118]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy. ITASEC 2020: 82-92 - [c117]Lorenzo Ceragioli
, Pierpaolo Degano, Letterio Galletta:
MuAC: Access Control Language for Mutual Benefits. ITASEC 2020: 119-127 - [i7]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - [i6]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy (Extended Version). CoRR abs/2003.05836 (2020)
2010 – 2019
- 2019
- [j64]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
Programming in a context-aware language. J. Supercomput. 75(12): 7750-7764 (2019) - [c116]Matteo Busi
, Pierpaolo Degano
, Letterio Galletta
:
Robust Declassification by Incremental Typing. Foundations of Security, Protocols, and Equational Reasoning 2019: 54-69 - [c115]Lorenzo Ceragioli
, Pierpaolo Degano
, Letterio Galletta
:
Checking the Expressivity of Firewall Languages. The Art of Modelling Computational Systems 2019: 86-100 - [c114]Davide Basile
, Rosario Pugliese
, Francesco Tiezzi, Pierpaolo Degano, Gian-Luigi Ferrari
:
Automata-Based Behavioural Contracts with Action Correlation. From Software Engineering to Formal Methods and Tools, and Back 2019: 131-151 - [c113]Chiara Bodei
, Pierpaolo Degano
, Gian-Luigi Ferrari
, Letterio Galletta
:
Revealing the Trajectories of KLAIM Tuples, Statically. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 437-454 - [c112]Lorenzo Ceragioli
, Pierpaolo Degano, Letterio Galletta
:
Are All Firewall Systems Equally Powerful? PLAS@CCS 2019: 1-17 - [c111]Matteo Busi
, Pierpaolo Degano
, Letterio Galletta
:
Using Standard Typing Algorithms Incrementally. NFM 2019: 106-122 - [e13]Pierpaolo Degano, Roberto Zunino:
Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019. CEUR Workshop Proceedings 2315, CEUR-WS.org 2019 [contents] - [i5]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Translation Validation for Security Properties. CoRR abs/1901.05082 (2019) - 2018
- [j63]Andrea Bernini
, Linda Brodo, Pierpaolo Degano, Moreno Falaschi
, Diana Hermith
:
Process calculi for biological processes. Nat. Comput. 17(2): 345-373 (2018) - [c110]Chiara Bodei, Pierpaolo Degano, Letterio Galletta
, Riccardo Focardi
, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c109]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c108]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi
, Letterio Galletta
, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c107]Gabriele Costa
, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta
:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - [i4]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Using Standard Typing Algorithms Incrementally. CoRR abs/1808.00225 (2018) - 2017
- [j62]Pierpaolo Degano, Gian-Luigi Ferrari
, Gianluca Mezzetti:
Regular and context-free nominal traces. Acta Informatica 54(4): 399-433 (2017) - [j61]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. Log. Methods Comput. Sci. 13(3) (2017) - [c106]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
Experimenting with a Context-Aware Language. PaCT 2017: 3-17 - [c105]Davide Basile
, Felicita Di Giandomenico, Stefania Gnesi, Pierpaolo Degano, Gian-Luigi Ferrari
:
Specifying variability in service contracts. VaMoS 2017: 20-27 - [c104]Chiara Bodei, Pierpaolo Degano, Letterio Galletta
, Emilio Tuosto:
Tool Supported Analysis of IoT. ICE@DisCoTec 2017: 37-56 - 2016
- [j60]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
:
Automata for Specifying and Orchestrating Service Contracts. Log. Methods Comput. Sci. 12(4) (2016) - [j59]Chiara Bodei, Pierpaolo Degano, Letterio Galletta
, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. J. Comput. Secur. 24(4): 427-477 (2016) - [j58]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
, Emilio Tuosto:
Relating two automata-based models of orchestration and choreography. J. Log. Algebraic Methods Program. 85(3): 425-446 (2016) - [j57]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
A Two-Component Language for Adaptation: Design, Semantics and Program Analysis. IEEE Trans. Software Eng. 42(6): 505-529 (2016) - [c103]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
Last Mile's Resources. Semantics, Logics, and Calculi 2016: 33-53 - [c102]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
Where Do Your IoT Ingredients Come From? COORDINATION 2016: 35-50 - [c101]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
, Emilio Tuosto:
Playing with Our CAT and Communication-Centric Applications. FORTE 2016: 62-73 - [c100]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
A Semantics for Disciplined Concurrency in COP. ICTCS 2016: 177-189 - [c99]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
Event-driven Adaptation in COP. PLACES 2016: 37-45 - [c98]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
A Step Towards Checking Security in IoT. ICE 2016: 128-142 - [i3]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. CoRR abs/1610.08419 (2016) - 2015
- [j56]Mário S. Alvim
, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
:
On the information leakage of differentially-private mechanisms. J. Comput. Secur. 23(4): 427-469 (2015) - [j55]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Model checking usage policies. Math. Struct. Comput. Sci. 25(3): 710-763 (2015) - [c97]Massimo Bartoletti
, Pierpaolo Degano, Paolo Di Giamberardino, Roberto Zunino
:
Debits and Credits in Petri Nets and Linear Logic. Logic, Rewriting, and Concurrency 2015: 135-159 - [c96]Andrea Canciani, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
A Context-Oriented Extension of F#. FOCLASA 2015: 18-32 - 2014
- [j54]Pierpaolo Degano, Juhani Karhumäki, Paolo Massazza:
From Models to Languages. Fundam. Informaticae 134(3-4): i (2014) - [j53]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
:
A formal framework for secure and complying services. J. Supercomput. 69(1): 43-52 (2014) - [c95]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
A Two-Component Language for COP. COP@ECOOP 2014: 6:1-6:7 - [c94]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Linguistic Mechanisms for Context-Aware Security. ICTAC 2014: 61-79 - [c93]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
:
A Two-Phase Static Analysis for Reliable Adaptation. SEFM 2014: 347-362 - [c92]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
:
Automata for Analysing Service Contracts. TGC 2014: 34-50 - [c91]Davide Basile
, Pierpaolo Degano, Gian-Luigi Ferrari
, Emilio Tuosto:
From Orchestration to Choreography through Contract Automata. ICE 2014: 67-85 - 2013
- [j52]Pierpaolo Degano, Joshua D. Guttman
:
Preface. J. Comput. Secur. 21(6): 779-780 (2013) - [j51]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Gianluca Mezzetti, Gianluigi Ferrari:
Security in Pervasive Applications: A Survey. Eur. J. Law Technol. 4(2) (2013) - [c90]Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari
:
Secure and Unfailing Services. PaCT 2013: 167-181 - [c89]Pierpaolo Degano, Gian-Luigi Ferrari
, Gianluca Mezzetti:
Towards Nominal Context-Free Model-Checking. CIAA 2013: 109-121 - 2012
- [j50]Gabriele Costa
, Pierpaolo Degano, Fabio Martinelli:
Modular plans for secure service composition. J. Comput. Secur. 20(1): 81-117 (2012) - [c88]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. CISIM 2012: 1-29 - [c87]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
, Gianluca Mezzetti:
Types for Coordinating Secure Behavioural Variations. COORDINATION 2012: 261-276 - [c86]Pierpaolo Degano, Gian-Luigi Ferrari
, Gianluca Mezzetti:
Nominal Automata for Resource Usage Control. CIAA 2012: 125-137 - [c85]Pierpaolo Degano, Gian-Luigi Ferrari
, Letterio Galletta
, Gianluca Mezzetti:
Typing Context-Dependent Behavioural Variation. PLACES 2012: 28-33 - [p4]Pierpaolo Degano, Andrea Bracciali:
Process Calculi, Systems Biology and Artificial Chemistry. Handbook of Natural Computing 2012: 1863-1896 - [e12]Pierpaolo Degano, Joshua D. Guttman:
Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Lecture Notes in Computer Science 7215, Springer 2012, ISBN 978-3-642-28640-7 [contents] - 2011
- [j49]Gabriele Costa
, Pierpaolo Degano, Fabio Martinelli:
Secure service orchestration in open networks. J. Syst. Archit. 57(3): 231-239 (2011) - [j48]Pierpaolo Degano:
Preface. Theor. Comput. Sci. 412(21): 2094 (2011) - [c84]Mário S. Alvim
, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
:
Differential Privacy: On the Trade-Off between Utility and Information Leakage. Formal Aspects in Security and Trust 2011: 39-54 - [c83]Pierpaolo Degano, Gian-Luigi Ferrari
, Gianluca Mezzetti:
On Quantitative Security Policies. PaCT 2011: 23-39 - [p3]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Call-by-Contract for Service Discovery, Orchestration and Recovery. Results of the SENSORIA Project 2011: 232-261 - [e11]Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 [contents] - [i2]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy: on the trade-off between Utility and Information Leakage. CoRR abs/1103.5188 (2011) - 2010
- [j47]Chiara Bodei
, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2): 229-264 (2010) - [c82]Gabriele Costa
, Pierpaolo Degano, Fabio Martinelli:
Modular Plans for Secure Service Composition. ARSPA-WITS 2010: 41-58 - [e10]Pierpaolo Degano, Joshua D. Guttman:
Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5983, Springer 2010, ISBN 978-3-642-12458-7 [contents] - [i1]Mário S. Alvim, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy versus Quantitative Information Flow. CoRR abs/1012.4250 (2010)
2000 – 2009
- 2009
- [j46]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
:
Planning and verifying service composition. J. Comput. Secur. 17(5): 799-837 (2009) - [j45]Massimo Bartoletti, Gabriele Costa, Pierpaolo Degano, Fabio Martinelli, Roberto Zunino
:
Securing Java with Local Policies. J. Object Technol. 8(4): 5-32 (2009) - [j44]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6): 23:1-23:43 (2009) - [c81]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Formal Models of the Calyx of Held. Algorithmic Bioprocesses 2009: 331-366 - [c80]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
nu-Types for Effects and Freshness Analysis. ICTAC 2009: 80-95 - [e9]Pierpaolo Degano, Roberto Gorrieri:
Computational Methods in Systems Biology, 7th International Conference, CMSB 2009, Bologna, Italy, August 31-September 1, 2009. Proceedings. Lecture Notes in Computer Science 5688, Springer 2009, ISBN 978-3-642-03844-0 [contents] - [e8]Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli:
Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5491, Springer 2009 [contents] - [e7]Pierpaolo Degano, Luca Viganò:
Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5511, Springer 2009, ISBN 978-3-642-03458-9 [contents] - 2008
- [j43]Andrea Bracciali
, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S-4) (2008) - [j42]Pierpaolo Degano, Ralf Küsters, Luca Viganò, Steve Zdancewic:
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06). Inf. Comput. 206(2-4): 129 (2008) - [j41]Pierpaolo Degano, Luca Viganò:
Preface. Int. J. Inf. Sec. 7(1): 1 (2008) - [j40]Andrea Bracciali
, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1): 66-82 (2008) - [j39]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Semantics-Based Design for Secure Web Services. IEEE Trans. Software Eng. 34(1): 33-49 (2008) - [c79]Han Gao, Chiara Bodei
, Pierpaolo Degano:
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. AMAST 2008: 167-183 - [c78]Rocco De Nicola
, Pierpaolo Degano, José Meseguer:
Ugo Montanari in a Nutshell. Concurrency, Graphs and Models 2008: 1-8 - [c77]Davide Chiarugi
, Pierpaolo Degano, Jan Bert Van Klinken, Roberto Marangoni
:
Cells in Silico: A Holistic Approach. SFM 2008: 366-386 - [c76]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Model Checking Usage Policies. TGC 2008: 19-35 - [c75]Massimo Bartoletti
, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Hard Life with Weak Binders. EXPRESS 2008: 49-72 - [e6]Pierpaolo Degano, Rocco De Nicola, José Meseguer:
Concurrency, Graphs and Models, Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 5065, Springer 2008, ISBN 978-3-540-68676-7 [contents] - [e5]Marco Bernardo, Pierpaolo Degano, Gianluigi Zavattaro:
Formal Methods for Computational Systems Biology, 8th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2008, Bertinoro, Italy, June 2-7, 2008, Advanced Lectures. Lecture Notes in Computer Science 5016, Springer 2008, ISBN 978-3-540-68892-1 [contents] - 2007
- [j38]Davide Chiarugi
, Pierpaolo Degano, Roberto Marangoni
:
A Computational Approach to the Functional Screening of Genomes. PLoS Comput. Biol. 3(9) (2007) - [c74]Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. ASIAN 2007: 150-165 - [c73]Andrea Bracciali, Marcello Brunelli, Enrico Cataldo, Pierpaolo Degano:
Expressive Models for Synaptic Plasticity. CMSB 2007: 152-167 - [c72]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Secure Service Orchestration. FOSAD 2007: 24-74 - [c71]Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Types and Effects for Resource Usage Analysis. FoSSaCS 2007: 32-47 - [c70]Linda Brodo, Pierpaolo Degano, Corrado Priami:
A Stochastic Semantics for BioAmbients. PaCT 2007: 22-34 - [c69]Chiara Bodei
, Pierpaolo Degano, Han Gao, Linda Brodo:
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. SecCO@CONCUR 2007: 3-22 - 2006
- [j37]Pierpaolo Degano, Luca Viganò:
Preface.