BUGLIESI Michele

Position Full Professor
Telephone 041 234 8437
E-mail bugliesi@unive.it
Scientific sector (SSD) INFORMATICA [INF/01]
Website www.unive.it/persone/bugliesi (personal record)
 http://www.dsi.unive.it/~michele
Office Department of Environmental Sciences, Informatics and Statistics
Website: https://www.unive.it/dep.dais
Where: Campus scientifico via Torino
Room: office Z.B06 (Zeta B building)

Publications by typology

Articolo su rivista
  • Calzavara, Stefano*; Rabitti, Alvise; Bugliesi, Michele (2019), Sub-session hijacking on the web: Root causes and prevention in JOURNAL OF COMPUTER SECURITY, vol. 27, pp. 233-257 (ISSN 0926-227X)
    Link DOIURL correlato Link al documento: 10278/3713216
  • Calzavara, Stefano; Rabitti, Alvise; Bugliesi, Michele (2018), Semantics-based analysis of content security policy deployment in ACM TRANSACTIONS ON THE WEB, vol. 12, pp. 1-36 (ISSN 1559-1131)
    Link DOIURL correlato Link al documento: 10278/3698102
  • Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo (2017), Formal methods for web security in THE JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, vol. 87, pp. 110-126 (ISSN 2352-2216)
    Link DOIURL correlato Link al documento: 10278/3685125
  • Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian; Modesti, Paolo (2016), Security protocol specification and verification with AnBx in JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, vol. 30, pp. 46-63 (ISSN 2214-2126)
    Link DOIURL correlato Link al documento: 10278/3685123
  • Calzavara, S.; Tolomei, G.; Casini, A.; Bugliesi, M.; Orlando, S. (2015), A Supervised Learning Approach to Protect Client Authentication on the Web in ACM TRANSACTIONS ON THE WEB, Association for Computing Machinery, vol. 9, pp. 1-30 (ISSN 1559-1131)
    Link DOIURL correlato Link al documento: 10278/3661257
  • Bugliesi, Michele; Calzavara, Stefano; Eigner, Fabienne; Maffei, Matteo (2015), Affine Refinement Types for Secure Distributed Programming in ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, Association for Computing Machinery, vol. 37, pp. 1-66 (ISSN 0164-0925)
    Link DOIURL correlato Link al documento: 10278/3661939
  • Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo; Khan, Wilayat (2015), CookiExt: Patching the browser against session hijacking attacks in JOURNAL OF COMPUTER SECURITY, vol. 23, pp. 509-537 (ISSN 0926-227X)
    Link DOIURL correlato Link al documento: 10278/3663357
  • M. Bugliesi; L. Gallina; S. Hamadou; A. Marin; S. Rossi (2014), Behavioural equivalences and interference metrics for mobile ad-hoc networks in PERFORMANCE EVALUATION, vol. 73, pp. 41-72 (ISSN 0166-5316)
    Link DOIURL correlato Link al documento: 10278/39218
  • Michele Bugliesi; Andrea Marin; Sabina Rossi (2014), Model Checking Adaptive Service Compositions in SCIENCE OF COMPUTER PROGRAMMING, vol. 94, pp. 289-306 (ISSN 0167-6423)
    Link DOIURL correlato Link al documento: 10278/39176
  • BUGLIESI M.; FOCARDI R (2010), Channel Abstractions for Network Security in MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, vol. 20(1), pp. 3-44 (ISSN 0960-1295)
    Link DOI Link al documento: 10278/29326
  • BUGLIESI M.; COLAZZO D; CRAFA S; MACEDONIO M (2009), A Type System for Discretionary Access Control in MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, vol. 19(4), pp. 839-875 (ISSN 0960-1295)
    Link DOI Link al documento: 10278/21585
  • M. BUGLIESI; FOCARDI R.; M. MAFFEI (2007), Dynamic Types for Authentication in JOURNAL OF COMPUTER SECURITY, vol. 15 (6), pp. 563-617 (ISSN 0926-227X)
    Link al documento: 10278/30434
  • BARBANERA F; BUGLIESI M.; DEZANI-CIANCAGLINI M; SASSONE V (2007), Space-aware ambients and processes in THEORETICAL COMPUTER SCIENCE, vol. 373(1-2), pp. 41-69 (ISSN 0304-3975)
    Link al documento: 10278/16089
  • BUGLIESI M.; CRAFA S; MERRO M; SASSONE V (2005), Communication and Mobility Control in Boxed Ambients in INFORMATION AND COMPUTATION, vol. 202 (1), pp. 39-86 (ISSN 0890-5401)
    Link al documento: 10278/30066
  • BUGLIESI M; ROSSI S. (2005), Non-Interference Proof Techniques for the Analysis of Cryptographic Protocols in JOURNAL OF COMPUTER SECURITY, vol. 13, pp. 87-113 (ISSN 0926-227X)
    URL correlato Link al documento: 10278/39177
  • BUGLIESI M.; CASTAGNA G.; CRAFA S. (2004), Access Control for Mobile Agents: the Calculus of Boxed Ambients in ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, vol. 26, pp. 57-124 (ISSN 0164-0925)
    Link al documento: 10278/12508
  • CASTAGNA G; BUGLIESI M. (2002), Behavioural typing for safe ambients in COMPUTER LANGUAGES, vol. 28(1), pp. 62-99 (ISSN 0096-0551)
    Link al documento: 10278/12501
  • SILVIA CRAFA; BUGLIESI M.; GIUSEPPE CASTAGNA (2002), Information Flow Security for Boxed Ambients in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, vol. 66(1), pp. 76-97 (ISSN 1571-0661)
    Link al documento: 10278/13495
  • BUGLIESI M.; PERICAS-G S. (2002), Type Inference for Variant Object Types in INFORMATION AND COMPUTATION, vol. 177(1), pp. 2-27 (ISSN 0890-5401)
    Link al documento: 10278/32979
  • BONO V.; BUGLIESI M.; CRAFA S. (2002), Typed Interpretations of Extensible Objects in ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, vol. 3(4), pp. 562-603 (ISSN 1529-3785)
    Link al documento: 10278/12452
  • CASTAGNA G; BUGLIESI M.; SILVIA CRAFA (2001), An overview of Boxed Ambients in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, vol. 62, pp. 1-6 (ISSN 1571-0661)
    Link al documento: 10278/13497
  • BUGLIESI M.; DELZANNO G; LIQUORI L; MARTELLI M (2000), Object Calculi in Linear Logic in JOURNAL OF LOGIC AND COMPUTATION, vol. 10(1), pp. 75-104 (ISSN 0955-792X)
    Link al documento: 10278/12500
  • BONO V. ; BUGLIESI M. ; LIQUORI L. ; DEZANI-CIANCAGLINI M. (1999), A subtyping for Extensible Incomplete Objects in FUNDAMENTA INFORMATICAE, vol. 38(4), pp. 325-364 (ISSN 0169-2968)
    Link al documento: 10278/23461
  • BONO V.; BUGLIESI M. (1999), Matching for the Lambda Calculus of Objects in THEORETICAL COMPUTER SCIENCE, vol. 212, pp. 101-140 (ISSN 0304-3975)
    Link al documento: 10278/24219
  • BOSSI A.; M. BUGLIESI; M. GABBRIELLI; G. LEVI; E M.C. MEO (1996), Differential logic programs: Programming methodologies and semantics in SCIENCE OF COMPUTER PROGRAMMING, vol. 27(3), pp. 217-262 (ISSN 0167-6423)
    Link al documento: 10278/12639
Articolo su libro
  • SPANO' A.; BUGLIESI M.; CORTESI A. (2013), Typing Legacy COBOL Code , Software and Data Technologies, Berlin, Springer-Verlag, vol. 303, pp. 151-165 (ISBN 9783642361760; 9783642361777) (ISSN 1865-0929)
    Link DOI Link al documento: 10278/37423
  • BUGLIESI M.; GIUSEPPE CASTAGNA; SILVIA CRAFA; RICCARDO FOCARDI; VLADIMIRO SASSONE (2002), A Survey of Name-Passing Calculi and Crypto-Primitives , Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, Germany:Springer Verlag Germany, vol. 2946, pp. 91-138 (ISBN 3540209557) (ISSN 0302-9743)
    Link al documento: 10278/7587
Articolo in Atti di convegno
  • Calzavara S.; Rabitti A.; Bugliesi M. (2019), Semantically Sound Analysis of Content Security Policies , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, vol. 11535, pp. 293-297, Convegno: 39th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2019 held as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, 2019 (ISBN 978-3-030-21758-7; 978-3-030-21759-4) (ISSN 0302-9743)
    Link DOIURL correlato Link al documento: 10278/3716810
  • Calzavara S.; Rabitti A.; Ragazzo A.; Bugliesi M. (2019), Testing for Integrity Flaws in Web Sessions , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, vol. 11736, pp. 606-624, Convegno: 24th European Symposium on Research in Computer Security, ESORICS 2019, 2019 (ISBN 978-3-030-29961-3; 978-3-030-29962-0) (ISSN 0302-9743)
    Link DOIURL correlato Link al documento: 10278/3722895
  • Calzavara, Stefano; Rabitti, Alvise; Bugliesi, Michele (2018), Dr Cookie and Mr Token - Web session implementations and how to live with them in Calzavara, Stefano, CEUR Workshop Proceedings in CEUR WORKSHOP PROCEEDINGS, CEUR-WS, vol. 2058, Convegno: 2nd Italian Conference on Cyber Security, ITASEC 2018, 2018 (ISSN 1613-0073)
    URL correlato Link al documento: 10278/3698101
  • Stefano Calzavara, Alvise Rabitti, Michele Bugliesi (2017), CCSP: Controlled relaxation of content security policies by runtime policy composition , Proceedings of the 26th USENIX Security Symposium, USENIX Association, pp. 695-712, Convegno: USENIX Security Symposium
    Link al documento: 10278/3698103
  • Calzavara, Stefano; Rabitti, Alvise; Bugliesi, Michele (2016), Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild , Proceedings of the ACM Conference on Computer and Communications Security, NEW YORK, ASSOC COMPUTING MACHINERY, vol. 24-28-, pp. 1365-1375, Convegno: 23rd ACM Conference on Computer and Communications Security, CCS 2016, 2016 (ISBN 9781450341394; 9781450341394)
    Link DOI Link al documento: 10278/3685122
  • Calzavara, Stefano; Rabitti, Alvise; Steffinlongo, Enrico; Bugliesi, Michele (2016), Static Detection of Collusion Attacks in ARBAC-based Workflow Systems , Proceedings - IEEE Computer Security Foundations Symposium, 345 E 47TH ST, NEW YORK, NY 10017 USA, IEEE, vol. 2016-, pp. 458-470, Convegno: 29th IEEE Computer Security Foundations Symposium, CSF 2016, 2016 (ISBN 9781509026074; 9781509026074)
    Link DOI Link al documento: 10278/3685120
  • Calzavara, Stefano; Rabitti, Alvise; Bugliesi, Michele (2015), Compositional Typed Analysis of ARBAC Policies , Proceedings of the Computer Security Foundations Workshop, 345 E 47TH ST, NEW YORK, NY 10017 USA, IEEE, vol. 2015-, pp. 33-45, Convegno: 28th IEEE Computer Security Foundations Symposium, CSF 2015, 2015 (ISBN 9781467375382; 9781467375382)
    Link DOI Link al documento: 10278/3679811
  • Calzavara, Stefano; Bugliesi, Michele; Crafa, S.; Steffinlongo, Enrico (2015), Fine-grained Detection of Privilege Escalation Attacks on Browser Extensions in Stefano Calzavara, Michele Bugliesi, Silvia Crafa, Enrico Steffinlongo, ESOP 2015, Springer Verlag, vol. 9032, pp. 510-534, Convegno: 24th European Symposium on Programming, ESOP 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, 2015 (ISBN 9783662466681) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/3655341
  • Calzavara, Stefano; Rabitti, Alvise; Bugliesi, Michele (2015), Formal verification of Liferay RBAC , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, vol. 8978, pp. 1-16, Convegno: 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, 2015 (ISBN 9783319156170) (ISSN 0302-9743)
    Link DOIURL correlato Link al documento: 10278/3679815
  • M. Bugliesi; S. Calzavara; R. Focardi; W. Khan (2014), Automatic and robust client-side protection for cookie-based sessions , Engineering Secure Software and Systems, Springer, Convegno: 6th International Symposium, ESSoS 2014 (ISBN 9783319048963) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/42442
  • Khan, Wilayat; Calzavara, Stefano; Bugliesi, Michele; DE GROEF, W.; Piessens, F. (2014), Client Side Web Session Integrity as a Non-Interference Property in KHAN W., CALZAVARA S., BUGLIESI M., DE GROEF W.,PIESSENS F., Information Systems Security - 10th International Conference, ICISS 2014,, Springer Verlag, vol. 8880, pp. 89-108, Convegno: Information Systems Security - 10th International Conference, ICISS 2014,, 2014 (ISBN 9783319138404; 9783319138411) (ISSN 1611-3349)
    Link DOIURL correlato Link al documento: 10278/44059
  • Michele Bugliesi; Stefano Calzavara; Riccardo Focardi; Wilayat Khan; Mauro Tempesta (2014), Provably Sound Browser-Based Enforcement of Web Session Integrity , Proceedings of the 27th Computer Security Foundations Symposium, IEEE, Convegno: Computer Security Foundations Symposium, 19-22 July 2014 (ISBN 9781479942909)
    Link DOI Link al documento: 10278/42652
  • Stefano Calzavara;Gabriele Tolomei;Michele Bugliesi;Salvatore Orlando (2014), Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication , Proceedings of the 23rd international conference on World wide web - WWW '14, ACM Press, pp. 189-200, Convegno: International Conference on World Wide Web (ISBN 9781450327442)
    Link DOI Link al documento: 10278/42600
  • Michele Bugliesi; Stefano Calzavara; Fabienne Eigner; Matteo Maffei (2013), Affine Refinement Types for Authentication and Authorization , 7th International Symposium on Trustworthy Global Computing, Berlin Heidelberg, Springer- Verlag, vol. 8191, pp. 19-33, Convegno: TGC 2012 (ISBN 9783642411564) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/37560
  • Michele Bugliesi; Stefano Calzavara; Alvise Spano (2013), Lintent: Towards Security Type-Checking of Android Applications , FMOODS/FORTE, Berlin Hidelberg, SPRINGER-VERLAG, vol. 7892, pp. 289-304, Convegno: Formal Techniques for Distributed Systems - Joint IFIP WG 6.1 International Conference, FMOODS/FORTE 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec, June 3-5, 2013 (ISBN 9783642385919) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/39004
  • Michele Bugliesi; Stefano Calzavara; Fabienne Eigner; Matteo Maffei (2013), Logical Foundations of Secure Resource Management in Protocol Implementations , 2nd Conference on Principles of Security and Trust, SPRINGER-VERLAG, vol. 7796, pp. 105-125, Convegno: POST 2013 (ISBN 9783642368295) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/37534
  • MAGGIORE G.; ABBADI M.; PITTARELLO F.; BUGLIESI M.; (2012), A compilation technique to increase X3D performance and safety , Proceedings of the ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy, March 26-30, 2012, ACM, pp. 969-974, Convegno: SAC 2012 (ISBN 9781450308571)
    Link DOI Link al documento: 10278/24481
  • Giuseppe Maggiore;Alvise Spanò;Renzo Orsini;Michele Bugliesi;Mohamed Abbadi;Enrico Steffinlongo (2012), A formal specification for Casanova, a language for computer games , Proceedings of the 4th ACM SIGCHI symposium on Engineering interactive computing systems - EICS '12, New York, ACM Association fot Computing Machinery, pp. 287-292, Convegno: EICS '12, June 25–28, 2012 (ISBN 9781450311687)
    Link DOI Link al documento: 10278/27911
  • BUGLIESI M.; CALZAVARA S.; FOCARDI R.; SQUARCINA M; (2012), Gran: model checking grsecurity RBAC policies , Proceedings 2012 IEEE 25th Computer Security Foundations Symposium CSF 2012, IEEE Computer Society, pp. 126-138, Convegno: CSF 2012, 25-27 June 2012 (ISBN 9780769547183)
    Link DOI Link al documento: 10278/39019
  • M. Bugliesi; L. Gallina; S. Hamadou; A. Marin; S. Rossi (2012), Interference-sensitive Preorders for MANETs , Proc. of the 9th International Conference on Quantitative Evaluation of SysTems (QEST), Washington, DC, IEEE, pp. 189-198, Convegno: QEST'12, 17-20 Sep 2012 (ISBN 9780769547817)
    Link DOIURL correlato Link al documento: 10278/39280
  • G. Maggiore; R. Orsini; M. Bugliesi (2012), On Casanova and databases or the similarity between games and DBs , SEBD 2012, Padova, Edizioni Libreria Progetto, pp. 271-276, Convegno: SEBD 2012 (ISBN 9788896477236)
    Link al documento: 10278/39003
  • G. Maggiore; P. Spronck; R. Orsini; M. Bugliesi; E. Steffinlongo; M. Abbadi (2012), Writing real-time .Net games in Casanova , Entertainment Computing - ICEC 2012, SPRINGER VERLAG, vol. 7522, pp. 341-348, Convegno: 11th International Conference, ICEC 2012, September 26-29, 2012 (ISBN 9783642335419) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/38044
  • Giuseppe Maggiore; Alvise Spanò; Renzo Orsini; Giulia Costantini; Michele Bugliesi ; Mohamed Abbadi (2011), Designing Casanova: a language for games in van den Herik, H. Jaap; Plaat, Aske, Advances in Computer Games, Springer-Verlag, Convegno: ACG 2011 : Advances in Computer Games 13 Conference (ISBN 9783642318658) (ISSN 1611-3349)
    Link DOI Link al documento: 10278/36316
  • G. Maggiore; M. Bugliesi; R. Orsini (2011), Monadic Scripting in F# for Computer Games , TTSS 2011 - 5th International Workshop on Harnessing Theories for Tool Support in Software, Convegno: Harnessing Theories for Tool Support in Software, 13/9/2011
    Link al documento: 10278/27851
  • BUGLIESI M.; CALZAVARA S.; MAFFEI M.; EIGNER F. (2011), Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols , Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, IEEE Computer Society, pp. 83-98, Convegno: CSF 2011, 26-29 June 2011 (ISBN 9781612846446)
    Link DOI Link al documento: 10278/28120
  • SPANO' A.; BUGLIESI M.; CORTESI A. (2011), Type-Flow Analysis for Legacy Cobol Code in Maria Jose Escalona, Boris Shishkov and José Cordeiro, ICSOFT 2011 - Proceedings of the 6th International Conference on Software and Database Technologies, SciTePress – Science and Technology Publications, vol. 2, pp. 64-75, Convegno: ICSOFT 2011 - 6th International Conference on Software and Database Technologies, 18-21 July, 2011 (ISBN 9789898425775)
    Link al documento: 10278/29488
  • Bugliesi M.; Modesti P. (2010), Abstractions for Distributed Protocol Design , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Paper, Springer-Verlan, vol. 6186, pp. 164-184, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/24270
  • Bugliesi M.; Calzavara S.; Macedonio D. (2010), Secrecy and Authenticity Types for Secure Distributed Messaging , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers, SPRINGER-VERLAG, vol. 6186, pp. 23-40, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743)
    Link DOI Link al documento: 10278/24296
  • M. BUGLIESI; D. MACEDONIO; L. PINO; ROSSI S. (2009), Compliance Preorders for Web Services. , Web Services and Formal Methods, 6th International Workshop, WS-FM 2009, Bologna, Italy, September 4-5, 2009, Revised Selected Papers, Berlin, Springer Berlin Heidelberg, vol. 6194, pp. 76-91, Convegno: WS-FM 2009, 4-5 September 2009 (ISBN 9783642144578) (ISSN 1611-3349)
    Link DOIURL correlato Link al documento: 10278/39898
  • BUGLIESI M.; FOCARDI R (2009), Security Abstractions and Intruder Models , Proceedings of the 15th Workshop on Expressiveness in Concurrency (EXPRESS 2008), Toronto, Canada, vol. 242(1), pp. 99-112 (ISSN 1571-0661)
    Link al documento: 10278/29325
  • G. BERNARDI; M. BUGLIESI; D. MACEDONIO; ROSSI S. (2008), A Theory of Adaptable Contract-based Service Composition. , SYNASC 2008 10th Int. Symp. Symbolic and Numeric Computation., IEEE Computer Society, pp. 327-334, Convegno: SYNASC 2008 10th Int. Symp. Symbolic and Numeric Computation., 26 - 29 Sept (ISBN 9780769535234)
    Link DOIURL correlato Link al documento: 10278/39503
  • BUGLIESI M.; FOCARDI; R (2008), Language Based Secure Communication , CSF 2008 - 21st IEEE Symposium on Computer Security Foundations, IEEE Computer Society, pp. 3-16, Convegno: 21st IEEE Symposium on Computer Security Foundations, 23 - 25 June 2008 (ISBN 9780769531823)
    Link al documento: 10278/19905
  • BUGLIESI M.; GIUNTI M (2007), Secure implementations of typed channel abstractions in Martin Hofmann, Matthias Felleisen, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2007, ACM Press, pp. 251-262, Convegno: 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2007, January 17-19, 2007 (ISBN 9781595935755)
    Link al documento: 10278/30693
  • M. BUGLIESI; D. MACEDONIO; ROSSI S. (2007), Static vs Dynamic Typing for Access Control in Pi-Calculus , Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings., vol. 4846, pp. 282-296, Convegno: ASIAN 2007 (ISBN 9783540769279) (ISSN 0302-9743)
    Link al documento: 10278/19385
  • BUGLIESI M.; FOCARDI R; MAFFEI M (2005), Analysis of Typed Analyses of Authentication Protocols , CSFW 2005 - Computer Security Foundation Workshop, IEEE, pp. 112-125, Convegno: CSFW 2005 - Computer Security Foundation Workshop, 20-22 June 2005 (ISBN 0769523404)
    Link al documento: 10278/5637
  • BUGLIESI M.; GIUNTI M (2005), Typed Processes in Untyped Contexts , Trustworthy Global Computing, International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005, Revised Selected Papers, vol. 3705, pp. 19-32, Convegno: TGC (ISBN 3540300074) (ISSN 0302-9743)
    Link al documento: 10278/17524
  • BUGLIESI M.; FOCARDI R.; MAFFEI M. (2004), Authenticity by tagging and typing , FMSE, ACM, pp. 1-12, Convegno: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering FMSE 2004, October 2004 (ISBN 9781581139716)
    Link al documento: 10278/5638
  • BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI (2004), Compositional Analysis of Authentication Protocols , Programming Languages and Systems, 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings., vol. 2986, pp. 140-154 (ISBN 3540213139) (ISSN 0302-9743)
    Link al documento: 10278/23344
  • BUGLIESI M.; COLAZZO D; CRAFA S (2004), Type Based Discretionary Access Control , CONCUR 2004 - Concurrency Theory, 15th International Conference, London, UK, August 31 - September 3, 2004, Proceedings., vol. 3170, pp. 225-239 (ISBN 354022940X) (ISSN 0302-9743)
    Link al documento: 10278/12503
  • FRANCO BARBANERA; BUGLIESI M.; MARIANGIOLA DEZANI-CIANCAGLINI; VLADIMIRO SASSONE (2003), A Calculus of Bounded Capacities , Advances in Computing Science - ASIAN 2003 Programming Languages and Distributed Computation, 8th Asian Computing Science Conference, Mumbai, India, December 10-14, 2003, Proceedings., vol. 2096, pp. 205-223 (ISBN 3540206329) (ISSN 0302-9743)
    Link al documento: 10278/12504
  • BUGLIESI M; CECCATO A; ROSSI S. (2003), Context-Sensitive Equivalences for Non-Interference based Protocol Analysis , Fundamentals of Computation Theory, 14th International Symposium, FCT 2003, Malmö, Sweden, August 12-15, 2003, Proceedings., vol. 2751, pp. 364-375 (ISBN 3540405437) (ISSN 0302-9743)
    Link al documento: 10278/23191
  • BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI (2003), Principles for Entity Authentication , Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers, vol. 2890, pp. 294-306 (ISBN 3540208135) (ISSN 0302-9743)
    Link al documento: 10278/13496
  • BUGLIESI M.; CRAFA S; PRELIC A; SASSONE V (2003), Secrecy in Untrusted Networks , Automata, Languages and Programming, 30th International Colloquium, ICALP 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003. Proceedings, vol. 2719, pp. 969-983 (ISBN 3540404937) (ISSN 0302-9743)
    Link al documento: 10278/12502
  • BUGLIESI M.; CRAFA S; MERRO M; SASSONE V (2002), Communication Interference in Mobile Boxed Ambient , FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, December 12-14, 2002, Proceedings., vol. 2556, pp. 71-84 (ISBN 3540002251) (ISSN 0302-9743)
    Link al documento: 10278/12505
  • BUGLIESI M.; CASTAGNA G; CRAFA S (2001), Boxed Ambients , Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, Sendai, Japan, October 29-31, 2001, Proceedings., vol. 2215, pp. 38-63 (ISBN 3540427368) (ISSN 0302-9743)
    Link al documento: 10278/12506
  • BUGLIESI M.; CASTAGNA G; CRAFA S (2001), Reasoning about Security in Mobile Ambients , CONCUR 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings, vol. 2154, pp. 102-120 (ISBN 3540424970) (ISSN 0302-9743)
    Link al documento: 10278/12380
  • BUGLIESI M.; CASTAGNA G. (2001), Secure Safe Ambients , ACM SIGPLAN Notices, ACM, vol. 36(3), pp. 222-235, Convegno: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 17-19, 2001 (ISBN 9781581133363)
    Link al documento: 10278/5636
  • BUGLIESI M.; GIUSEPPE CASTAGNA; SILVIA CRAFA (2001), Subtyping and Matching for Mobile Objects , Theoretical Computer Science, 7th Italian Conference, ICTCS 2001, Torino, Italy, October 4-6, 2001, Proceedings, vol. 2202, pp. 235-255 (ISBN 3540426728) (ISSN 0302-9743)
    Link al documento: 10278/12381
  • BUGLIESI M.; CASTAGNA G; CRAFA S (2000), Typed Mobile Objects , CONCUR 2000 - Concurrency Theory, 11th International Conference, University Park, PA, USA, August 22-25, 2000, Proceedings., vol. 1877, pp. 504-520 (ISBN 3540678972) (ISSN 0302-9743)
    Link al documento: 10278/12499
Curatela
  • (a cura di) BUGLIESI M.; PRENEEL B; SASSONE V; WEGENER I; EDITORS (2006), Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I , Springer-Verlag, vol. 4051 (ISBN 9783540359074)
    Link al documento: 10278/5119
  • (a cura di) BUGLIESI M.; PRENEEL B; SASSONE V; WEGENER I; EDITORS (2006), Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II , Springer-Verlag, vol. 4052 (ISBN 9783540359043)
    Link al documento: 10278/5120
  • (a cura di) BONO V; DROSSOPOULOU S; BUGLIESI M. (2005), Second Workshop on Object Oriented Developments (WOOD 2004) , Elsevier, vol. 138(2)
    Link al documento: 10278/17525
  • (a cura di) BONO V; BUGLIESI M.; DROSSOPOULOU S (2003), First Workshop on Object Oriented Developments (WOOD 2003) , Elsevier, vol. 82(2)
    Link al documento: 10278/17526
Rapporto di ricerca
  • G. Maggiore; R. Orsini; M. Bugliesi (2011), Casanova: a declarative language for safe games , Venezia, Dipartimento di Scienze Ambientali Informatica e Statistica, vol. DAIS-2011-7, pp. 1-34
    Link al documento: 10278/32310