Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

Pierpaolo Degano

verfasst von : Chiara Bodei, Gian-Luigi Ferrari, Corrado Priami

Erschienen in: Programming Languages with Applications to Biology and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barbuti, R., Degano, P., Levi, G.: Toward an inductionless technique for proving properties of logic programs. In: Proceedings of International Logic Programming Conference (ICLP 1982), pp. 175–181 (1982) Barbuti, R., Degano, P., Levi, G.: Toward an inductionless technique for proving properties of logic programs. In: Proceedings of International Logic Programming Conference (ICLP 1982), pp. 175–181 (1982)
2.
Zurück zum Zitat Bartoletti, M., Degano, P., Ferrari, G.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799–837 (2009)CrossRef Bartoletti, M., Degano, P., Ferrari, G.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799–837 (2009)CrossRef
3.
Zurück zum Zitat Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Softw. Eng. 34(1), 33–49 (2008)CrossRef Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Softw. Eng. 34(1), 33–49 (2008)CrossRef
4.
Zurück zum Zitat Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 1–43 (2009)CrossRefMATH Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 1–43 (2009)CrossRefMATH
5.
Zurück zum Zitat Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710–763 (2015)MathSciNetCrossRefMATH Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710–763 (2015)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Basile, D., Degano, P., Ferrari, G.: A formal framework for secure and complying services. J. Supercomputing 69(1), 43–52 (2014)CrossRef Basile, D., Degano, P., Ferrari, G.: A formal framework for secure and complying services. J. Supercomputing 69(1), 43–52 (2014)CrossRef
7.
Zurück zum Zitat Bellia, M., Dameri, E., Degano, P., Levi, G., Martelli, M.: Applicative communicating processes in first order logic. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming. LNCS, vol. 137, pp. 1–14. Springer, Heidelberg (1982)CrossRef Bellia, M., Dameri, E., Degano, P., Levi, G., Martelli, M.: Applicative communicating processes in first order logic. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming. LNCS, vol. 137, pp. 1–14. Springer, Heidelberg (1982)CrossRef
8.
Zurück zum Zitat Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)CrossRef Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)CrossRef
9.
Zurück zum Zitat Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)MATH Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)MATH
10.
Zurück zum Zitat Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2), 271–304 (2002)MathSciNetCrossRefMATH Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2), 271–304 (2002)MathSciNetCrossRefMATH
11.
Zurück zum Zitat Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication primitives for secure protocol specifications. Future Gener. Comp. Syst. 21(4), 645–653 (2005)CrossRef Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication primitives for secure protocol specifications. Future Gener. Comp. Syst. 21(4), 645–653 (2005)CrossRef
12.
Zurück zum Zitat Bodei, C., Degano, P., Galletta, L., Mezzetti, G., Ferrari, G.: Security in pervasive applications: a survey. Eur. J. Law Technol. 4(2), 15–31 (2013) Bodei, C., Degano, P., Galletta, L., Mezzetti, G., Ferrari, G.: Security in pervasive applications: a survey. Eur. J. Law Technol. 4(2), 15–31 (2013)
13.
Zurück zum Zitat Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \(\pi \)-calculus with applications to security. Inf. Comput. 168(1), 68–92 (2001)MathSciNetCrossRefMATH Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \(\pi \)-calculus with applications to security. Inf. Comput. 168(1), 68–92 (2001)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comp. Syst. 18(6), 747–756 (2002)CrossRefMATH Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comp. Syst. 18(6), 747–756 (2002)CrossRefMATH
15.
Zurück zum Zitat Bodei, C., Degano, P., Priami, C.: Names of the Pi-calculus agents handled locally. Theor. Comput. Sci. 253(2), 155–184 (2001)MathSciNetCrossRefMATH Bodei, C., Degano, P., Priami, C.: Names of the Pi-calculus agents handled locally. Theor. Comput. Sci. 253(2), 155–184 (2001)MathSciNetCrossRefMATH
16.
Zurück zum Zitat Bodei, C., Degano, P., Priami, C.: Checking security policies through an enhanced control flow analysis. J. Comput. Secur. 13(1), 49–85 (2005)CrossRef Bodei, C., Degano, P., Priami, C.: Checking security policies through an enhanced control flow analysis. J. Comput. Secur. 13(1), 49–85 (2005)CrossRef
17.
Zurück zum Zitat Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1), 66–82 (2008)MathSciNetCrossRefMATH Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1), 66–82 (2008)MathSciNetCrossRefMATH
18.
Zurück zum Zitat Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S–4), 4 (2008) Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S–4), 4 (2008)
19.
Zurück zum Zitat Chiarugi, D., Degano, P., Van Klinken, J.B., Marangoni, R.: Cells in Silico: a Holistic approach. In: Zavattaro, G., Bernardo, M., Degano, P. (eds.) SFM 2008. LNCS, vol. 5016, pp. 366–386. Springer, Heidelberg (2008) CrossRef Chiarugi, D., Degano, P., Van Klinken, J.B., Marangoni, R.: Cells in Silico: a Holistic approach. In: Zavattaro, G., Bernardo, M., Degano, P. (eds.) SFM 2008. LNCS, vol. 5016, pp. 366–386. Springer, Heidelberg (2008) CrossRef
20.
Zurück zum Zitat Chiarugi, D., Degano, P., Marangoni, R.: A computational approach to the functional screening of genomes. PLoS Comput. Biol. 3(9), e174 (2007)MathSciNetCrossRef Chiarugi, D., Degano, P., Marangoni, R.: A computational approach to the functional screening of genomes. PLoS Comput. Biol. 3(9), e174 (2007)MathSciNetCrossRef
21.
Zurück zum Zitat Curti, M., Degano, P., Baldari, C.T.: Causal \(\pi \)-calculus for biochemical modelling. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 21–33. Springer, Heidelberg (2003) CrossRef Curti, M., Degano, P., Baldari, C.T.: Causal \(\pi \)-calculus for biochemical modelling. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 21–33. Springer, Heidelberg (2003) CrossRef
22.
Zurück zum Zitat Curti, M., Degano, P., Priami, C., Baldari, C.T.: Modelling biochemical pathways through enhanced \(\pi \)-calculus. Theor. Comput. Sci. 325(1), 111–140 (2004)MathSciNetCrossRefMATH Curti, M., Degano, P., Priami, C., Baldari, C.T.: Modelling biochemical pathways through enhanced \(\pi \)-calculus. Theor. Comput. Sci. 325(1), 111–140 (2004)MathSciNetCrossRefMATH
23.
Zurück zum Zitat Darondeau, P., Degano, P.: Causal trees. In: Ausiello, G., Dezani-Ciancaglini, M., Rocca, S.R.D. (eds.) Automata, Languages and Programming. LNCS, vol. 372, pp. 234–248. Springer, Heidelberg (1989) CrossRef Darondeau, P., Degano, P.: Causal trees. In: Ausiello, G., Dezani-Ciancaglini, M., Rocca, S.R.D. (eds.) Automata, Languages and Programming. LNCS, vol. 372, pp. 234–248. Springer, Heidelberg (1989) CrossRef
24.
Zurück zum Zitat Degano, P., De Nicola, R., Montanari, U.: Partial ordering derivations for CCS. In: Budach, L. (ed.) Fundamentals of Computation Theory. LNCS, vol. 199, pp. 520–533. Springer, Heidelberg (1985) CrossRef Degano, P., De Nicola, R., Montanari, U.: Partial ordering derivations for CCS. In: Budach, L. (ed.) Fundamentals of Computation Theory. LNCS, vol. 199, pp. 520–533. Springer, Heidelberg (1985) CrossRef
25.
Zurück zum Zitat Degano, P., De Nicola, R., Montanari, U.: CCS is an (augmented) contact free C/E system. In: Zilli, M.V. (ed.) Mathematical Models for the Semantics of Parallelism. LNCS, vol. 280, pp. 144–165. Springer, Heidelberg (1987) CrossRef Degano, P., De Nicola, R., Montanari, U.: CCS is an (augmented) contact free C/E system. In: Zilli, M.V. (ed.) Mathematical Models for the Semantics of Parallelism. LNCS, vol. 280, pp. 144–165. Springer, Heidelberg (1987) CrossRef
26.
Zurück zum Zitat Degano, P., De Nicola, R., Montanari, U.: A distributed operational semantics for CCS based on condition/event systems. Acta Inf. 26(1/2), 59–91 (1988)MathSciNetCrossRefMATH Degano, P., De Nicola, R., Montanari, U.: A distributed operational semantics for CCS based on condition/event systems. Acta Inf. 26(1/2), 59–91 (1988)MathSciNetCrossRefMATH
27.
28.
29.
Zurück zum Zitat Degano, P., Ferrari, G.-L., Galletta, L.: A two-phase static analysis for reliable adaptation. In: Giannakopoulou, D., Salaün, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 347–362. Springer, Heidelberg (2014) Degano, P., Ferrari, G.-L., Galletta, L.: A two-phase static analysis for reliable adaptation. In: Giannakopoulou, D., Salaün, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 347–362. Springer, Heidelberg (2014)
30.
Zurück zum Zitat Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for coordinating secure behavioural variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 261–276. Springer, Heidelberg (2012) CrossRef Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for coordinating secure behavioural variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 261–276. Springer, Heidelberg (2012) CrossRef
31.
Zurück zum Zitat Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Sato, M., Kleinberg, R.D. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000) CrossRef Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Sato, M., Kleinberg, R.D. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000) CrossRef
32.
Zurück zum Zitat Degano, P., Montanari, U.: Liveness properties as convergence in metric spaces. In: Proceedings of the16th Annual ACM Symposium on Theory of Computing (STOC 1984), pp. 31–38. ACM (1984) Degano, P., Montanari, U.: Liveness properties as convergence in metric spaces. In: Proceedings of the16th Annual ACM Symposium on Theory of Computing (STOC 1984), pp. 31–38. ACM (1984)
33.
Zurück zum Zitat Degano, P., Montanari, U.: A model for distributed systems based on graph rewriting. J. ACM 34(2), 411–449 (1987)MathSciNetCrossRef Degano, P., Montanari, U.: A model for distributed systems based on graph rewriting. J. ACM 34(2), 411–449 (1987)MathSciNetCrossRef
34.
Zurück zum Zitat Degano, P., Priami, C.: Proved trees. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 629–640. Springer, Heidelberg (1992) CrossRef Degano, P., Priami, C.: Proved trees. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 629–640. Springer, Heidelberg (1992) CrossRef
35.
Zurück zum Zitat Degano, P., Priami, C.: Enhanced operational semantics. ACM Comput. Surv. 28(2), 352–354 (1996)CrossRefMATH Degano, P., Priami, C.: Enhanced operational semantics. ACM Comput. Surv. 28(2), 352–354 (1996)CrossRefMATH
36.
37.
Zurück zum Zitat Degano, P., Priami, C.: Enhanced operational semantics in systems biology. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 178–181. Springer, Heidelberg (2003) CrossRef Degano, P., Priami, C.: Enhanced operational semantics in systems biology. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 178–181. Springer, Heidelberg (2003) CrossRef
38.
Zurück zum Zitat Degano, P., Sirovich, F.: An evaluation based theorem prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1), 70–79 (1985)CrossRefMATH Degano, P., Sirovich, F.: An evaluation based theorem prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1), 70–79 (1985)CrossRefMATH
39.
Zurück zum Zitat Gao, H., Bodei, C., Degano, P.: A formal analysis of complex type flaw attacks on security protocols. In: Meseguer, J., Roşu, G. (eds.) AMAST 2008. LNCS, vol. 5140, pp. 167–183. Springer, Heidelberg (2008) CrossRef Gao, H., Bodei, C., Degano, P.: A formal analysis of complex type flaw attacks on security protocols. In: Meseguer, J., Roşu, G. (eds.) AMAST 2008. LNCS, vol. 5140, pp. 167–183. Springer, Heidelberg (2008) CrossRef
40.
Zurück zum Zitat Gao, H., Bodei, C., Degano, P., Riis Nielson, H.: A formal analysis for capturing replay attacks in cryptographic protocols. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 150–165. Springer, Heidelberg (2007) Gao, H., Bodei, C., Degano, P., Riis Nielson, H.: A formal analysis for capturing replay attacks in cryptographic protocols. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 150–165. Springer, Heidelberg (2007)
Metadaten
Titel
Pierpaolo Degano
verfasst von
Chiara Bodei
Gian-Luigi Ferrari
Corrado Priami
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-25527-9_1