Author of the publication

Verifying Mobile Processes in the HAL Environment.

, , , , and . CAV, volume 1427 of Lecture Notes in Computer Science, page 511-515. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameterized Structured Operational Semantics., and . Fundam. Informaticae, 34 (1-2): 1-31 (1998)Secure Apps in the Fog: Anything to Declare?, , and . ESOCC Workshops, volume 1115 of Communications in Computer and Information Science, page 46-61. Springer, (2018)Secure Partitioning of Composite Cloud Applications., , , , and . ESOCC, volume 13226 of Lecture Notes in Computer Science, page 47-64. Springer, (2022)Model Checking Usage Policies., , , and . TGC, volume 5474 of Lecture Notes in Computer Science, page 19-35. Springer, (2008)Secure and Unfailing Services., , and . PaCT, volume 7979 of Lecture Notes in Computer Science, page 167-181. Springer, (2013)From Theory to Practice in Transactional Composition of Web Services., , , , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 272-286. Springer, (2005)Security-Aware Program Transformations., , and . ICTCS, volume 2841 of Lecture Notes in Computer Science, page 355-368. Springer, (2003)Formalising Security in Ubiquitous and Cloud Scenarios., , , , and . CISIM, volume 7564 of Lecture Notes in Computer Science, page 1-29. Springer, (2012)Static Analysis for Stack Inspection., , and . ConCoord, volume 54 of Electronic Notes in Theoretical Computer Science, page 69-80. Elsevier, (2001)A Language-Based Approach to Autonomic Computing., , , and . FMCO, volume 7542 of Lecture Notes in Computer Science, page 25-48. Springer, (2011)