Suivre
Letterio Galletta
Letterio Galletta
IMT School for Advanced Studies Lucca
Adresse e-mail validée de imtlucca.it - Page d'accueil
Titre
Citée par
Citée par
Année
A true concurrent model of smart contracts executions
M Bartoletti, L Galletta, M Murgia
International Conference on Coordination Languages and Models, 243-260, 2020
342020
Measuring security in IoT communications
C Bodei, S Chessa, L Galletta
Theoretical Computer Science 764, 100-124, 2019
332019
Provably secure isolation for interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
33rd IEEE Computer Security Foundations Symposium, CSF 2020, 262--276, 2020
322020
Language-independent synthesis of firewall policies
C Bodei, P Degano, L Galletta, R Focardi, M Tempesta, L Veronese
2018 ieee european symposium on security and privacy (euros&p), 92-106, 2018
322018
Tracing where IoT data are collected and aggregated
C Bodei, P Degano, GL Ferrari, L Galletta
Logical Methods in Computer Science 13 (3), 2017
302017
Where do your IoT ingredients come from?
C Bodei, P Degano, GL Ferrari, L Galletta
Coordination Models and Languages: 18th IFIP WG 6.1 International Conference …, 2016
242016
A minimal core calculus for Solidity contracts
M Bartoletti, L Galletta, M Murgia
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
222019
Types for coordinating secure behavioural variations
P Degano, GL Ferrari, L Galletta, G Mezzetti
Coordination Models and Languages: 14th International Conference …, 2012
212012
Framework, tools and good practices for cybersecurity curricula
J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola
IEEE Access 9, 94723-94747, 2021
202021
A two-component language for adaptation: design, semantics and program analysis
P Degano, GL Ferrari, L Galletta
IEEE Transactions on Software Engineering 42 (6), 505-529, 2015
162015
Transcompiling firewalls.
C Bodei, P Degano, R Focardi, L Galletta, M Tempesta
POST, 303-324, 2018
142018
A step towards checking security in IoT
C Bodei, P Degano, GL Ferrari, L Galletta
arXiv preprint arXiv:1608.03327, 2016
142016
Tracking sensitive and untrustworthy data in IoT
C Bodei, L Galletta
The Italian Conference on Cybersecurity (ITASEC17) 1816, 38-52, 2017
132017
A two-phase static analysis for reliable adaptation
P Degano, GL Ferrari, L Galletta
International Conference on Software Engineering and Formal Methods, 347-362, 2014
122014
Formalising security in ubiquitous and cloud scenarios
C Bodei, P Degano, GL Ferrari, L Galletta, G Mezzetti
Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012
122012
A two-component language for COP
P Degano, GL Ferrari, L Galletta
Proceedings of 6th ACM International Workshop on Context-Oriented …, 2014
112014
Adaptivity: Linguistic Mechanisms and Static Analysis Techniques.
L Galletta
University of Pisa, Italy, 2014
112014
Securing interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
ACM Transactions on Programming Languages and Systems (TOPLAS) 43 (3), 1-77, 2021
102021
A type language for message passing component-based systems
Z Savanović, L Galletta, HT Vieira
arXiv preprint arXiv:2009.07989, 2020
102020
Linguistic mechanisms for context-aware security
C Bodei, P Degano, L Galletta, F Salvatori
Theoretical Aspects of Computing–ICTAC 2014: 11th International Colloquium …, 2014
102014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20