#### Filter Results:

- Full text PDF available (10)

#### Publication Year

2006

2017

- This year (1)
- Last 5 years (6)
- Last 10 years (10)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former… (More)

- Svetlana Jaksic, Luca Padovani
- Sci. Comput. Program.
- 2012

Copyless messaging is a communication mechanism in which only pointers to messages are exchanged between sender and receiver processes. Because of its intrinsically low overhead, copyless messaging can be profitably adopted for the development of complex software systems where processes have access to a shared address space. However, the very same mechanism… (More)

We introduce a role-based access control calculus for modelling dynamic web data and a corresponding type system. It is an extension of the Xdπ calculus proposed by Gardner and Maffeis. In our framework, a network is a parallel composition of locations, where each location contains processes with roles and a data tree whose edges are associated with roles.… (More)

This paper summarises results obtained by the authors in studying security and privacy issues of web data. The proposed approach is based on typed process calculi that appear to be suitable for controlling access rights.

- Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, Jorge A. Pérez, Hugo Torres Vieira
- Formal Aspects of Computing
- 2016

Protocols in distributed settings usually rely on the interaction of several parties and often identify the roles involved in communications. Roles may have a behavioral interpretation, as they do not necessarily correspond to sites or physical devices. Notions of role authorization thus become necessary to consider settings in which, e.g., different sites… (More)

- Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, Nobuko Yoshida
- Theory and Practice of Formal Methods
- 2016

The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in object-oriented programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: denotational and operational.… (More)

We investigate Leifer and Milner RPO approach for deriving efficient (finitely branching) LTS’s and bisimilarities for π-calculus. To this aim, we work in a category of second-order term contexts and we apply a general pruning technique, which allows to simplify the set of transitions in the LTS obtained from the original RPO approach. The resulting LTS and… (More)

- Svetlana Jaksic, Jovanka Pantovic, Silvia Ghilezan
- Mathematical Structures in Computer Science
- 2017

- Pietro Di Gianantonio, Svetlana Jaksic, Marina Lenisa
- CONCUR
- 2010

We investigate Leifer and Milner RPO approach for deriving efficient (finitely branching) LTS’s and bisimilarities for π-calculus. To this aim, we work in a category of second-order term contexts and we apply a general pruning technique, which allows to simplify the set of transitions in the LTS obtained from the original RPO approach. The resulting LTS and… (More)

Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling.… (More)