关注
Michele Bugliesi
Michele Bugliesi
Professor of Computer Science, Universita' Ca' Foscari Venezia
在 unive.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Modularity in logic programming
M Bugliesi, E Lamma, P Mello
The Journal of Logic Programming 19, 443-502, 1994
2001994
Boxed ambients
M Bugliesi, G Castagna, S Crafa
International Symposium on Theoretical Aspects of Computer Software, 38-63, 2001
1962001
Access control for mobile agents: The calculus of boxed ambients
M Bugliesi, G Castagna, S Crafa
ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (1), 57-124, 2004
1212004
Secure safe ambients
M Bugliesi, G Castagna
Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of …, 2001
972001
Content security problems? evaluating the effectiveness of content security policy in the wild
S Calzavara, A Rabitti, M Bugliesi
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
782016
Communication interference in mobile boxed ambients
M Bugliesi, S Crafa, M Merro, V Sassone
FST TCS 2002: Foundations of Software Technology and Theoretical Computer …, 2002
762002
Reasoning about security in mobile ambients
M Bugliesi, G Castagna, S Crafa
International Conference on Concurrency Theory, 102-120, 2001
642001
CookiExt: Patching the browser against session hijacking attacks
M Bugliesi, S Calzavara, R Focardi, W Khan
Journal of Computer Security 23 (4), 509-537, 2015
592015
A declarative view of inheritance in logic programming
M Bugliesi
591991
Formal methods for web security
M Bugliesi, S Calzavara, R Focardi
Journal of Logical and Algebraic Methods in Programming 87, 110-126, 2017
562017
Automata, languages and programming
C Dwork, M Bugliesi, B Preneel, V Sassone
33rd international colloquium, ICALP, 2006
562006
Communication and mobility control in boxed ambients
M Bugliesi, S Crafa, M Merro, V Sassone
Information and Computation 202 (1), 39-86, 2005
562005
Semantics-based analysis of content security policy deployment
S Calzavara, A Rabitti, M Bugliesi
ACM Transactions on the Web (TWEB) 12 (2), 1-36, 2018
542018
Information flow security for boxed ambients
S Crafa, M Bugliesi, G Castagna
Electronic Notes in Theoretical Computer Science 66 (3), 76-97, 2002
512002
Subtyping constraints for incomplete objects
V Bono, M Bugliesi, M Dezani-Ciancaglini, L Liquori
TAPSOFT'97: Theory and Practice of Software Development: 7th International …, 1997
421997
Lintent: Towards security type-checking of Android applications
M Bugliesi, S Calzavara, A Spanò
International Conference on Formal Methods for Open Object-Based Distributed …, 2013
412013
Authenticity by tagging and typing
M Bugliesi, R Focardi, M Maffei
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
402004
Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication
S Calzavara, G Tolomei, M Bugliesi, S Orlando
Proceedings of the 23rd international conference on World wide web, 189-200, 2014
382014
Differential logic programming
A Bossi, M Bugliesi, M Gabbrielli, G Levi, MC Meo
Proceedings of the 20th ACM SIGPLAN-SIGACT symposium on Principles of …, 1993
381993
Dynamic types for authentication
M Bugliesi, R Focardi, M Maffei
Journal of Computer Security 15 (6), 563-617, 2007
372007
系统目前无法执行此操作,请稍后再试。
文章 1–20