2008 |
58 | EE | Michele Bugliesi,
Riccardo Focardi:
Language Based Secure Communication.
CSF 2008: 3-16 |
2007 |
57 | EE | Michele Bugliesi,
Damiano Macedonio,
Sabina Rossi:
Static vs Dynamic Typing for Access Control in Pi-Calculus.
ASIAN 2007: 282-296 |
56 | EE | Michele Bugliesi,
Marco Giunti:
Secure implementations of typed channel abstractions.
POPL 2007: 251-262 |
55 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Dynamic types for authentication.
Journal of Computer Security 15(6): 563-617 (2007) |
54 | EE | Franco Barbanera,
Michele Bugliesi,
Mariangiola Dezani-Ciancaglini,
Vladimiro Sassone:
Space-aware ambients and processes.
Theor. Comput. Sci. 373(1-2): 41-69 (2007) |
2006 |
53 | | Michele Bugliesi,
Bart Preneel,
Vladimiro Sassone,
Ingo Wegener:
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I
Springer 2006 |
52 | | Michele Bugliesi,
Bart Preneel,
Vladimiro Sassone,
Ingo Wegener:
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II
Springer 2006 |
2005 |
51 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols.
CSFW 2005: 112-125 |
50 | EE | Michele Bugliesi,
Marco Giunti:
Typed Processes in Untyped Contexts.
TGC 2005: 19-32 |
49 | EE | Viviana Bono,
Michele Bugliesi,
Sophia Drossopoulou:
Preface.
Electr. Notes Theor. Comput. Sci. 138(2): 1-2 (2005) |
48 | EE | Michele Bugliesi,
Silvia Crafa,
Massimo Merro,
Vladimiro Sassone:
Communication and mobility control in boxed ambients.
Inf. Comput. 202(1): 39-86 (2005) |
47 | | Michele Bugliesi,
Sabina Rossi:
Non-interference proof techniques for the analysis of cryptographic protocols.
Journal of Computer Security 13(1): 87-113 (2005) |
2004 |
46 | EE | Michele Bugliesi,
Dario Colazzo,
Silvia Crafa:
Type Based Discretionary Access Control.
CONCUR 2004: 225-239 |
45 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Compositional Analysis of Authentication Protocols.
ESOP 2004: 140-154 |
44 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Authenticity by tagging and typing.
FMSE 2004: 1-12 |
43 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa:
Access control for mobile agents: The calculus of boxed ambients.
ACM Trans. Program. Lang. Syst. 26(1): 57-124 (2004) |
2003 |
42 | EE | Franco Barbanera,
Michele Bugliesi,
Mariangiola Dezani-Ciancaglini,
Vladimiro Sassone:
A Calculus of Bounded Capacities.
ASIAN 2003: 205-223 |
41 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Principles for Entity Authentication.
Ershov Memorial Conference 2003: 294-306 |
40 | EE | Michele Bugliesi,
Ambra Ceccato,
Sabina Rossi:
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis.
FCT 2003: 364-375 |
39 | EE | Michele Bugliesi,
Silvia Crafa,
Amela Prelic,
Vladimiro Sassone:
Secrecy in Untrusted Networks.
ICALP 2003: 969-983 |
38 | EE | Viviana Bono,
Michele Bugliesi:
First Workshop on Object Oriented Developments.
Electr. Notes Theor. Comput. Sci. 82(7): (2003) |
2002 |
37 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa,
Riccardo Focardi,
Vladimiro Sassone:
A Survey of Name-Passing Calculi and Crypto-Primitives.
FOSAD 2002: 91-138 |
36 | EE | Michele Bugliesi,
Silvia Crafa,
Massimo Merro,
Vladimiro Sassone:
Communication Interference in Mobile Boxed Ambients.
FSTTCS 2002: 71-84 |
35 | EE | Viviana Bono,
Michele Bugliesi,
Silvia Crafa:
Typed interpretations of extensible objects.
ACM Trans. Comput. Log. 3(4): 562-603 (2002) |
34 | | Michele Bugliesi,
Giuseppe Castagna:
Behavioural typing for safe ambients.
Comput. Lang. 28(1): 61-99 (2002) |
33 | EE | Silvia Crafa,
Michele Bugliesi,
Giuseppe Castagna:
Information Flow Security for Boxed Ambients.
Electr. Notes Theor. Comput. Sci. 66(3): (2002) |
32 | EE | Michele Bugliesi,
Santiago M. Pericás-Geertsen:
Type Inference for Variant Object Types.
Inf. Comput. 177(1): 2-27 (2002) |
2001 |
31 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa:
Reasoning about Security in Mobile Ambients.
CONCUR 2001: 102-120 |
30 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa:
Subtyping and Matching for Mobile Objects.
ICTCS 2001: 235-255 |
29 | EE | Michele Bugliesi,
Giuseppe Castagna:
Secure safe ambients.
POPL 2001: 222-235 |
28 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa:
Boxed Ambients.
TACS 2001: 38-63 |
27 | EE | Giuseppe Castagna,
Michele Bugliesi,
Silvia Crafa:
An overview of Boxed Ambients.
Electr. Notes Theor. Comput. Sci. 62: (2001) |
2000 |
26 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa:
Typed Mobile Objects.
CONCUR 2000: 504-520 |
25 | | Michele Bugliesi,
Giorgio Delzanno,
Luigi Liquori,
Maurizio Martelli:
Object calculi in linear logic.
J. Log. Comput. 10(1): 75-104 (2000) |
1999 |
24 | EE | Viviana Bono,
Michele Bugliesi:
Interpretations of Extensible Objects and Types.
FCT 1999: 112-123 |
23 | | Viviana Bono,
Michele Bugliesi,
Mariangiola Dezani-Ciancaglini,
Luigi Liquori:
A Subtyping for Extensible, Incomplete Objects.
Fundam. Inform. 38(4): 325-364 (1999) |
22 | EE | Viviana Bono,
Michele Bugliesi:
Matching for the lambda Calculus of Objects.
Theor. Comput. Sci. 212(1-2): 101-140 (1999) |
1998 |
21 | EE | Michele Bugliesi,
Anna Ciampolini,
Evelina Lamma,
Paola Mello:
Optimizing Modular Logic Languages.
ACM Comput. Surv. 30(3es): 10 (1998) |
1997 |
20 | | Viviana Bono,
Michele Bugliesi,
Mariangiola Dezani-Ciancaglini,
Luigi Liquori:
Subtyping Constraints for Incomplete Objects (Extended Abstract).
TAPSOFT 1997: 465-477 |
19 | | Viviana Bono,
Michele Bugliesi:
Matching Constraints for the Lambda Calculus of Objects.
TLCA 1997: 46-62 |
1996 |
18 | | Michele Bugliesi,
Giorgio Delzanno,
Luigi Liquori,
Maurizio Martelli:
A Linear Logic Calculus Objects.
JICSLP 1996: 67-81 |
17 | | Viviana Bono,
Michele Bugliesi,
Luigi Liquori:
A Lambda Calculus of Incomplete Objects.
MFCS 1996: 218-229 |
16 | | Annalisa Bossi,
Michele Bugliesi,
Maurizio Gabbrielli,
Giorgio Levi,
Maria Chiara Meo:
Differential Logic Programs: Programming Methodologies and Semantics.
Sci. Comput. Program. 27(3): 217-262 (1996) |
1995 |
15 | EE | Michele Bugliesi,
Hasan M. Jamil:
A Stable Model Semantics for Behavioral Inheritance in Deductive Object Oriented Languages.
ICDT 1995: 222-237 |
1994 |
14 | | Michele Bugliesi,
Hasan M. Jamil:
A Logic for Encapsulation in Object-Oriented Languages.
GULP-PRODE (2) 1994: 161-175 |
13 | | Michele Bugliesi,
Hasan M. Jamil:
A Logic for Encapsulation in Object Oriented Languages.
PLILP 1994: 215-229 |
12 | | Michele Bugliesi,
Evelina Lamma,
Paola Mello:
Modularity in Logic Programming.
J. Log. Program. 19/20: 443-502 (1994) |
1993 |
11 | | Annalisa Bossi,
Michele Bugliesi,
Massimo Fabris:
A New Fixpoint Semantics for Prolog.
GULP 1993: 617-632 |
10 | | Annalisa Bossi,
Michele Bugliesi,
Massimo Fabris:
A New Fixpoint Semantics for Prolog.
ICLP 1993: 374-389 |
9 | | Michele Bugliesi,
Giuseppe Nardiello:
SelfLog: Language and Implementation.
ICLP-Workshops on Implementation of Logic Programming Systems 1993: 1-15 |
8 | | Michele Bugliesi,
Giuseppe Nardiello:
SelfLog: Language and Implementation.
PLILP 1993: 412-413 |
7 | | Annalisa Bossi,
Michele Bugliesi:
Differential Logic Programming.
POPL 1993: 359-370 |
6 | | Michele Bugliesi,
Evelina Lamma,
Paola Mello:
Partial Deduction for Structured Logic Programming.
J. Log. Program. 16(1): 89-122 (1993) |
1992 |
5 | | Michele Bugliesi:
On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction.
ELP 1992: 205-215 |
4 | | Michele Bugliesi:
A Declarative View of Inheritance in Logic Programming.
JICSLP 1992: 113-127 |
1990 |
3 | | Marco Bellia,
Michele Bugliesi,
M. Eugenia Occhiuto:
Combinatory Forms for Equational Programming: Instances, Unification and Narrowing.
CAAP 1990: 42-56 |
2 | | Michele Bugliesi,
Evelina Lamma,
Paola Mello:
Partial Evaluation for Hierarchies of Logic Theories.
NACLP 1990: 359-376 |
1989 |
1 | | Michele Bugliesi,
F. Russo:
Partial Evaluation in Prolog: Some Improvements about Cut.
NACLP 1989: 645-660 |