Abstract
This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Barbuti, R., Degano, P., Levi, G.: Toward an inductionless technique for proving properties of logic programs. In: Proceedings of International Logic Programming Conference (ICLP 1982), pp. 175–181 (1982)
Bartoletti, M., Degano, P., Ferrari, G.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799–837 (2009)
Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Softw. Eng. 34(1), 33–49 (2008)
Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 1–43 (2009)
Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710–763 (2015)
Basile, D., Degano, P., Ferrari, G.: A formal framework for secure and complying services. J. Supercomputing 69(1), 43–52 (2014)
Bellia, M., Dameri, E., Degano, P., Levi, G., Martelli, M.: Applicative communicating processes in first order logic. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming. LNCS, vol. 137, pp. 1–14. Springer, Heidelberg (1982)
Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)
Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2), 271–304 (2002)
Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication primitives for secure protocol specifications. Future Gener. Comp. Syst. 21(4), 645–653 (2005)
Bodei, C., Degano, P., Galletta, L., Mezzetti, G., Ferrari, G.: Security in pervasive applications: a survey. Eur. J. Law Technol. 4(2), 15–31 (2013)
Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \(\pi \)-calculus with applications to security. Inf. Comput. 168(1), 68–92 (2001)
Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comp. Syst. 18(6), 747–756 (2002)
Bodei, C., Degano, P., Priami, C.: Names of the Pi-calculus agents handled locally. Theor. Comput. Sci. 253(2), 155–184 (2001)
Bodei, C., Degano, P., Priami, C.: Checking security policies through an enhanced control flow analysis. J. Comput. Secur. 13(1), 49–85 (2005)
Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1), 66–82 (2008)
Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S–4), 4 (2008)
Chiarugi, D., Degano, P., Van Klinken, J.B., Marangoni, R.: Cells in Silico: a Holistic approach. In: Zavattaro, G., Bernardo, M., Degano, P. (eds.) SFM 2008. LNCS, vol. 5016, pp. 366–386. Springer, Heidelberg (2008)
Chiarugi, D., Degano, P., Marangoni, R.: A computational approach to the functional screening of genomes. PLoS Comput. Biol. 3(9), e174 (2007)
Curti, M., Degano, P., Baldari, C.T.: Causal \(\pi \)-calculus for biochemical modelling. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 21–33. Springer, Heidelberg (2003)
Curti, M., Degano, P., Priami, C., Baldari, C.T.: Modelling biochemical pathways through enhanced \(\pi \)-calculus. Theor. Comput. Sci. 325(1), 111–140 (2004)
Darondeau, P., Degano, P.: Causal trees. In: Ausiello, G., Dezani-Ciancaglini, M., Rocca, S.R.D. (eds.) Automata, Languages and Programming. LNCS, vol. 372, pp. 234–248. Springer, Heidelberg (1989)
Degano, P., De Nicola, R., Montanari, U.: Partial ordering derivations for CCS. In: Budach, L. (ed.) Fundamentals of Computation Theory. LNCS, vol. 199, pp. 520–533. Springer, Heidelberg (1985)
Degano, P., De Nicola, R., Montanari, U.: CCS is an (augmented) contact free C/E system. In: Zilli, M.V. (ed.) Mathematical Models for the Semantics of Parallelism. LNCS, vol. 280, pp. 144–165. Springer, Heidelberg (1987)
Degano, P., De Nicola, R., Montanari, U.: A distributed operational semantics for CCS based on condition/event systems. Acta Inf. 26(1/2), 59–91 (1988)
Degano, P., De Nicola, R., Montanari, U.: A partial ordering semantics for CCS. Theor. Comput. Sci. 75(3), 223–262 (1990)
Degano, P., De Nicola, R., Montanari, U.: Universal axioms for bisimulations. Theor. Comput. Sci. 114(1), 63–91 (1993)
Degano, P., Ferrari, G.-L., Galletta, L.: A two-phase static analysis for reliable adaptation. In: Giannakopoulou, D., Salaün, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 347–362. Springer, Heidelberg (2014)
Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for coordinating secure behavioural variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 261–276. Springer, Heidelberg (2012)
Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Sato, M., Kleinberg, R.D. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000)
Degano, P., Montanari, U.: Liveness properties as convergence in metric spaces. In: Proceedings of the16th Annual ACM Symposium on Theory of Computing (STOC 1984), pp. 31–38. ACM (1984)
Degano, P., Montanari, U.: A model for distributed systems based on graph rewriting. J. ACM 34(2), 411–449 (1987)
Degano, P., Priami, C.: Proved trees. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 629–640. Springer, Heidelberg (1992)
Degano, P., Priami, C.: Enhanced operational semantics. ACM Comput. Surv. 28(2), 352–354 (1996)
Degano, P., Priami, C.: Non-interleaving semantics for mobile processes. Theor. Comput. Sci. 216(1–2), 237–270 (1999)
Degano, P., Priami, C.: Enhanced operational semantics in systems biology. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 178–181. Springer, Heidelberg (2003)
Degano, P., Sirovich, F.: An evaluation based theorem prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1), 70–79 (1985)
Gao, H., Bodei, C., Degano, P.: A formal analysis of complex type flaw attacks on security protocols. In: Meseguer, J., Roşu, G. (eds.) AMAST 2008. LNCS, vol. 5140, pp. 167–183. Springer, Heidelberg (2008)
Gao, H., Bodei, C., Degano, P., Riis Nielson, H.: A formal analysis for capturing replay attacks in cryptographic protocols. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 150–165. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bodei, C., Ferrari, GL., Priami, C. (2015). Pierpaolo Degano. In: Bodei, C., Ferrari, G., Priami, C. (eds) Programming Languages with Applications to Biology and Security. Lecture Notes in Computer Science(), vol 9465. Springer, Cham. https://doi.org/10.1007/978-3-319-25527-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-25527-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25526-2
Online ISBN: 978-3-319-25527-9
eBook Packages: Computer ScienceComputer Science (R0)