Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Secure Partitioning of Composite Cloud Applications

    The security of Cloud applications is always a major concern for application developers and operators. Protecting their users’ data confidentiality requires methods to avoid leakage from vulnerable software an...

    Alessandro Bocci, Roberto Guanciale, Stefano Forti in Service-Oriented and Cloud Computing (2022)

  2. Article

    Open Access

    Secure FaaS orchestration in the fog: how far are we?

    Function-as-a-Service (FaaS) allows developers to define, orchestrate and run modular event-based pieces of code on virtualised resources, without the burden of managing the underlying infrastructure nor the l...

    Alessandro Bocci, Stefano Forti, Gian-Luigi Ferrari, Antonio Brogi in Computing (2021)

  3. No Access

    Chapter and Conference Paper

    Supervisory Synthesis of Configurable Behavioural Contracts with Modalities

    Service contracts characterise the desired behavioural compliance of a composition of services, typically defined by the fulfilment of all service requests through service offers. Contract automata are a forma...

    Davide Basile, Maurice H. ter Beek in Formal Techniques for Distributed Objects,… (2021)

  4. No Access

    Chapter

    Security Metrics at Work on the Things in IoT Systems

    The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automatically collect, aggregate and exchange data about our lives. These data are often pivotal when they are used ...

    Chiara Bodei, Pierpaolo Degano in From Lambda Calculus to Cybersecurity Thro… (2020)

  5. No Access

    Chapter and Conference Paper

    Secure Apps in the Fog: Anything to Declare?

    Assessing security of application deployments in the Fog is a non-trivial task, having to deal with highly heterogeneous infrastructures containing many resource-constrained devices. In this paper, we introdu...

    Antonio Brogi, Gian-Luigi Ferrari in Advances in Service-Oriented and Cloud Com… (2020)

  6. No Access

    Chapter

    Revealing the Trajectories of KLAIM Tuples, Statically

    Klaim (Kernel Language for Agents Interaction and Mobility) has been devised to design distributed applications composed by many components deployed over the nodes of a distributed infrastructure and to offer pro...

    Chiara Bodei, Pierpaolo Degano in Models, Languages, and Tools for Concurren… (2019)

  7. Chapter and Conference Paper

    Playing with Our CAT and Communication-Centric Applications

    We describe CAT, a toolkit supporting the analysis of communication-centric applications, i.e., applications consisting of ensembles of interacting services. Services are modelled in CAT as contract automata and ...

    Davide Basile, Pierpaolo Degano in Formal Techniques for Distributed Objects,… (2016)

  8. No Access

    Chapter

    Pierpaolo Degano

    This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.

    Chiara Bodei, Gian-Luigi Ferrari in Programming Languages with Applications to… (2015)

  9. No Access

    Chapter and Conference Paper

    A Two-Phase Static Analysis for Reliable Adaptation

    Adaptive systems are designed to modify their behaviour in response to changes of their operational environment. We adopt a language-based approach to the development of such systems, with particular attention...

    Pierpaolo Degano, Gian-Luigi Ferrari in Software Engineering and Formal Methods (2014)

  10. Chapter and Conference Paper

    Formalising Security in Ubiquitous and Cloud Scenarios

    We survey some critical issues arising in the ubiquitous computing paradigm, in particular the interplay between context-awareness and security. We then overview a language-based approach that addresses these ...

    Chiara Bodei, Pierpaolo Degano in Computer Information Systems and Industria… (2012)

  11. Chapter and Conference Paper

    Types for Coordinating Secure Behavioural Variations

    Context-Oriented programming languages provide us with primitive constructs to adapt program behaviour depending on the evolution of their operational environment. We are interested here in software components...

    Pierpaolo Degano, Gian-Luigi Ferrari in Coordination Models and Languages (2012)

  12. No Access

    Chapter and Conference Paper

    Choreography Rehearsal

    We propose a methodology for statically predicting the possible interaction patterns of services within a given choreography. We focus on choreographies exploiting the event notification paradigm to manage ser...

    Chiara Bodei, Gian Luigi Ferrari in Web Services and Formal Methods (2010)

  13. No Access

    Chapter and Conference Paper

    Refactoring Long Running Transactions

    Sagas calculi have been proposed to specify distributed Long Running Transactions (LRT) and, in previous work, a subset of naive sagas has been encoded in the Signal Calculus (SC) to enable their use in servic...

    Gian Luigi Ferrari, Roberto Guanciale, Daniele Strollo in Web Services and Formal Methods (2009)

  14. No Access

    Chapter and Conference Paper

    Model Checking Usage Policies

    We propose a model for specifying, analysing and enforcing safe usage of resources. Our usage policies allow for parametricity over resources, and they can be enforced through finite state automata. The patter...

    Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari in Trustworthy Global Computing (2009)

  15. Chapter and Conference Paper

    Checking Correctness of Transactional Behaviors

    The Signal Calculus is an asynchronous process calculus featuring multicast communication. It relies on explicit modeling of the communication structure of the network (communication flows), and on handling se...

    Vincenzo Ciancia, Gian Luigi Ferrari in Formal Techniques for Networked and Distri… (2008)

  16. No Access

    Chapter and Conference Paper

    Secure Service Orchestration

    We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a “call-by-contract” fashion. This mechanism off...

    Massimo Bartoletti, Pierpaolo Degano in Foundations of Security Analysis and Desig… (2007)

  17. Chapter and Conference Paper

    Security Issues in Service Composition

    We use a distributed, enriched λ-calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on each other’s behaviour. Then, service int...

    Massimo Bartoletti, Pierpaolo Degano in Formal Methods for Open Object-Based Distr… (2006)

  18. No Access

    Article

    Stack inspection and secure program transformations

    This paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR. We introduce a static analysis which safely approximates the access rights granted to code at run time. Thi...

    Massimo Bartoletti, Pierpaolo Degano in International Journal of Information Secur… (2004)

  19. No Access

    Book and Conference Proceedings

    Coordination Models and Languages

    6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004 Proceedings

    Rocco De Nicola, Gian-Luigi Ferrari in Lecture Notes in Computer Science (2004)