This shows you the differences between two versions of the page.
wp5_list [2016/03/19 19:09] imt created |
wp5_list [2016/03/19 19:13] imt |
||
---|---|---|---|
Line 2: | Line 2: | ||
A. Celestini, A. Lluch-Lafuente, P. Mayer, S. Sebastio, F. Tiezzi: Reputation-Based Cooperation in the Clouds. IFIPTM 2014: 213-220, IFIP | A. Celestini, A. Lluch-Lafuente, P. Mayer, S. Sebastio, F. Tiezzi: Reputation-Based Cooperation in the Clouds. IFIPTM 2014: 213-220, IFIP | ||
+ | |||
+ | A. Ciaffaglione and I. Scagnetto. Revisiting the bookkeeping technique in HOAS-based encodings. In TYPES 2013 Book of Abstracts. Toulouse (IRIT - CNRS), April 22--26, 2013. | ||
+ | |||
+ | A. Ciaffaglione, I. Scagnetto. Internal Adequacy of Bookkeeping in Coq. LFMTP 2014: 8: 1-8: 8 | ||
+ | |||
+ | A. Ciaffaglione, I. Scagnetto. Mechanizing type environments in weak HOAS. Theor. Comput. Sci. 606: 57-78 (2015) | ||
A. Margheri, M. Masi, R. Pugliese, F. Tiezzi: Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - A Practical Approach. WS-FM 2013: 85-105, Lecture Notes in Computer Science 8379, Springer 2014. | A. Margheri, M. Masi, R. Pugliese, F. Tiezzi: Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - A Practical Approach. WS-FM 2013: 85-105, Lecture Notes in Computer Science 8379, Springer 2014. | ||
Line 9: | Line 15: | ||
A. Margheri, R. Pugliese, F. Tiezzi: On Properties of Policy-Based Specifications. WWV 2015: 33-50, EPTCS 188, 2015. | A. Margheri, R. Pugliese, F. Tiezzi: On Properties of Policy-Based Specifications. WWV 2015: 33-50, EPTCS 188, 2015. | ||
Advances in Information and Communication Technology 430, Springer 2014. | Advances in Information and Communication Technology 430, Springer 2014. | ||
+ | |||
+ | C. Maiero and M. Miculan: Unobservable intrusion detection based on call traces in paravirtualized systems. In Javier Lopez and Pierangela Samarati, editors, Proc. SECRYPT. SciTePress, 2011. | ||
D. B. Abeywickrama, N. B. Serbedzija, M. Loreti: Monitoring and visualizing adaptation of autonomic systems at runtime. SAC 2015: 1857-1860, ACM, 2015. | D. B. Abeywickrama, N. B. Serbedzija, M. Loreti: Monitoring and visualizing adaptation of autonomic systems at runtime. SAC 2015: 1857-1860, ACM, 2015. | ||
Line 15: | Line 23: | ||
F. De Angelis, M. R. Di Berardini, H. Muccini, A. Polini: CASSANDRA: An Online Failure Prediction Strategy for Dynamically Evolving Systems. ICFEM 2014: 107-122, Lecture Notes in Computer Science 8829, Springer, 2014. | F. De Angelis, M. R. Di Berardini, H. Muccini, A. Polini: CASSANDRA: An Online Failure Prediction Strategy for Dynamically Evolving Systems. ICFEM 2014: 107-122, Lecture Notes in Computer Science 8829, Springer, 2014. | ||
+ | |||
+ | F. Honsell, L. Liquori, I. Scagnetto. Lax F: Side Conditions and External Evidence as Monads. MFCS (1) 2014: 327-339 | ||
+ | |||
+ | F. Honsell, L. Liquori, P. Maksimovic, I. Scagnetto. Gluing together Proof Environments: Canonical extensions of LF Type Theories featuring Locks. LFMTP 2015: 3-17 | ||
+ | |||
+ | F. Honsell, M. Lenisa, L. Liquori, P. Maksimovic and I. Scagnetto. An Open Logical Framework. J Logic Computation (2016) 26 (1): 293-335 doi: 10.1093/logcom/ext028, First published online: July 31, 2013. | ||
L. Nenzi, L. Bortolussi, V. Ciancia, M. Loreti, M. Massink: Qualitative and Quantitative Monitoring of Spatio-Temporal Properties. RV 2015: 21-37, Lecture Notes in Computer Science, 9333, Springer. | L. Nenzi, L. Bortolussi, V. Ciancia, M. Loreti, M. Massink: Qualitative and Quantitative Monitoring of Spatio-Temporal Properties. RV 2015: 21-37, Lecture Notes in Computer Science, 9333, Springer. | ||
M. Loreti, A. Margheri, R. Pugliese, F. Tiezzi: On Programming and Policing Autonomic Computing Systems. ISoLA (1) 2014: 164-183, Lecture Notes in Computer Science 8802, Springer 2014. | M. Loreti, A. Margheri, R. Pugliese, F. Tiezzi: On Programming and Policing Autonomic Computing Systems. ISoLA (1) 2014: 164-183, Lecture Notes in Computer Science 8802, Springer 2014. | ||
+ | |||
+ | M. Miculan and Caterina Urban: Formal analysis of Facebook Connect single sign-on authentication protocol. In SofSem 2011, Proceedings of Student Research Forum, pages 99–116. OKAT, 2011. | ||
+ | |||
+ | M. Miculan and M. Paviotti: Synthesis of distributed mobile programs using monadic types in coq. In L. Beringer and A. Felty, editors, Third Inter- national Conference on Interactive Theorem Proving, ITP 2012, volume 7406 of Lecture Notes in Computer Science, pages 183–200. Springer, 2012. | ||
R. Vigo, A. Celestini, F. Tiezzi, R. De Nicola, F. Nielson, H.R. Nielson: Trust-Based Enforcement of Security Policies. TGC 2014: 176-191, Lecture Notes in Computer Science 8902, Springer 2014. | R. Vigo, A. Celestini, F. Tiezzi, R. De Nicola, F. Nielson, H.R. Nielson: Trust-Based Enforcement of Security Policies. TGC 2014: 176-191, Lecture Notes in Computer Science 8902, Springer 2014. |