Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter

    Risk Estimation in IoT Systems

    In the era of the Internet of Things, it is essential to ensure that data collected by sensors and smart devices are reliable and that they are aggregated and transmitted securely to computational components. ...

    Chiara Bodei, Gian-Luigi Ferrari, Letterio Galletta in Challenges of Software Verification (2023)

  2. No Access

    Chapter and Conference Paper

    Secure Partitioning of Composite Cloud Applications

    The security of Cloud applications is always a major concern for application developers and operators. Protecting their users’ data confidentiality requires methods to avoid leakage from vulnerable software an...

    Alessandro Bocci, Roberto Guanciale, Stefano Forti in Service-Oriented and Cloud Computing (2022)

  3. Article

    Open Access

    Secure FaaS orchestration in the fog: how far are we?

    Function-as-a-Service (FaaS) allows developers to define, orchestrate and run modular event-based pieces of code on virtualised resources, without the burden of managing the underlying infrastructure nor the l...

    Alessandro Bocci, Stefano Forti, Gian-Luigi Ferrari, Antonio Brogi in Computing (2021)

  4. No Access

    Chapter and Conference Paper

    Supervisory Synthesis of Configurable Behavioural Contracts with Modalities

    Service contracts characterise the desired behavioural compliance of a composition of services, typically defined by the fulfilment of all service requests through service offers. Contract automata are a forma...

    Davide Basile, Maurice H. ter Beek in Formal Techniques for Distributed Objects,… (2021)

  5. No Access

    Chapter

    Security Metrics at Work on the Things in IoT Systems

    The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automatically collect, aggregate and exchange data about our lives. These data are often pivotal when they are used ...

    Chiara Bodei, Pierpaolo Degano in From Lambda Calculus to Cybersecurity Thro… (2020)

  6. No Access

    Chapter and Conference Paper

    Secure Apps in the Fog: Anything to Declare?

    Assessing security of application deployments in the Fog is a non-trivial task, having to deal with highly heterogeneous infrastructures containing many resource-constrained devices. In this paper, we introdu...

    Antonio Brogi, Gian-Luigi Ferrari in Advances in Service-Oriented and Cloud Com… (2020)

  7. No Access

    Article

    Programming in a context-aware language

    In the times of mobility and pervasiveness of computing, contextual information plays an increasingly crucial role in applications. This kind of information becomes a first class citizen in context-oriented pr...

    Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari in The Journal of Supercomputing (2019)

  8. No Access

    Chapter

    Revealing the Trajectories of KLAIM Tuples, Statically

    Klaim (Kernel Language for Agents Interaction and Mobility) has been devised to design distributed applications composed by many components deployed over the nodes of a distributed infrastructure and to offer pro...

    Chiara Bodei, Pierpaolo Degano in Models, Languages, and Tools for Concurren… (2019)

  9. No Access

    Chapter

    Automata-Based Behavioural Contracts with Action Correlation

    The rigorous design of Service-Oriented Computing (SOC) applications has been identified as one of the primary research challenges for the next 10 years. Many foundational theories for SOC have been defined, ...

    Davide Basile, Rosario Pugliese in From Software Engineering to Formal Method… (2019)

  10. No Access

    Article

    Regular and context-free nominal traces

    Two kinds of automata are presented, for recognising new classes of regular and context-free nominal languages. We compare their expressive power with analogous proposals in the literature, showing that they e...

    Pierpaolo Degano, Gian-Luigi Ferrari, Gianluca Mezzetti in Acta Informatica (2017)

  11. No Access

    Chapter and Conference Paper

    Experimenting with a Context-Aware Language

    Contextual information plays an increasingly crucial role in concurrent applications in the times of mobility and pervasiveness of computing. Context-Oriented Programming languages explicitly treat this kind o...

    Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari in Parallel Computing Technologies (2017)

  12. No Access

    Chapter

    Last Mile’s Resources

    We extend an existing two-phase static analysis for an adaptive programming language to also deal with dynamic resources. The focus of our analysis is on predicting how these are used, in spite of the differen...

    Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari in Semantics, Logics, and Calculi (2016)

  13. Chapter and Conference Paper

    Where Do Your IoT Ingredients Come From?

    The Internet of Things (IoT) is here: smart objects are pervading our everyday life. Smart devices automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggre...

    Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari in Coordination Models and Languages (2016)

  14. Chapter and Conference Paper

    Playing with Our CAT and Communication-Centric Applications

    We describe CAT, a toolkit supporting the analysis of communication-centric applications, i.e., applications consisting of ensembles of interacting services. Services are modelled in CAT as contract automata and ...

    Davide Basile, Pierpaolo Degano in Formal Techniques for Distributed Objects,… (2016)

  15. No Access

    Chapter

    Pierpaolo Degano

    This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.

    Chiara Bodei, Gian-Luigi Ferrari in Programming Languages with Applications to… (2015)

  16. No Access

    Article

    A formal framework for secure and complying services

    Internet is offering a variety of services that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial...

    Davide Basile, Pierpaolo Degano, Gian -Luigi Ferrari in The Journal of Supercomputing (2014)

  17. No Access

    Chapter and Conference Paper

    A Two-Phase Static Analysis for Reliable Adaptation

    Adaptive systems are designed to modify their behaviour in response to changes of their operational environment. We adopt a language-based approach to the development of such systems, with particular attention...

    Pierpaolo Degano, Gian-Luigi Ferrari in Software Engineering and Formal Methods (2014)

  18. No Access

    Chapter and Conference Paper

    Automata for Analysing Service Contracts

    A novel approach to the formal description of service contracts is presented in terms of automata. We focus on the basic property of guaranteeing that in the multi-party composition of principals each individu...

    Davide Basile, Pierpaolo Degano, Gian Luigi Ferrari in Trustworthy Global Computing (2014)

  19. No Access

    Chapter and Conference Paper

    Towards Nominal Context-Free Model-Checking

    Two kinds of automata are introduced, for recognising regular and context-free nominal languages. We compare their expressive power with that of analogous proposals in the literature. Some properties of our la...

    Pierpaolo Degano, Gian-Luigi Ferrari in Implementation and Application of Automata (2013)

  20. No Access

    Chapter and Conference Paper

    Secure and Unfailing Services

    Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucia...

    Davide Basile, Pierpaolo Degano, Gian-Luigi Ferrari in Parallel Computing Technologies (2013)

previous disabled Page of 3