Search the dblp DataBase
Michele Bugliesi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michele Bugliesi A Declarative View of Inheritance in Logic Programming. [Citation Graph (3, 0)][DBLP ] JICSLP, 1992, pp:113-127 [Conf ] Michele Bugliesi , Hasan M. Jamil A Stable Model Semantics for Behavioral Inheritance in Deductive Object Oriented Languages. [Citation Graph (2, 9)][DBLP ] ICDT, 1995, pp:222-237 [Conf ] Michele Bugliesi , Hasan M. Jamil A Logic for Encapsulation in Object Oriented Languages. [Citation Graph (2, 0)][DBLP ] PLILP, 1994, pp:215-229 [Conf ] Michele Bugliesi , Hasan M. Jamil A Logic for Encapsulation in Object-Oriented Languages. [Citation Graph (0, 0)][DBLP ] GULP-PRODE (2), 1994, pp:161-175 [Conf ] Annalisa Bossi , Michele Bugliesi , Massimo Fabris A New Fixpoint Semantics for Prolog. [Citation Graph (0, 0)][DBLP ] GULP, 1993, pp:617-632 [Conf ] Franco Barbanera , Michele Bugliesi , Mariangiola Dezani-Ciancaglini , Vladimiro Sassone A Calculus of Bounded Capacities. [Citation Graph (0, 0)][DBLP ] ASIAN, 2003, pp:205-223 [Conf ] Marco Bellia , Michele Bugliesi , M. Eugenia Occhiuto Combinatory Forms for Equational Programming: Instances, Unification and Narrowing. [Citation Graph (0, 0)][DBLP ] CAAP, 1990, pp:42-56 [Conf ] Michele Bugliesi , Riccardo Focardi , Matteo Maffei Authenticity by tagging and typing. [Citation Graph (0, 0)][DBLP ] FMSE, 2004, pp:1-12 [Conf ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa Typed Mobile Objects. [Citation Graph (0, 0)][DBLP ] CONCUR, 2000, pp:504-520 [Conf ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa Reasoning about Security in Mobile Ambients. [Citation Graph (0, 0)][DBLP ] CONCUR, 2001, pp:102-120 [Conf ] Michele Bugliesi , Dario Colazzo , Silvia Crafa Type Based Discretionary Access Control. [Citation Graph (0, 0)][DBLP ] CONCUR, 2004, pp:225-239 [Conf ] Michele Bugliesi , Riccardo Focardi , Matteo Maffei Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:112-125 [Conf ] Michele Bugliesi On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction. [Citation Graph (0, 0)][DBLP ] ELP, 1992, pp:205-215 [Conf ] Michele Bugliesi , Riccardo Focardi , Matteo Maffei Principles for Entity Authentication. [Citation Graph (0, 0)][DBLP ] Ershov Memorial Conference, 2003, pp:294-306 [Conf ] Michele Bugliesi , Riccardo Focardi , Matteo Maffei Compositional Analysis of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ESOP, 2004, pp:140-154 [Conf ] Michele Bugliesi , Ambra Ceccato , Sabina Rossi Context-Sensitive Equivalences for Non-interference Based Protocol Analysis. [Citation Graph (0, 0)][DBLP ] FCT, 2003, pp:364-375 [Conf ] Viviana Bono , Michele Bugliesi Interpretations of Extensible Objects and Types. [Citation Graph (0, 0)][DBLP ] FCT, 1999, pp:112-123 [Conf ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa , Riccardo Focardi , Vladimiro Sassone A Survey of Name-Passing Calculi and Crypto-Primitives. [Citation Graph (0, 0)][DBLP ] FOSAD, 2002, pp:91-138 [Conf ] Michele Bugliesi , Silvia Crafa , Massimo Merro , Vladimiro Sassone Communication Interference in Mobile Boxed Ambients. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2002, pp:71-84 [Conf ] Michele Bugliesi , Silvia Crafa , Amela Prelic , Vladimiro Sassone Secrecy in Untrusted Networks. [Citation Graph (0, 0)][DBLP ] ICALP, 2003, pp:969-983 [Conf ] Annalisa Bossi , Michele Bugliesi , Massimo Fabris A New Fixpoint Semantics for Prolog. [Citation Graph (0, 0)][DBLP ] ICLP, 1993, pp:374-389 [Conf ] Michele Bugliesi , Giorgio Delzanno , Luigi Liquori , Maurizio Martelli A Linear Logic Calculus Objects. [Citation Graph (0, 0)][DBLP ] JICSLP, 1996, pp:67-81 [Conf ] Michele Bugliesi , Giuseppe Nardiello SelfLog: Language and Implementation. [Citation Graph (0, 0)][DBLP ] ICLP-Workshops on Implementation of Logic Programming Systems, 1993, pp:1-15 [Conf ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa Subtyping and Matching for Mobile Objects. [Citation Graph (0, 0)][DBLP ] ICTCS, 2001, pp:235-255 [Conf ] Viviana Bono , Michele Bugliesi , Luigi Liquori A Lambda Calculus of Incomplete Objects. [Citation Graph (0, 0)][DBLP ] MFCS, 1996, pp:218-229 [Conf ] Michele Bugliesi , Giuseppe Nardiello SelfLog: Language and Implementation. [Citation Graph (0, 0)][DBLP ] PLILP, 1993, pp:412-413 [Conf ] Annalisa Bossi , Michele Bugliesi Differential Logic Programming. [Citation Graph (0, 0)][DBLP ] POPL, 1993, pp:359-370 [Conf ] Michele Bugliesi , Giuseppe Castagna Secure safe ambients. [Citation Graph (0, 0)][DBLP ] POPL, 2001, pp:222-235 [Conf ] Michele Bugliesi , Marco Giunti Secure implementations of typed channel abstractions. [Citation Graph (0, 0)][DBLP ] POPL, 2007, pp:251-262 [Conf ] Michele Bugliesi , Evelina Lamma , Paola Mello Partial Evaluation for Hierarchies of Logic Theories. [Citation Graph (0, 0)][DBLP ] NACLP, 1990, pp:359-376 [Conf ] Michele Bugliesi , F. Russo Partial Evaluation in Prolog: Some Improvements about Cut. [Citation Graph (0, 0)][DBLP ] NACLP, 1989, pp:645-660 [Conf ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa Boxed Ambients. [Citation Graph (0, 0)][DBLP ] TACS, 2001, pp:38-63 [Conf ] Viviana Bono , Michele Bugliesi , Mariangiola Dezani-Ciancaglini , Luigi Liquori Subtyping Constraints for Incomplete Objects (Extended Abstract). [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1997, pp:465-477 [Conf ] Michele Bugliesi , Marco Giunti Typed Processes in Untyped Contexts. [Citation Graph (0, 0)][DBLP ] TGC, 2005, pp:19-32 [Conf ] Viviana Bono , Michele Bugliesi Matching Constraints for the Lambda Calculus of Objects. [Citation Graph (0, 0)][DBLP ] TLCA, 1997, pp:46-62 [Conf ] Michele Bugliesi , Giuseppe Castagna Behavioural typing for safe ambients. [Citation Graph (0, 0)][DBLP ] Comput. Lang., 2002, v:28, n:1, pp:61-99 [Journal ] Michele Bugliesi , Anna Ciampolini , Evelina Lamma , Paola Mello Optimizing Modular Logic Languages. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1998, v:30, n:3es, pp:10- [Journal ] Viviana Bono , Michele Bugliesi First Workshop on Object Oriented Developments. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2003, v:82, n:7, pp:- [Journal ] Viviana Bono , Michele Bugliesi , Sophia Drossopoulou Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:138, n:2, pp:1-2 [Journal ] Giuseppe Castagna , Michele Bugliesi , Silvia Crafa An overview of Boxed Ambients. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal ] Silvia Crafa , Michele Bugliesi , Giuseppe Castagna Information Flow Security for Boxed Ambients. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2002, v:66, n:3, pp:- [Journal ] Viviana Bono , Michele Bugliesi , Mariangiola Dezani-Ciancaglini , Luigi Liquori A Subtyping for Extensible, Incomplete Objects. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 1999, v:38, n:4, pp:325-364 [Journal ] Michele Bugliesi , Silvia Crafa , Massimo Merro , Vladimiro Sassone Communication and mobility control in boxed ambients. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2005, v:202, n:1, pp:39-86 [Journal ] Michele Bugliesi , Santiago M. Pericás-Geertsen Type Inference for Variant Object Types. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2002, v:177, n:1, pp:2-27 [Journal ] Michele Bugliesi , Sabina Rossi Non-interference proof techniques for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:1, pp:87-113 [Journal ] Michele Bugliesi , Evelina Lamma , Paola Mello Partial Deduction for Structured Logic Programming. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 1993, v:16, n:1, pp:89-122 [Journal ] Michele Bugliesi , Evelina Lamma , Paola Mello Modularity in Logic Programming. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 1994, v:19, n:, pp:443-502 [Journal ] Michele Bugliesi , Giorgio Delzanno , Luigi Liquori , Maurizio Martelli Object calculi in linear logic. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 2000, v:10, n:1, pp:75-104 [Journal ] Annalisa Bossi , Michele Bugliesi , Maurizio Gabbrielli , Giorgio Levi , Maria Chiara Meo Differential Logic Programs: Programming Methodologies and Semantics. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1996, v:27, n:3, pp:217-262 [Journal ] Viviana Bono , Michele Bugliesi Matching for the lambda Calculus of Objects. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:212, n:1-2, pp:101-140 [Journal ] Franco Barbanera , Michele Bugliesi , Mariangiola Dezani-Ciancaglini , Vladimiro Sassone Space-aware ambients and processes. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:373, n:1-2, pp:41-69 [Journal ] Viviana Bono , Michele Bugliesi , Silvia Crafa Typed interpretations of extensible objects. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Log., 2002, v:3, n:4, pp:562-603 [Journal ] Michele Bugliesi , Giuseppe Castagna , Silvia Crafa Access control for mobile agents: The calculus of boxed ambients. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2004, v:26, n:1, pp:57-124 [Journal ] Michele Bugliesi , Damiano Macedonio , Sabina Rossi Static vs Dynamic Typing for Access Control in Pi-Calculus. [Citation Graph (0, 0)][DBLP ] ASIAN, 2007, pp:282-296 [Conf ] Language Based Secure Communication. [Citation Graph (, )][DBLP ] Compliance Preorders for Web Services. [Citation Graph (, )][DBLP ] A Theory of Adaptable Contract-Based Service Composition. [Citation Graph (, )][DBLP ] Security Abstractions and Intruder Models (Extended Abstract). [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs