Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9465))

  • 967 Accesses

Abstract

This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barbuti, R., Degano, P., Levi, G.: Toward an inductionless technique for proving properties of logic programs. In: Proceedings of International Logic Programming Conference (ICLP 1982), pp. 175–181 (1982)

    Google Scholar 

  2. Bartoletti, M., Degano, P., Ferrari, G.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799–837 (2009)

    Article  Google Scholar 

  3. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Softw. Eng. 34(1), 33–49 (2008)

    Article  Google Scholar 

  4. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 1–43 (2009)

    Article  MATH  Google Scholar 

  5. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710–763 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  6. Basile, D., Degano, P., Ferrari, G.: A formal framework for secure and complying services. J. Supercomputing 69(1), 43–52 (2014)

    Article  Google Scholar 

  7. Bellia, M., Dameri, E., Degano, P., Levi, G., Martelli, M.: Applicative communicating processes in first order logic. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming. LNCS, vol. 137, pp. 1–14. Springer, Heidelberg (1982)

    Chapter  Google Scholar 

  8. Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)

    Article  Google Scholar 

  9. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)

    MATH  Google Scholar 

  10. Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2), 271–304 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  11. Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication primitives for secure protocol specifications. Future Gener. Comp. Syst. 21(4), 645–653 (2005)

    Article  Google Scholar 

  12. Bodei, C., Degano, P., Galletta, L., Mezzetti, G., Ferrari, G.: Security in pervasive applications: a survey. Eur. J. Law Technol. 4(2), 15–31 (2013)

    Google Scholar 

  13. Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \(\pi \)-calculus with applications to security. Inf. Comput. 168(1), 68–92 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  14. Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comp. Syst. 18(6), 747–756 (2002)

    Article  MATH  Google Scholar 

  15. Bodei, C., Degano, P., Priami, C.: Names of the Pi-calculus agents handled locally. Theor. Comput. Sci. 253(2), 155–184 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  16. Bodei, C., Degano, P., Priami, C.: Checking security policies through an enhanced control flow analysis. J. Comput. Secur. 13(1), 49–85 (2005)

    Article  Google Scholar 

  17. Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1), 66–82 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S–4), 4 (2008)

    Google Scholar 

  19. Chiarugi, D., Degano, P., Van Klinken, J.B., Marangoni, R.: Cells in Silico: a Holistic approach. In: Zavattaro, G., Bernardo, M., Degano, P. (eds.) SFM 2008. LNCS, vol. 5016, pp. 366–386. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Chiarugi, D., Degano, P., Marangoni, R.: A computational approach to the functional screening of genomes. PLoS Comput. Biol. 3(9), e174 (2007)

    Article  MathSciNet  Google Scholar 

  21. Curti, M., Degano, P., Baldari, C.T.: Causal \(\pi \)-calculus for biochemical modelling. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 21–33. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  22. Curti, M., Degano, P., Priami, C., Baldari, C.T.: Modelling biochemical pathways through enhanced \(\pi \)-calculus. Theor. Comput. Sci. 325(1), 111–140 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  23. Darondeau, P., Degano, P.: Causal trees. In: Ausiello, G., Dezani-Ciancaglini, M., Rocca, S.R.D. (eds.) Automata, Languages and Programming. LNCS, vol. 372, pp. 234–248. Springer, Heidelberg (1989)

    Chapter  Google Scholar 

  24. Degano, P., De Nicola, R., Montanari, U.: Partial ordering derivations for CCS. In: Budach, L. (ed.) Fundamentals of Computation Theory. LNCS, vol. 199, pp. 520–533. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  25. Degano, P., De Nicola, R., Montanari, U.: CCS is an (augmented) contact free C/E system. In: Zilli, M.V. (ed.) Mathematical Models for the Semantics of Parallelism. LNCS, vol. 280, pp. 144–165. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  26. Degano, P., De Nicola, R., Montanari, U.: A distributed operational semantics for CCS based on condition/event systems. Acta Inf. 26(1/2), 59–91 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  27. Degano, P., De Nicola, R., Montanari, U.: A partial ordering semantics for CCS. Theor. Comput. Sci. 75(3), 223–262 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  28. Degano, P., De Nicola, R., Montanari, U.: Universal axioms for bisimulations. Theor. Comput. Sci. 114(1), 63–91 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  29. Degano, P., Ferrari, G.-L., Galletta, L.: A two-phase static analysis for reliable adaptation. In: Giannakopoulou, D., Salaün, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 347–362. Springer, Heidelberg (2014)

    Google Scholar 

  30. Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for coordinating secure behavioural variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 261–276. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  31. Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Sato, M., Kleinberg, R.D. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  32. Degano, P., Montanari, U.: Liveness properties as convergence in metric spaces. In: Proceedings of the16th Annual ACM Symposium on Theory of Computing (STOC 1984), pp. 31–38. ACM (1984)

    Google Scholar 

  33. Degano, P., Montanari, U.: A model for distributed systems based on graph rewriting. J. ACM 34(2), 411–449 (1987)

    Article  MathSciNet  Google Scholar 

  34. Degano, P., Priami, C.: Proved trees. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 629–640. Springer, Heidelberg (1992)

    Chapter  Google Scholar 

  35. Degano, P., Priami, C.: Enhanced operational semantics. ACM Comput. Surv. 28(2), 352–354 (1996)

    Article  MATH  Google Scholar 

  36. Degano, P., Priami, C.: Non-interleaving semantics for mobile processes. Theor. Comput. Sci. 216(1–2), 237–270 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  37. Degano, P., Priami, C.: Enhanced operational semantics in systems biology. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 178–181. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  38. Degano, P., Sirovich, F.: An evaluation based theorem prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1), 70–79 (1985)

    Article  MATH  Google Scholar 

  39. Gao, H., Bodei, C., Degano, P.: A formal analysis of complex type flaw attacks on security protocols. In: Meseguer, J., Roşu, G. (eds.) AMAST 2008. LNCS, vol. 5140, pp. 167–183. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  40. Gao, H., Bodei, C., Degano, P., Riis Nielson, H.: A formal analysis for capturing replay attacks in cryptographic protocols. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 150–165. Springer, Heidelberg (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiara Bodei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bodei, C., Ferrari, GL., Priami, C. (2015). Pierpaolo Degano. In: Bodei, C., Ferrari, G., Priami, C. (eds) Programming Languages with Applications to Biology and Security. Lecture Notes in Computer Science(), vol 9465. Springer, Cham. https://doi.org/10.1007/978-3-319-25527-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25527-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25526-2

  • Online ISBN: 978-3-319-25527-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics