default search action
Chiara Bodei
- > Home > Persons > Chiara Bodei
Publications
- 2021
- [j26]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [j25]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Modelling and analysing IoT systems. J. Parallel Distributed Comput. 157: 233-242 (2021) - 2020
- [j23]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [c49]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Security Metrics at Work on the Things in IoT Systems. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 233-255 - 2019
- [j20]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Programming in a context-aware language. J. Supercomput. 75(12): 7750-7764 (2019) - [c48]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Revealing the Trajectories of KLAIM Tuples, Statically. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 437-454 - 2018
- [c45]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c44]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c43]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c42]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - 2017
- [j19]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. Log. Methods Comput. Sci. 13(3) (2017) - [c40]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Experimenting with a Context-Aware Language. PaCT 2017: 3-17 - [c39]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto:
Tool Supported Analysis of IoT. ICE@DisCoTec 2017: 37-56 - 2016
- [j16]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. J. Comput. Secur. 24(4): 427-477 (2016) - [c38]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Last Mile's Resources. Semantics, Logics, and Calculi 2016: 33-53 - [c37]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Where Do Your IoT Ingredients Come From? COORDINATION 2016: 35-50 - [c35]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Step Towards Checking Security in IoT. ICE 2016: 128-142 - [i2]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. CoRR abs/1610.08419 (2016) - 2014
- [c31]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Linguistic Mechanisms for Context-Aware Security. ICTAC 2014: 61-79 - 2013
- [j12]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Gianluca Mezzetti, Gianluigi Ferrari:
Security in Pervasive Applications: A Survey. Eur. J. Law Technol. 4(2) (2013) - 2012
- [c29]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. CISIM 2012: 1-29 - 2010
- [j11]Chiara Bodei, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2): 229-264 (2010) - 2008
- [c21]Han Gao, Chiara Bodei, Pierpaolo Degano:
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. AMAST 2008: 167-183 - 2007
- [c19]Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. ASIAN 2007: 150-165 - [c17]Chiara Bodei, Pierpaolo Degano, Han Gao, Linda Brodo:
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. SecCO@CONCUR 2007: 3-22 - 2005
- [j8]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication primitives for secure protocol specifications. Future Gener. Comput. Syst. 21(4): 645-653 (2005) - [j7]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Checking security policies through an enhanced Control Flow Analysis. J. Comput. Secur. 13(1): 49-85 (2005) - [j6]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static validation of security protocols. J. Comput. Secur. 13(3): 347-390 (2005) - [c15]Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
On Evaluating the Performance of Security Protocols. PaCT 2005: 1-15 - 2004
- [c13]Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami:
A Quantitative Study of Two Attacks. WISP@ICATPN 2004: 65-85 - [c12]Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
Performance Evaluation of Security Protocols Specified in LySa. QAPL 2004: 167-189 - 2003
- [c11]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Automatic Validation of Protocol Narration. CSFW 2003: 126-140 - [c10]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65 - 2002
- [j5]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comput. Syst. 18(6): 747-756 (2002) - [j4]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002) - 2001
- [j3]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for the pi-Calculus with Applications to Security. Inf. Comput. 168(1): 68-92 (2001) - [j2]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Names of the -calculus agents handled locally. Theor. Comput. Sci. 253(2): 155-184 (2001) - [c9]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for Secrecy and Non-interference in Networks of Processes. PaCT 2001: 27-41 - [c8]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. TOSCA 2001: 211-228 - [p1]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis Using Flow Logics. Current Trends in Theoretical Computer Science 2001: 525-542 - 2000
- [j1]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis using Flow Logics. Bull. EATCS 70: 112-130 (2000) - [c7]Pierpaolo Degano, Francesca Levi, Chiara Bodei:
Safe Ambients: Control Flow Analysis and Security. ASIAN 2000: 199-214 - 1999
- [c6]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication via Localized Names. CSFW 1999: 98-110 - [c5]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis of Processes for No and Read-Up nad No Write-Down. FoSSaCS 1999: 120-134 - 1998
- [c4]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Control Flow Analysis for the pi-calculus. CONCUR 1998: 84-98 - [c3]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation. SAS 1998: 168-183 - 1996
- [c1]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Mobile Processes with a Distributed Environment. ICALP 1996: 490-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-12 03:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint