List of Papers - Marzia Buscemi

M. Buscemi and U. Montanari. Open Bisimulation for the Concurrent Constraint Pi-Calculus. To appear in Proc. of the 17th European Symposium on Programming (ESOP'08). Springer-Verlag 2008. (© Elsevier) [.pdf] [An errata

M. Buscemi and H. Melgratti. Transactional Service Level Agreement. To appear in Post-Proc. of 3rd Symposium on Trustworthy Global Computing (TGC 2007). (© Elsevier) [.pdf]

M. Buscemi, L. Ferrari, C. Moiso, and U. Montanari. Constraint-Based Policy Negotiation and Enforcement for Telco Services. In Proc. of the 1st IEEE & IFIP Theoretical Aspects of Software Engineering Conference (TASE 2007). IEEE Computer Society, 2007.  (© IEEE Computer Society) [.pdf].

M. Buscemi and U. Montanari. CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements. In Proc. of the 16th European Symposium on Programming (ESOP'07). LNCS 4421, Springer-Verlag 2007. (© Elsevier) [.pdf

M. Buscemi and U. Montanari. A Compositional Coalgebraic Model of Fusion Calculus. Journal of Logic and Algebraic Programming 72(1): 78--97. Elsevier, 2007. (© Elsevier) [.pdf].

M. Buscemi and U. Montanari. A Compositional Coalgebraic Model of a Fragment of Fusion Calculus. Electronic Notes in Computer Science 162:135--139. Elsevier, 2006.

M. Boreale and M. Buscemi. A Method for Symbolic Analysis of Security Protocols. Theoretical Computer Science 338(1-3): 393-425. Elsevier, 2005. (© Elsevier) [.pdf].

M. Boreale, M. Buscemi, and U. Montanari. A General Name Binding Mechanism. In Proc. of Symposium on Trustworthy Global Computing (TGC '05), LNCS 3705, Springer-Verlag, 2005. (© Springer-Verlag) [.pdf].

M. Boreale, M. Buscemi, and U. Montanari. D-Fusion: a Distinctive Fusion Calculus. In Proc. of the Second Asian Symposium on Programming Languages and Systems (APLAS 2004), LNCS 3302, Springer-Verlag, 2004. (© Springer-Verlag) [.pdf] .

M. Boreale and M. Buscemi. Symbolic Analysis of Crypto-Protocols based on Modular Exponentiation. In Proc.of the 28th International Symposium on Mathematical Foundations of Computer Science (MFCS '03), LNCS 2747, Springer-Verlag, 2003. (© Springer-Verlag) [.pdf] [.ps.gz]. An extended version appears in Proc. of Foundations of Computer Security (FCS'03). [.pdf] [.ps.gz].

M. Buscemi and U. Montanari. A First Order Coalgebraic Model of Pi-Calculus Early Observational Equivalence. In Proc. of the 13th International Conference on Concurrency Theory (CONCUR '02), LNCS 2421, Springer-Verlag, 2002. (© Springer-Verlag) An extended version is available as TR-02-14, Dipartimento di Informatica - University of Pisa [.ps.Z]

M. Boreale and M. Buscemi. A Framework for the Analysis of Security Protocols. In Proc. of the 13th International Conference on Concurrency Theory (CONCUR '02), LNCS 2421, Springer-Verlag, 2002. (© Springer-Verlag) [.pdf] [.ps.gz].

M. Boreale and M. Buscemi. Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In Proc. of ACM Symposium in Applied Computing (SAC '02), ACM Press, 2002. Extended version available: [.pdf] [.ps.gz]

M. Buscemi and V. Sassone. High-Level Petri Nets as Type Theories in the Join Calculus. In Proc. of Foundations of Software Science and Computation Structure (FoSSaCS '01), LNCS 2030, Springer-Verlag, 2001. (© Springer-Verlag) [.pdf] [.ps.gz]