Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9465))

  • 969 Accesses

Abstract

This section contains the laudatio in honour of Pierpaolo Degano. It illustrates his distinguished career and his main scientific contributions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Barbuti, R., Degano, P., Levi, G.: Toward an inductionless technique for proving properties of logic programs. In: Proceedings of International Logic Programming Conference (ICLP 1982), pp. 175–181 (1982)

    Google Scholar 

  2. Bartoletti, M., Degano, P., Ferrari, G.: Planning and verifying service composition. J. Comput. Secur. 17(5), 799–837 (2009)

    Article  Google Scholar 

  3. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Semantics-based design for secure web services. IEEE Trans. Softw. Eng. 34(1), 33–49 (2008)

    Article  Google Scholar 

  4. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 1–43 (2009)

    Article  MATH  Google Scholar 

  5. Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Model checking usage policies. Math. Struct. Comput. Sci. 25(3), 710–763 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  6. Basile, D., Degano, P., Ferrari, G.: A formal framework for secure and complying services. J. Supercomputing 69(1), 43–52 (2014)

    Article  Google Scholar 

  7. Bellia, M., Dameri, E., Degano, P., Levi, G., Martelli, M.: Applicative communicating processes in first order logic. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming. LNCS, vol. 137, pp. 1–14. Springer, Heidelberg (1982)

    Chapter  Google Scholar 

  8. Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)

    Article  Google Scholar 

  9. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)

    MATH  Google Scholar 

  10. Bodei, C., Degano, P., Focardi, R., Priami, C.: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2), 271–304 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  11. Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication primitives for secure protocol specifications. Future Gener. Comp. Syst. 21(4), 645–653 (2005)

    Article  Google Scholar 

  12. Bodei, C., Degano, P., Galletta, L., Mezzetti, G., Ferrari, G.: Security in pervasive applications: a survey. Eur. J. Law Technol. 4(2), 15–31 (2013)

    Google Scholar 

  13. Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \(\pi \)-calculus with applications to security. Inf. Comput. 168(1), 68–92 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  14. Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comp. Syst. 18(6), 747–756 (2002)

    Article  MATH  Google Scholar 

  15. Bodei, C., Degano, P., Priami, C.: Names of the Pi-calculus agents handled locally. Theor. Comput. Sci. 253(2), 155–184 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  16. Bodei, C., Degano, P., Priami, C.: Checking security policies through an enhanced control flow analysis. J. Comput. Secur. 13(1), 49–85 (2005)

    Article  Google Scholar 

  17. Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Synapses as stochastic concurrent systems. Theor. Comput. Sci. 408(1), 66–82 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Bracciali, A., Brunelli, M., Cataldo, E., Degano, P.: Stochastic models for the in silico simulation of synaptic processes. BMC Bioinform. 9(S–4), 4 (2008)

    Google Scholar 

  19. Chiarugi, D., Degano, P., Van Klinken, J.B., Marangoni, R.: Cells in Silico: a Holistic approach. In: Zavattaro, G., Bernardo, M., Degano, P. (eds.) SFM 2008. LNCS, vol. 5016, pp. 366–386. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Chiarugi, D., Degano, P., Marangoni, R.: A computational approach to the functional screening of genomes. PLoS Comput. Biol. 3(9), e174 (2007)

    Article  MathSciNet  Google Scholar 

  21. Curti, M., Degano, P., Baldari, C.T.: Causal \(\pi \)-calculus for biochemical modelling. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 21–33. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  22. Curti, M., Degano, P., Priami, C., Baldari, C.T.: Modelling biochemical pathways through enhanced \(\pi \)-calculus. Theor. Comput. Sci. 325(1), 111–140 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  23. Darondeau, P., Degano, P.: Causal trees. In: Ausiello, G., Dezani-Ciancaglini, M., Rocca, S.R.D. (eds.) Automata, Languages and Programming. LNCS, vol. 372, pp. 234–248. Springer, Heidelberg (1989)

    Chapter  Google Scholar 

  24. Degano, P., De Nicola, R., Montanari, U.: Partial ordering derivations for CCS. In: Budach, L. (ed.) Fundamentals of Computation Theory. LNCS, vol. 199, pp. 520–533. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  25. Degano, P., De Nicola, R., Montanari, U.: CCS is an (augmented) contact free C/E system. In: Zilli, M.V. (ed.) Mathematical Models for the Semantics of Parallelism. LNCS, vol. 280, pp. 144–165. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  26. Degano, P., De Nicola, R., Montanari, U.: A distributed operational semantics for CCS based on condition/event systems. Acta Inf. 26(1/2), 59–91 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  27. Degano, P., De Nicola, R., Montanari, U.: A partial ordering semantics for CCS. Theor. Comput. Sci. 75(3), 223–262 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  28. Degano, P., De Nicola, R., Montanari, U.: Universal axioms for bisimulations. Theor. Comput. Sci. 114(1), 63–91 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  29. Degano, P., Ferrari, G.-L., Galletta, L.: A two-phase static analysis for reliable adaptation. In: Giannakopoulou, D., Salaün, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 347–362. Springer, Heidelberg (2014)

    Google Scholar 

  30. Degano, P., Ferrari, G.-L., Galletta, L., Mezzetti, G.: Types for coordinating secure behavioural variations. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 261–276. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  31. Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Sato, M., Kleinberg, R.D. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  32. Degano, P., Montanari, U.: Liveness properties as convergence in metric spaces. In: Proceedings of the16th Annual ACM Symposium on Theory of Computing (STOC 1984), pp. 31–38. ACM (1984)

    Google Scholar 

  33. Degano, P., Montanari, U.: A model for distributed systems based on graph rewriting. J. ACM 34(2), 411–449 (1987)

    Article  MathSciNet  Google Scholar 

  34. Degano, P., Priami, C.: Proved trees. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 629–640. Springer, Heidelberg (1992)

    Chapter  Google Scholar 

  35. Degano, P., Priami, C.: Enhanced operational semantics. ACM Comput. Surv. 28(2), 352–354 (1996)

    Article  MATH  Google Scholar 

  36. Degano, P., Priami, C.: Non-interleaving semantics for mobile processes. Theor. Comput. Sci. 216(1–2), 237–270 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  37. Degano, P., Priami, C.: Enhanced operational semantics in systems biology. In: Priami, C. (ed.) CMSB 2003. LNCS, vol. 2602, pp. 178–181. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  38. Degano, P., Sirovich, F.: An evaluation based theorem prover. IEEE Trans. Pattern Anal. Mach. Intell. 7(1), 70–79 (1985)

    Article  MATH  Google Scholar 

  39. Gao, H., Bodei, C., Degano, P.: A formal analysis of complex type flaw attacks on security protocols. In: Meseguer, J., Roşu, G. (eds.) AMAST 2008. LNCS, vol. 5140, pp. 167–183. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  40. Gao, H., Bodei, C., Degano, P., Riis Nielson, H.: A formal analysis for capturing replay attacks in cryptographic protocols. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 150–165. Springer, Heidelberg (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiara Bodei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bodei, C., Ferrari, GL., Priami, C. (2015). Pierpaolo Degano. In: Bodei, C., Ferrari, G., Priami, C. (eds) Programming Languages with Applications to Biology and Security. Lecture Notes in Computer Science(), vol 9465. Springer, Cham. https://doi.org/10.1007/978-3-319-25527-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25527-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25526-2

  • Online ISBN: 978-3-319-25527-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics