{"title":"Soulmate Algorithms","authors":"F. Luccio, L. Pagli","doi":"10.1007/978-3-319-25527-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_18","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Evidences for Attack Reconstruction","authors":"C. Bodei, L. Brodo, R. Focardi","doi":"10.1007/978-3-319-25527-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_12","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128445585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Language Representability of Finite P/T Nets","authors":"R. Gorrieri","doi":"10.1007/978-3-319-25527-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_17","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126544065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"There are Two Sides to Every Question - Controller Versus Attacker","authors":"F. Martinelli, I. Matteucci, Francesco Santini","doi":"10.1007/978-3-319-25527-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_20","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hoare Logic for Disjunctive Information Flow","authors":"H. R. Nielson, F. Nielson, Ximeng Li","doi":"10.1007/978-3-319-25527-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_6","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bent Thomsen, K. S. Luckow, L. L. Thomsen, Thomas Bøgholm
{"title":"From Safety Critical Java Programs to Timed Process Models","authors":"Bent Thomsen, K. S. Luckow, L. L. Thomsen, Thomas Bøgholm","doi":"10.1007/978-3-319-25527-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_21","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Causal Trees, Finally","authors":"R. Bruni, U. Montanari, Matteo Sammartino","doi":"10.1007/978-3-319-25527-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_4","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abadi, M. Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly
{"title":"Distributed Authorization with Distributed Grammars","authors":"M. Abadi, M. Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly","doi":"10.1007/978-3-319-25527-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_3","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limited Disclosure and Locality in Graphs","authors":"J. Guttman","doi":"10.1007/978-3-319-25527-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_5","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safe Adaptation Through Implicit Effect Coercion","authors":"D. Basile, Letterio Galletta, Gianluca Mezzetti","doi":"10.1007/978-3-319-25527-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_10","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116309080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}