default search action
Letterio Galletta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Francesco Casaril, Letterio Galletta:
Securing SatCom user segment: A study on cybersecurity challenges in view of IRIS. Comput. Secur. 140: 103799 (2024) - [j20]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
Specifying and Verifying Information Flow Control in SELinux Configurations. ACM Trans. Priv. Secur. 27(4): 31:1-31:35 (2024) - [c48]Margherita Renieri, Letterio Galletta, Alberto Lluch-Lafuente, James Hsin-yu Chiang:
A Netting Protocol for Liquidity-saving Automated Market Makers. DLT 2024 - [c47]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. ECAI 2024: 1405-1412 - [c46]Gabriele Costa, Silvia de Francisci, Letterio Galletta, Cosimo Perini Brogi, Marinella Petrocchi, Fabio Pinelli, Roberto Pizziol, Manuel Pratelli, Margherita Renieri, Simone Soderi, Mirco Tribastone, Serenella Valiani:
Systems Security Modeling and Analysis at IMT Lucca. ISoLA (1) 2024: 13-26 - [c45]Letterio Galletta, Fabio Pinelli:
Explainable Ponzi Schemes Detection on Ethereum. SAC 2024: 1014-1023 - [c44]Margherita Renieri, Letterio Galletta:
A Policy Framework for Regulating External Calls in Smart Contracts. SEFM 2024: 52-69 - [i14]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. CoRR abs/2408.09516 (2024) - [i13]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
Policies for Fair Exchanges of Resources. CoRR abs/2410.21214 (2024) - 2023
- [j19]Gabriele Costa, Pierpaolo Degano, Letterio Galletta, Simone Soderi:
Formally verifying security protocols built on watermarking and jamming. Comput. Secur. 128: 103133 (2023) - [j18]Stefano Bistarelli, Rocco De Nicola, Letterio Galletta, Cosimo Laneve, Ivan Mercanti, Adele Veschetti:
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j17]Letterio Galletta, Cosimo Laneve, Ivan Mercanti, Adele Veschetti:
Resilience of Hybrid Casper Under Varying Values of Parameters. Distributed Ledger Technol. Res. Pract. 2(1): 5:1-5:25 (2023) - [j16]Zorica Savanovic, Letterio Galletta:
A type language for distributed reactive components governed by communication protocols. J. Log. Algebraic Methods Program. 132: 100848 (2023) - [c43]Niccolò Maggioni, Letterio Galletta:
A Comparison of Hosting Techniques for Online Cybersecurity Competitions. INTETAIN 2023: 136-163 - [i12]Letterio Galletta, Fabio Pinelli:
Sharpening Ponzi Schemes Detection on Ethereum with Machine Learning. CoRR abs/2301.04872 (2023) - 2022
- [j15]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Can my firewall system enforce this policy? Comput. Secur. 117: 102683 (2022) - [c42]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux. CSF 2022: 243-259 - [c41]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Towards effective preservation of robust safety properties. SAC 2022: 1674-1683 - [i11]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). CoRR abs/2205.15915 (2022) - [i10]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò:
Automatic Fair Exchanges. CoRR abs/2207.12326 (2022) - 2021
- [j14]Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, Rocco De Nicola:
Framework, Tools and Good Practices for Cybersecurity Curricula. IEEE Access 9: 94723-94747 (2021) - [j13]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [j12]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Modelling and analysing IoT systems. J. Parallel Distributed Comput. 157: 233-242 (2021) - [j11]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A theory of transaction parallelism in blockchains. Log. Methods Comput. Sci. 17(4) (2021) - [j10]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Mechanical incrementalization of typing algorithms. Sci. Comput. Program. 208: 102657 (2021) - [j9]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - [c40]Pierpaolo Degano, Letterio Galletta, Selene Gerali:
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. Protocols, Strands, and Logic 2021: 124-138 - [d1]Vincenzo Bonnici, Giovanni Cicceri, Salvatore Distefano, Letterio Galletta, Marco Polignano, Carlo Scaffidi:
Italian IT Initiatives against COVID-19 (Dataset). Zenodo, 2021 - 2020
- [j8]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [c39]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Security Metrics at Work on the Things in IoT Systems. From Lambda Calculus to Cybersecurity Through Program Analysis 2020: 233-255 - [c38]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A True Concurrent Model of Smart Contracts Executions. COORDINATION 2020: 243-260 - [c37]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - [c36]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy. ITASEC 2020: 82-92 - [c35]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
MuAC: Access Control Language for Mutual Benefits. ITASEC 2020: 119-127 - [c34]Andrea Canidio, Gabriele Costa, Letterio Galletta:
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs. Tokenomics 2020: 6:1-6:14 - [c33]Zorica Savanovic, Letterio Galletta, Hugo Torres Vieira:
A type language for message passing component-based systems. ICE 2020: 3-24 - [i9]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - [i8]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Control-flow Flattening Preserves the Constant-Time Policy (Extended Version). CoRR abs/2003.05836 (2020) - [i7]Andrea Canidio, Gabriele Costa, Letterio Galletta:
Private-Yet-Verifiable Contact Tracing. CoRR abs/2010.09303 (2020) - [i6]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A theory of transaction parallelism in blockchains. CoRR abs/2011.13837 (2020)
2010 – 2019
- 2019
- [j7]Chiara Bodei, Stefano Chessa, Letterio Galletta:
Measuring security in IoT communications. Theor. Comput. Sci. 764: 100-124 (2019) - [j6]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Programming in a context-aware language. J. Supercomput. 75(12): 7750-7764 (2019) - [c32]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Robust Declassification by Incremental Typing. Foundations of Security, Protocols, and Equational Reasoning 2019: 54-69 - [c31]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Checking the Expressivity of Firewall Languages. The Art of Modelling Computational Systems 2019: 86-100 - [c30]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Revealing the Trajectories of KLAIM Tuples, Statically. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 437-454 - [c29]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta:
Are All Firewall Systems Equally Powerful? PLAS@CCS 2019: 1-17 - [c28]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A Minimal Core Calculus for Solidity Contracts. DPM/CBT@ESORICS 2019: 233-243 - [c27]Chiara Bodei, Letterio Galletta:
Analysing the Provenance of IoT Data. ICISSP (Revised Selected Papers) 2019: 358-381 - [c26]Chiara Bodei, Letterio Galletta:
Tracking Data Trajectories in IoT. ICISSP 2019: 572-579 - [c25]Matteo Busi, Letterio Galletta:
A Brief Tour of Formally Secure Compilation. ITASEC 2019 - [c24]Lorenzo Ceragioli, Letterio Galletta, Mauro Tempesta:
From Firewalls to Functions and Back. ITASEC 2019 - [c23]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Using Standard Typing Algorithms Incrementally. NFM 2019: 106-122 - [i5]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Translation Validation for Security Properties. CoRR abs/1901.05082 (2019) - [i4]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A true concurrent model of smart contracts executions. CoRR abs/1905.04366 (2019) - [i3]Massimo Bartoletti, Letterio Galletta, Maurizio Murgia:
A minimal core calculus for Solidity contracts. CoRR abs/1908.02709 (2019) - 2018
- [c22]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c21]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c20]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c19]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - [i2]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Using Standard Typing Algorithms Incrementally. CoRR abs/1808.00225 (2018) - 2017
- [j5]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. Log. Methods Comput. Sci. 13(3) (2017) - [c18]Chiara Bodei, Letterio Galletta:
Tracking Sensitive and Untrustworthy Data in IoT. ITASEC 2017: 38-52 - [c17]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Experimenting with a Context-Aware Language. PaCT 2017: 3-17 - [c16]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Emilio Tuosto:
Tool Supported Analysis of IoT. ICE@DisCoTec 2017: 37-56 - 2016
- [j4]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. J. Comput. Secur. 24(4): 427-477 (2016) - [j3]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Component Language for Adaptation: Design, Semantics and Program Analysis. IEEE Trans. Software Eng. 42(6): 505-529 (2016) - [c15]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Last Mile's Resources. Semantics, Logics, and Calculi 2016: 33-53 - [c14]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Where Do Your IoT Ingredients Come From? COORDINATION 2016: 35-50 - [c13]Chiara Bodei, Letterio Galletta:
The Cost of Securing IoT Communications. ICTCS 2016: 163-176 - [c12]Matteo Busi, Pierpaolo Degano, Letterio Galletta:
A Semantics for Disciplined Concurrency in COP. ICTCS 2016: 177-189 - [c11]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Event-driven Adaptation in COP. PLACES 2016: 37-45 - [c10]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Step Towards Checking Security in IoT. ICE 2016: 128-142 - [i1]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
Tracing where IoT data are collected and aggregated. CoRR abs/1610.08419 (2016) - 2015
- [c9]Davide Basile, Letterio Galletta, Gianluca Mezzetti:
Safe Adaptation Through Implicit Effect Coercion. Programming Languages with Applications to Biology and Security 2015: 122-141 - [c8]Andrea Canciani, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Context-Oriented Extension of F#. FOCLASA 2015: 18-32 - 2014
- [b1]Letterio Galletta:
Adaptivity: Linguistic Mechanisms and Static Analysis Techniques. University of Pisa, Italy, 2014 - [j2]Letterio Galletta:
An Abstract Interpretation Framework for Type and Effect Systems. Fundam. Informaticae 134(3-4): 355-393 (2014) - [c7]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Component Language for COP. COP@ECOOP 2014: 6:1-6:7 - [c6]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori:
Linguistic Mechanisms for Context-Aware Security. ICTAC 2014: 61-79 - [c5]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta:
A Two-Phase Static Analysis for Reliable Adaptation. SEFM 2014: 347-362 - 2013
- [j1]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Gianluca Mezzetti, Gianluigi Ferrari:
Security in Pervasive Applications: A Survey. Eur. J. Law Technol. 4(2) (2013) - 2012
- [c4]Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. CISIM 2012: 1-29 - [c3]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Types for Coordinating Secure Behavioural Variations. COORDINATION 2012: 261-276 - [c2]Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Typing Context-Dependent Behavioural Variation. PLACES 2012: 28-33 - 2011
- [c1]Letterio Galletta, Giorgio Levi:
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language. WWV 2011: 81-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint