default search action
Chiara Bodei
Person information
- affiliation: University of Pisa, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Chiara Bodei, Marco De Vincenzi, Ilaria Matteucci:
Formal analysis of an AUTOSAR-based basic software module. Int. J. Softw. Tools Technol. Transf. 26(4): 495-508 (2024) - [c55]Francesco Rubino, Chiara Bodei, Gian-Luigi Ferrari:
Riding the Data Storms: Specifying and Analysing IoT Security Requirements with SURFING. ISoLA (1) 2024: 392-408 - [c54]Marco De Vincenzi, Chiara Bodei, Ilaria Matteucci:
OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication. SAC 2024: 215-217 - 2023
- [c53]Marco De Vincenzi, Chiara Bodei, Ilaria Matteucci:
Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions. AICCSA 2023: 1-9 - [c52]Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale:
Vehicle Data Collection: A Privacy Policy Analysis and Comparison. ICISSP 2023: 626-633 - [c51]Chiara Bodei, Marco De Vincenzi, Ilaria Matteucci:
From Hardware-Functional to Software-Defined Vehicles and their Security Issues. INDIN 2023: 1-10 - [c50]Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale:
Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies. ITSC 2023: 425-432 - 2021
- [j26]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [j25]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Modelling and analysing IoT systems. J. Parallel Distributed Comput. 157: 233-242 (2021) - 2020
- [j24]Chiara Bodei, Linda Brodo, Roberto Bruni:
The link-calculus for open multiparty interactions. Inf. Comput. 275: 104587 (2020) - [j23]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [c49]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Security Metrics at Work on the Things in IoT Systems. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 233-255
2010 – 2019
- 2019
- [j22]Chiara Bodei, Linda Brodo, Roberto Bruni:
A formal approach to open multiparty interactions. Theor. Comput. Sci. 763: 38-65 (2019) - [j21]Chiara Bodei, Stefano Chessa, Letterio Galletta:
Measuring security in IoT communications. Theor. Comput. Sci. 764: 100-124 (2019) - [j20]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Programming in a context-aware language. J. Supercomput. 75(12): 7750-7764 (2019) - [c48]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Revealing the Trajectories of KLAIM Tuples, Statically. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 437-454 - [c47]Chiara Bodei, Letterio Galletta:
Analysing the Provenance of IoT Data. ICISSP (Revised Selected Papers) 2019: 358-381 - [c46]Chiara Bodei, Letterio Galletta:
Tracking Data Trajectories in IoT. ICISSP 2019: 572-579 - 2018
- [c45]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c44]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c43]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c42]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - [i3]Chiara Bodei, Linda Brodo, Roberto Bruni:
A Formal Approach to Open Multiparty Interactions. CoRR abs/1807.03002 (2018) - 2017
- [j19]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. Log. Methods Comput. Sci. 13(3) (2017) - [j18]Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari:
Checking global usage of resources handled with local policies. Sci. Comput. Program. 133: 20-50 (2017) - [j17]Chiara Bodei, Linda Brodo, Roberta Gori, Francesca Levi, Antonio Bernini, Diana Hermith:
A static analysis for Brane Calculi providing global occurrence counting information. Theor. Comput. Sci. 696: 11-51 (2017) - [c41]Chiara Bodei, Letterio Galletta:
Tracking Sensitive and Untrustworthy Data in IoT. ITASEC 2017: 38-52 - [c40]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Experimenting with a Context-Aware Language. PaCT 2017: 3-17 - [c39]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto:
Tool Supported Analysis of IoT. ICE@DisCoTec 2017: 37-56 - 2016
- [j16]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. J. Comput. Secur. 24(4): 427-477 (2016) - [c38]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Last Mile's Resources. Semantics, Logics, and Calculi 2016: 33-53 - [c37]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Where Do Your IoT Ingredients Come From? COORDINATION 2016: 35-50 - [c36]Chiara Bodei, Letterio Galletta:
The Cost of Securing IoT Communications. ICTCS 2016: 163-176 - [c35]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Step Towards Checking Security in IoT. ICE 2016: 128-142 - [i2]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. CoRR abs/1610.08419 (2016) - 2015
- [j15]Chiara Bodei, Luca Bortolussi, Davide Chiarugi, Maria Luisa Guerriero, Alberto Policriti, Alessandro Romanel:
On the impact of discreteness and abstractions on modelling noise in gene regulatory networks. Comput. Biol. Chem. 56: 98-108 (2015) - [j14]Chiara Bodei, Roberta Gori, Francesca Levi:
Causal static analysis for Brane Calculi. Theor. Comput. Sci. 587: 73-103 (2015) - [c34]Chiara Bodei, Gian-Luigi Ferrari, Corrado Priami:
Pierpaolo Degano. Programming Languages with Applications to Biology and Security 2015: 1-6 - [c33]Chiara Bodei, Linda Brodo, Riccardo Focardi:
Static Evidences for Attack Reconstruction. Programming Languages with Applications to Biology and Security 2015: 162-182 - [c32]Chiara Bodei, Linda Brodo, Roberta Gori, Diana Hermith, Francesca Levi:
A Global Occurrence Counting Analysis for Brane Calculi. LOPSTR 2015: 179-200 - [e1]Chiara Bodei, Gian-Luigi Ferrari, Corrado Priami:
Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 9465, Springer 2015, ISBN 978-3-319-25526-2 [contents] - 2014
- [j13]Chiara Bodei, Linda Brodo, Roberto Bruni, Davide Chiarugi:
A Flat Process Calculus for Nested Membrane Interactions. Sci. Ann. Comput. Sci. 24(1): 91-136 (2014) - [c31]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Linguistic Mechanisms for Context-Aware Security. ICTAC 2014: 61-79 - 2013
- [j12]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Gianluca Mezzetti, Gianluigi Ferrari:
Security in Pervasive Applications: A Survey. Eur. J. Law Technol. 4(2) (2013) - [c30]Chiara Bodei, Roberta Gori, Francesca Levi:
An Analysis for Causal Properties of Membrane Interactions. CS2Bio 2013: 15-31 - 2012
- [c29]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. CISIM 2012: 1-29 - [c28]Chiara Bodei, Linda Brodo, Roberto Bruni:
Open Multiparty Interaction. WADT 2012: 1-23 - 2011
- [c27]Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari:
Predicting global usages of resources endowed with local policies. FOCLASA 2011: 49-64 - [c26]Chiara Bodei, Linda Brodo, Davide Chiarugi:
Control Flow Analysis of Generalised Boolean Networks. SASB 2011: 3-22 - [p2]Lucia Acciai, Chiara Bodei, Michele Boreale, Roberto Bruni, Hugo Torres Vieira:
Static Analysis Techniques for Session-Oriented Calculi. Results of the SENSORIA Project 2011: 214-231 - [i1]Chiara Bodei, Linda Brodo:
Brane Calculi Systems: A Static Preview of their Possible Behaviour. CoRR abs/1108.3429 (2011) - 2010
- [j11]Chiara Bodei, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2): 229-264 (2010) - [c25]Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari:
Safer in the Clouds (Extended Abstract). ICE 2010: 45-49 - [c24]Chiara Bodei, Andrea Bracciali, Davide Chiarugi, Roberta Gori:
A Taxonomy of Causality-Based Biological Properties. FBTC 2010: 116-133
2000 – 2009
- 2009
- [j10]Chiara Bodei:
A Control Flow Analysis for Beta-binders with and without static compartments. Theor. Comput. Sci. 410(33-34): 3110-3127 (2009) - [c23]Chiara Bodei, Linda Brodo, Roberto Bruni:
Static Detection of Logic Flaws in Service-Oriented Applications. ARSPA-WITS 2009: 70-87 - [c22]Chiara Bodei, Gian-Luigi Ferrari:
Choreography Rehearsal. WS-FM 2009: 29-45 - 2008
- [j9]Chiara Bodei, Andrea Bracciali, Davide Chiarugi:
On deducing causality in metabolic networks. BMC Bioinform. 9(S-4) (2008) - [c21]Han Gao, Chiara Bodei, Pierpaolo Degano:
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. AMAST 2008: 167-183 - [c20]Chiara Bodei, Andrea Bracciali, Davide Chiarugi:
Control Flow Analysis for Brane Calculi. MeCBIC 2008: 59-75 - 2007
- [c19]Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. ASIAN 2007: 150-165 - [c18]Anna Bernasconi, Chiara Bodei, Linda Pagli:
Knitting for Fun: A Recursive Sweater. FUN 2007: 53-65 - [c17]Chiara Bodei, Pierpaolo Degano, Han Gao, Linda Brodo:
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. SecCO@CONCUR 2007: 3-22 - [c16]Chiara Bodei:
A Static Analysis for Beta-Binders. FBTC@CONCUR 2007: 69-85 - 2005
- [j8]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication primitives for secure protocol specifications. Future Gener. Comput. Syst. 21(4): 645-653 (2005) - [j7]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Checking security policies through an enhanced Control Flow Analysis. J. Comput. Secur. 13(1): 49-85 (2005) - [j6]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static validation of security protocols. J. Comput. Secur. 13(3): 347-390 (2005) - [c15]Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
On Evaluating the Performance of Security Protocols. PaCT 2005: 1-15 - 2004
- [c14]Francesca Levi, Chiara Bodei:
A Control Flow Analysis for Safe and Boxed Ambients. ESOP 2004: 188-203 - [c13]Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami:
A Quantitative Study of Two Attacks. WISP@ICATPN 2004: 65-85 - [c12]Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami:
Performance Evaluation of Security Protocols Specified in LySa. QAPL 2004: 167-189 - 2003
- [c11]Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Automatic Validation of Protocol Narration. CSFW 2003: 126-140 - [c10]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65 - 2002
- [j5]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Gener. Comput. Syst. 18(6): 747-756 (2002) - [j4]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002) - 2001
- [j3]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for the pi-Calculus with Applications to Security. Inf. Comput. 168(1): 68-92 (2001) - [j2]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Names of the -calculus agents handled locally. Theor. Comput. Sci. 253(2): 155-184 (2001) - [c9]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis for Secrecy and Non-interference in Networks of Processes. PaCT 2001: 27-41 - [c8]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. TOSCA 2001: 211-228 - [p1]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis Using Flow Logics. Current Trends in Theoretical Computer Science 2001: 525-542 - 2000
- [j1]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Security Analysis using Flow Logics. Bull. EATCS 70: 112-130 (2000) - [c7]Pierpaolo Degano, Francesca Levi, Chiara Bodei:
Safe Ambients: Control Flow Analysis and Security. ASIAN 2000: 199-214
1990 – 1999
- 1999
- [c6]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication via Localized Names. CSFW 1999: 98-110 - [c5]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static Analysis of Processes for No and Read-Up nad No Write-Down. FoSSaCS 1999: 120-134 - 1998
- [c4]Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Control Flow Analysis for the pi-calculus. CONCUR 1998: 84-98 - [c3]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation. SAS 1998: 168-183 - 1997
- [c2]Chiara Bodei, Corrado Priami:
True Concurrency via Abstract Interpretation. SAS 1997: 202-216 - 1996
- [c1]Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Mobile Processes with a Distributed Environment. ICALP 1996: 490-501
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint