The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michele Bugliesi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michele Bugliesi
    A Declarative View of Inheritance in Logic Programming. [Citation Graph (3, 0)][DBLP]
    JICSLP, 1992, pp:113-127 [Conf]
  2. Michele Bugliesi, Hasan M. Jamil
    A Stable Model Semantics for Behavioral Inheritance in Deductive Object Oriented Languages. [Citation Graph (2, 9)][DBLP]
    ICDT, 1995, pp:222-237 [Conf]
  3. Michele Bugliesi, Hasan M. Jamil
    A Logic for Encapsulation in Object Oriented Languages. [Citation Graph (2, 0)][DBLP]
    PLILP, 1994, pp:215-229 [Conf]
  4. Michele Bugliesi, Hasan M. Jamil
    A Logic for Encapsulation in Object-Oriented Languages. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE (2), 1994, pp:161-175 [Conf]
  5. Annalisa Bossi, Michele Bugliesi, Massimo Fabris
    A New Fixpoint Semantics for Prolog. [Citation Graph (0, 0)][DBLP]
    GULP, 1993, pp:617-632 [Conf]
  6. Franco Barbanera, Michele Bugliesi, Mariangiola Dezani-Ciancaglini, Vladimiro Sassone
    A Calculus of Bounded Capacities. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2003, pp:205-223 [Conf]
  7. Marco Bellia, Michele Bugliesi, M. Eugenia Occhiuto
    Combinatory Forms for Equational Programming: Instances, Unification and Narrowing. [Citation Graph (0, 0)][DBLP]
    CAAP, 1990, pp:42-56 [Conf]
  8. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Authenticity by tagging and typing. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:1-12 [Conf]
  9. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
    Typed Mobile Objects. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2000, pp:504-520 [Conf]
  10. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
    Reasoning about Security in Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2001, pp:102-120 [Conf]
  11. Michele Bugliesi, Dario Colazzo, Silvia Crafa
    Type Based Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2004, pp:225-239 [Conf]
  12. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:112-125 [Conf]
  13. Michele Bugliesi
    On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction. [Citation Graph (0, 0)][DBLP]
    ELP, 1992, pp:205-215 [Conf]
  14. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Principles for Entity Authentication. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2003, pp:294-306 [Conf]
  15. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Compositional Analysis of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:140-154 [Conf]
  16. Michele Bugliesi, Ambra Ceccato, Sabina Rossi
    Context-Sensitive Equivalences for Non-interference Based Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FCT, 2003, pp:364-375 [Conf]
  17. Viviana Bono, Michele Bugliesi
    Interpretations of Extensible Objects and Types. [Citation Graph (0, 0)][DBLP]
    FCT, 1999, pp:112-123 [Conf]
  18. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone
    A Survey of Name-Passing Calculi and Crypto-Primitives. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:91-138 [Conf]
  19. Michele Bugliesi, Silvia Crafa, Massimo Merro, Vladimiro Sassone
    Communication Interference in Mobile Boxed Ambients. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2002, pp:71-84 [Conf]
  20. Michele Bugliesi, Silvia Crafa, Amela Prelic, Vladimiro Sassone
    Secrecy in Untrusted Networks. [Citation Graph (0, 0)][DBLP]
    ICALP, 2003, pp:969-983 [Conf]
  21. Annalisa Bossi, Michele Bugliesi, Massimo Fabris
    A New Fixpoint Semantics for Prolog. [Citation Graph (0, 0)][DBLP]
    ICLP, 1993, pp:374-389 [Conf]
  22. Michele Bugliesi, Giorgio Delzanno, Luigi Liquori, Maurizio Martelli
    A Linear Logic Calculus Objects. [Citation Graph (0, 0)][DBLP]
    JICSLP, 1996, pp:67-81 [Conf]
  23. Michele Bugliesi, Giuseppe Nardiello
    SelfLog: Language and Implementation. [Citation Graph (0, 0)][DBLP]
    ICLP-Workshops on Implementation of Logic Programming Systems, 1993, pp:1-15 [Conf]
  24. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
    Subtyping and Matching for Mobile Objects. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2001, pp:235-255 [Conf]
  25. Viviana Bono, Michele Bugliesi, Luigi Liquori
    A Lambda Calculus of Incomplete Objects. [Citation Graph (0, 0)][DBLP]
    MFCS, 1996, pp:218-229 [Conf]
  26. Michele Bugliesi, Giuseppe Nardiello
    SelfLog: Language and Implementation. [Citation Graph (0, 0)][DBLP]
    PLILP, 1993, pp:412-413 [Conf]
  27. Annalisa Bossi, Michele Bugliesi
    Differential Logic Programming. [Citation Graph (0, 0)][DBLP]
    POPL, 1993, pp:359-370 [Conf]
  28. Michele Bugliesi, Giuseppe Castagna
    Secure safe ambients. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:222-235 [Conf]
  29. Michele Bugliesi, Marco Giunti
    Secure implementations of typed channel abstractions. [Citation Graph (0, 0)][DBLP]
    POPL, 2007, pp:251-262 [Conf]
  30. Michele Bugliesi, Evelina Lamma, Paola Mello
    Partial Evaluation for Hierarchies of Logic Theories. [Citation Graph (0, 0)][DBLP]
    NACLP, 1990, pp:359-376 [Conf]
  31. Michele Bugliesi, F. Russo
    Partial Evaluation in Prolog: Some Improvements about Cut. [Citation Graph (0, 0)][DBLP]
    NACLP, 1989, pp:645-660 [Conf]
  32. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
    Boxed Ambients. [Citation Graph (0, 0)][DBLP]
    TACS, 2001, pp:38-63 [Conf]
  33. Viviana Bono, Michele Bugliesi, Mariangiola Dezani-Ciancaglini, Luigi Liquori
    Subtyping Constraints for Incomplete Objects (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:465-477 [Conf]
  34. Michele Bugliesi, Marco Giunti
    Typed Processes in Untyped Contexts. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:19-32 [Conf]
  35. Viviana Bono, Michele Bugliesi
    Matching Constraints for the Lambda Calculus of Objects. [Citation Graph (0, 0)][DBLP]
    TLCA, 1997, pp:46-62 [Conf]
  36. Michele Bugliesi, Giuseppe Castagna
    Behavioural typing for safe ambients. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 2002, v:28, n:1, pp:61-99 [Journal]
  37. Michele Bugliesi, Anna Ciampolini, Evelina Lamma, Paola Mello
    Optimizing Modular Logic Languages. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1998, v:30, n:3es, pp:10- [Journal]
  38. Viviana Bono, Michele Bugliesi
    First Workshop on Object Oriented Developments. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:82, n:7, pp:- [Journal]
  39. Viviana Bono, Michele Bugliesi, Sophia Drossopoulou
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:138, n:2, pp:1-2 [Journal]
  40. Giuseppe Castagna, Michele Bugliesi, Silvia Crafa
    An overview of Boxed Ambients. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
  41. Silvia Crafa, Michele Bugliesi, Giuseppe Castagna
    Information Flow Security for Boxed Ambients. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:66, n:3, pp:- [Journal]
  42. Viviana Bono, Michele Bugliesi, Mariangiola Dezani-Ciancaglini, Luigi Liquori
    A Subtyping for Extensible, Incomplete Objects. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1999, v:38, n:4, pp:325-364 [Journal]
  43. Michele Bugliesi, Silvia Crafa, Massimo Merro, Vladimiro Sassone
    Communication and mobility control in boxed ambients. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2005, v:202, n:1, pp:39-86 [Journal]
  44. Michele Bugliesi, Santiago M. Pericás-Geertsen
    Type Inference for Variant Object Types. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2002, v:177, n:1, pp:2-27 [Journal]
  45. Michele Bugliesi, Sabina Rossi
    Non-interference proof techniques for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:87-113 [Journal]
  46. Michele Bugliesi, Evelina Lamma, Paola Mello
    Partial Deduction for Structured Logic Programming. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1993, v:16, n:1, pp:89-122 [Journal]
  47. Michele Bugliesi, Evelina Lamma, Paola Mello
    Modularity in Logic Programming. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1994, v:19, n:, pp:443-502 [Journal]
  48. Michele Bugliesi, Giorgio Delzanno, Luigi Liquori, Maurizio Martelli
    Object calculi in linear logic. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2000, v:10, n:1, pp:75-104 [Journal]
  49. Annalisa Bossi, Michele Bugliesi, Maurizio Gabbrielli, Giorgio Levi, Maria Chiara Meo
    Differential Logic Programs: Programming Methodologies and Semantics. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1996, v:27, n:3, pp:217-262 [Journal]
  50. Viviana Bono, Michele Bugliesi
    Matching for the lambda Calculus of Objects. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:212, n:1-2, pp:101-140 [Journal]
  51. Franco Barbanera, Michele Bugliesi, Mariangiola Dezani-Ciancaglini, Vladimiro Sassone
    Space-aware ambients and processes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:373, n:1-2, pp:41-69 [Journal]
  52. Viviana Bono, Michele Bugliesi, Silvia Crafa
    Typed interpretations of extensible objects. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2002, v:3, n:4, pp:562-603 [Journal]
  53. Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
    Access control for mobile agents: The calculus of boxed ambients. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2004, v:26, n:1, pp:57-124 [Journal]
  54. Michele Bugliesi, Damiano Macedonio, Sabina Rossi
    Static vs Dynamic Typing for Access Control in Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:282-296 [Conf]

  55. Language Based Secure Communication. [Citation Graph (, )][DBLP]


  56. Compliance Preorders for Web Services. [Citation Graph (, )][DBLP]


  57. A Theory of Adaptable Contract-Based Service Composition. [Citation Graph (, )][DBLP]


  58. Security Abstractions and Intruder Models (Extended Abstract). [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.011secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002