Papers (in reverse
cronological order)
In journals
In conference proceedings
Manuscripts and others
In journals
-
Spatial and behavioral types in the pi-calculus (pdf)
Lucia Acciai and Michele Boreale
© In Information and Computation, Volume 208, pp. 1118-1153, 2010 (@InfComp).
- Quantifying information leakage in process calculi (pdf)
Michele Boreale
© In Information and Computation, Volume 207(6), pp. 699-725, 2009 (@InfComp).
- Responsiveness in process calculi (pdf)
Lucia Acciai and Michele Boreale
© In Theoretical Computer Science,
Volume 409, pp. 59-93, 2008 (@TCS).
- XPi: a typed process calculus for XML messaging (pdf)
Lucia Acciai and Michele Boreale
© Science of Computer Programming,
Volume 71/2, pp. 110-143, 2008 (@SCICO).
- Processes as formal power series: A coinductive approach to
denotational semantics (pdf)
Michele Boreale and Fabio Gadducci
© Theoretical Computer Science,
Volume 360(1-3), pp. 440-458, 2006 (@TCS).
- A Method for symbolic analysis of security protocols (pdf)
M. Boreale and M.G. Buscemi
© Theoretical
Computer Science, Volume 338(1-3), pp. 393-425, 2005 (@TCS).
- Proof Techniques for Cryptographic Processes (pdf)
M.Boreale, R. De Nicola and R. Pugliese
© SIAM Journal on
Computing, Volume 31(3), pp. 947-986, 2002
(@SJC).
- Trace and Testing Equivalence in Asynchronous Processes (ps)
M. Boreale, R. De Nicola and R. Pugliese
© Information and
Computation, Volume 172, pp. 139-164, 2002
(@InfComp).
- Divergence in Testing and Readiness Semantics (pdf)
M. Boreale, R. De Nicola and R. Pugliese
© Theoretical
Computer Science, Volume 266, pp. 237-248, 2001
(@TCS).
- A Complexity Analysis of Bisimilarity for Value-Passing
Processes (ps)
M. Boreale and L. Trevisan
© Theoretical
Computer Science, Volume 238(1-2), pp. 313-345, 2000 (@TCS).
- Basic Observable for Processes (pdf)
M. Boreale, R. De Nicola and R. Pugliese
© Information and
Computation, Volume 149(1), pp. 77-98, 1999
(@InfComp).
- On the Expressiveness of Internal Mobility in Name-Passing
Calculi (pdf)
M. Boreale
© Theoretical
Computer Science, Volume 195(2), pp. 205-226, 1998 (@TCS).
- Some Congruence Properties for pi-calculus Bisimilarities
(pdf)
M. Boreale and D. Sangiorgi
© Theoretical
Computer Science, Volume 198(1-2), pp. 159-176, 1998 (@TCS).
- A Fully Abstract Semantics for Causality in the pi-calculus
(pdf)
M. Boreale and D. Sangiorgi
© Acta Informatica,
Volume 35(5), pp. 353-400, 1998 (@ActaInf).
- A Symbolic Semantics for the pi-calculus (pdf)
M. Boreale and R. De Nicola
© Information and
Computation, Volume 126, pp. 34-52, 1996
(@InfComp).
- Testing Equivalence for Mobile Processes (pdf)
M. Boreale and R. De Nicola
© Information and
Computation, Volume 120(2), pp. 279-303, 1995 (@InfComp).
- Complete Sets of Axioms for endite Basic LOTOS Behavioural
Equivalences
M. Boreale, P. Inverardi and M. Nesi
© Information
Processing Letters, Volume 43(3), pp. 155-160, 1992 (@IPL).
In conference proceedings
-
Quantitative Information Flow, with a View (pdf)
Michele Boreale, Francesca Pampaloni and Michela Paolini
In Proc.
of ESORICS 2011, Lecture Notes in Computer Science. To appear.
- Linear and may-testing semantics in a probabilistic reactive setting (pdf)
Lucia Acciai, Michele Boreale and Rocco De Nicola
In Proc. of FMOODS-FORTE, Lecture Notes in Computer Science, Volume 6722, pp. 29-43, 2011
(@LNCS).
-
Asymptotic Information Leakage under One-Try Attacks (pdf)
Michele Boreale, Francesca Pampaloni and Michela Paolini
In Proc. of 14th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS), 2011.
©
Lecture Notes in
Computer Science, Volume 6604, pp. 396–410, 2011 (@LNCS).
Full version - submitted (pdf).
-
A Semiring-based Trace Semantics for Processes with Applications to Information Leakage Analysis (pdf)
Michele Boreale, David Clark and Daniele Gorla
In Proc. of IFIP-TCS, 2010.
©
IFIP AICT volume 323, pp. 340-354, 2010 (@IFIP-TCS).
-
Behavioural contracts with request-response operations (pdf)
Lucia Acciai, Michele Boreale and Gianluigi Zavattaro
In Proc. of Coordination, 2010.
©
Lecture Notes in Computer Science, Volume 6116, pp. 16-30, 2010 (@LNCS).
Full version - submitted (pdf).
- On the relationship between spatial logics and behavioral simulations (pdf)
Lucia Acciai, Michele Boreale and Gianluigi Zavattaro
In Proc. of 13th International Conference on
Foundations of Software Science and Computation Structures
(FoSSaCS), 2010.
©
Lecture Notes in
Computer Science, Volume 6014, pp. 146-160, 2010 (@LNCS).
- Weighted Bisimulation in Linear Algebraic Form (pdf)
Michele Boreale
In Proc. of International Conference on the Theory of Concurrency
(CONCUR), 2009.
© Lecture Notes in
Computer Science, Volume 5710, pp. 163--177, 2009 (@LNCS).
Full version (pdf).
- Deciding safety properties in infinite-state pi-calculus via behavioural types (pdf)
Lucia Acciai and Michele Boreale
In Proc. of 36th International Colloquium on Automata, Languages and Programming
(ICALP), 2009.
© Lecture Notes in
Computer Science, Volume 5556, pp. 31-42, 2009 (@LNCS).
Full version - submitted(pdf).
- Spatial and behavioral types in the pi-calculus (pdf)
Lucia Acciai and Michele Boreale
In Proc. of International Conference on the Theory of Concurrency
(CONCUR), 2008.
© Lecture Notes in
Computer Science, Volume 5201, pp. 372-386, 2008 (@LNCS).
- Sessions and Pipelines for Structured Service Programming (pdf)
Michele Boreale, Roberto Bruni, Rocco De Nicola and Michele Loreti
In Proc. of Formal Methods for Open Object-Based Distributed Systems
(FMOODS), 2008
© Lecture Notes in
Computer Science, Volume 5051, pp. 19-38, 2008 (@LNCS).
- A type system for client progress in a service-oriented
calculus (pdf)
Lucia Acciai and Michele Boreale
In Concurrency,
Graphs and Models.
Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday.
©
Lecture Notes in Computer Science,
Volume 5065, pp. 642-658, 2008 (@LNCS).
- Type abstractions of name-passing processes (pdf)
Lucia Acciai and Michele Boreale
In Proc. of IPM International Symposium on Fundamentals of Software
Engineering (FSEN), Tehran, Iran, 2007.
© Lecture Notes in
Computer Science, Volume 4767, pp. 302-317, 2007 (@LNCS).
- A Concurrent Calculus with Atomic Transactions (pdf)
Lucia Acciai, Michele Boreale and Silvano dal Zilio
In Proc. of European Symposium on Programming (ESOP), Braga, Portugal,
2007.
© Lecture Notes in
Computer Science, Volume 4421, pp. 48-63, 2007 (@LNCS).
- Responsiveness in process calculi (pdf)
Lucia Acciai and Michele Boreale
In Proc. of 11th Annual Asian Computing Science Conference (ASIAN),
Tokyo, Japan, 2006.
© Lecture Notes in
Computer Science, Volume 4435, pp. 136-150, 2008 (@LNCS).
- Attacking Right-to-Left Modular Exponentiation with Timely
Random Faults (pdf)
M. Boreale
In Proc. of Fault Diagnosis and Tolerance in Cryptography (FDTC), 2006
© Lecture Notes in
Computer Science, Volume 4236, pp. 24-35, 2006 (@LNCS).
- Quantifying Information Leakage in Process Calculi (pdf)
M. Boreale
In Proc. of Automata, Languages and Programming (ICALP), 2006
© Lecture Notes in
Computer Science, Volume 4052, pp. 119-131, 2006 (@LNCS).
- A Typed Calculus for Querying Distributed XML Documents
Lucia Acciai, Michele Boreale and Silvano dal Zilio
In Proc. of Trustworthy Global Computing (TGC), Lucca, Italy, 2006, (pdf).
© Lecture Notes in
Computer Science, Volume 4661, pp. 167-182, 2007 (@LNCS).
A short abstract has appeared in 17th Nordic Workshop on Programming
Theory (NWPT), 2005 (pdf).
An extended version appears as Research Report 29-2006, LIF, January
2006 (pdf).
- SCC: A Service Centered Calculus (pdf)
M. Boreale, R. Bruni, L. Caires, R. De Nicola, I. Lanese, M. Loreti, F.
Martins, U. Montanari, A. Ravara, D. Sangiorgi, V. T. Vasconcelos and
G. Zavattaro
In Proc. of Web Services and Formal Method (WS-FM), 2006
© Lecture Notes in
Computer Science, Volume 4184, pp. 38-57, 2006 (@LNCS).
- XPi: a typed process calculus for XML messaging (pdf)
Lucia Acciai and Michele Boreale
In 7th IFIP International Conference on Formal Methods for Object-Based
Distributed Systems (FMOODS), Athens, Greece, 2005.
© Lecture Notes in
Computer Science, Volume 3535, pp. 47-66, 2005 (@LNCS).
- A General Name Binding Mechanism (pdf)
M. Boreale, M. G. Buscemi and U. Montanari
In Proc. of Trustworthy Global Computing (TGC), 2005
© Lecture Notes in
Computer Science, Volume 3705, pp. 61-74, 2005
(@LNCS)
- D-Fusion: A Distinctive Fusion Calculus (pdf)
M. Boreale, M. G. Buscemi and U. Montanari
In Proc. of Programming Languages and Systems (APLAS), 2004
© Lecture Notes in
Computer Science, Volume 3302, pp. 296-310, 2004 (@LNCS).
- Symbolic Analysis of Crypto-Protocols Based on Modular
Exponentiation (pdf)
M. Boreale and M.G. Buscemi
In Proc. of Mathematical Foundations of Computer Science (MFCS), 2003
© Lecture Notes in
Computer Science, Volume 2747, pp. 279-289, 2003 (@LNCS).
- Denotational Testing Semantics in Coinductive Form (ps)
M. Boreale and F. Gadducci
In Proc. of Mathematical Foundations of Computer Science (MFCS), 2003
© Lecture Notes in
Computer Science, Volume 2747, pp. 279-289, 2003 (@LNCS).
- A Framework for the Analysis of Security Protocols (pdf)
M. Boreale and M.G. Buscemi
In Proc. of International Conference on the Theory of Concurrency
(CONCUR), 2002
© Lecture Notes in
Computer Science, Volume 2421, pp. 73-90, 2002 (@LNCS).
- On Compositional Reasoning in the Spi-calculus (ps)
M. Boreale and D. Gorla
In Proc. of Foundations of Software Technology and Computation
Structures (FoSSACS), 2002
© Lecture Notes in
Computer Science, Volume 2303, pp. 45-84, 2002 (@LNCS).
- Experimenting with STA, a Tool for Automatic Analysis of
Cryptographic Protocols (pdf)
M. Boreale and M.G. Buscemi
In Proc. of ACM Symposium on Applied Computing (SAC), 2002
© ACM Press, pp. 281-285,
2002
(@ACM).
- Symbolic trace analysis of cryptographic protocols (pdf)
M. Boreale
In Proc. of Automata, Languages and Programming (ICALP), 2001
© Lecture Notes in
Computer Science, Volume 2076, pp. 667-681, 2001 (@LNCS).
- Process Algebraic Analysis of Cryptographic Protocols (ps)
M. Boreale, R. De Nicola and R. Pugliese
In Proc. of 13th FORTE / 20th PSV , pp. 375-392, Kluiver, 2000.
- Proof Techniques for Cryptographic Processes (pdf)
M. Boreale, R. De Nicola and R. Pugliese
In Proc. of 14th Symposium on Logic in Computer Science (LICS), 1999
© IEEE Computer Society
Press, 1999.
- A Theory of "May" Testing for Asynchronous Languages (pdf)
M. Boreale, R. De Nicola and R. Pugliese
In Proc. of Foundations of Software Science and Computation Structures
(FoSSaCS), 1999
© Lecture Notes in
Computer Science, Volume 1578, pp. 165-179, 1999 (@LNCS).
- Bisimulation in Name-Passing Calculi without Matching (pdf)
M. Boreale and D. Sangiorgi.
In Proc. of 13th Symposium on Logic in Computer Science (LICS), 1998
© IEEE Computer Society
Press, 1998.
- Bisimulations in the Join Calculus (ps)
M. Boreale, C. Fournet and C.Laneve
In Proc. of IFIP PROCOMET'98
,
editors D. Gries and W. De Roever, pp. 68-86, Chapman and Hall, 1998.
- Asynchronous Observations of Processes (pdf)
M. Boreale, R. De Nicola and R. Pugliese
In Proc. of Foundations of Software Science and Computation Structures
(FoSSaCS), 1998
© Lecture Notes in
Computer Science, Volume 1378, pp. 95-109, 1998 (@LNCS).
- Basic Observables for Processes (pdf)
M. Boreale, R. De Nicola and R. Pugliese
In Proc. 24th Int. Conference on Automata, Languages and Programming
(ICALP), 1997
© Lecture Notes in
Computer Science, Volume 1256, pp. 482-492, 1997 (@LNCS).
- On the Expressivness of Internal Mobility in Name-Passing
Calculi (pdf)
M. Boreale
In Proc. 7th Conf. on Concurrency Theory (CONCUR), 1996
© Lecture Notes in
Computer Science, Volume 1119, pp. 163-178, 1996 (@LNCS).
- Bisimilarity problems requiring exponential time (Extended
abstract) (pdf)
M. Boreale and L. Trevisan
In Proc. 21st Conf. on Mathematical Foundations of Computer Science
(MFCS), 1996
© Lecture Notes in
Computer Science, Volume 1113, pp. 230-241, 1996 (@LNCS).
- Symbolic Bisimulation for Timed Processes (pdf)
M. Boreale
In Proc. 5th Conf. on Algebraic Methodologies And Software Technology
(AMAST), 1996
© Lecture Notes in
Computer Science, Volume 1101, pp. 321-335, 1996 (@LNCS).
- On the Complexity of Bisimilarity for value-passing Processes
(pdf)
M. Boreale and L. Trevisan
In Proc. of 15th Conf. on Foundations of Software Technology and
Theoretical Computer Science (FST&TCS), 1995
© Lecture Notes in
Computer Science, Volume 1026, pp. 294-308, 1995 (@LNCS).
- A Fully Abstract Semantics for Causality in the pi-calculus -
Extended Abstract (pdf)
M. Boreale and D. Sangiorgi
In Proc. 12th Symposium on Theoretical Aspects of ComputerScience
(STACS), 1995
© Lecture Notes in
Computer Science, Volume 900, pp. 243-254, 1995 (@LNCS).
- A Symbolic Semantics for the pi-calculus - Extended abstract
(pdf)
M. Boreale and R. De Nicola
In Proc. of 5th Conf. on Concurrency Theory (CONCUR), 1994
© Lecture Notes in
Computer Science, Volume 836, pp. 299-314, 1994 (@LNCS).
- Testing equivalence for mobile processes
M. Boreale and R. De Nicola
In Proc. of 3rd Conf. on Concurrency Theory (CONCUR), 1992
© Lecture Notes in
Computer Science, Volume 630, pp. 2-16, 1992 (@LNCS).
Manuscripts and others
-
Worst- and average-case privacy breaches in randomization mechanisms (pdf)
Michele Boreale and Michela Paolini
Submitted, 2012.
-
Proceedings 7th International Workshop on Security Issues in Concurrency (SECCO 2009) (@arxiv>)
Michele Boreale and Steve Kremer (editors)
EPTCS Volume 7, 2009.
- Security protocols analyzed symbolically (pdf)
M. Boreale
ALP Newsletter, Volume
16(4), November 2003
- Process Calculi and the Verification of Security Protocols
(pdf)
M. Boreale and D. Gorla
© In Journal of
Telecommunication and Information Technology, Special Issue on
Cryptographic Protocol Verification, Volume 2002/4, pp. 28-40, National
Institute of Telecommunications - Warsaw, 2002.
- A theory of symbolic bisimulation for timed processes (ps)
M. Boreale
Rapporto di Ricerca SI/RR 96/06, Dipartimento di Scienze
dell'Informazione dell'Università di Roma "La Sapienza'', 1996.
- Process algebraic theories for mobile systems (ps)
M. Boreale
PhD. Thesis, Dipartimento di Scienze dell'Informazione
dell'Università di Roma "La Sapienza'', October 1994.
(Supervisor Prof. R. De Nicola)