References

  1. M. Abadi (1999): Secrecy by Typing In Security protocols. Journal of the ACM 5(46), pp. 18–36, doi:10.1145/324133.324266.
  2. D.E. Bell & L.J. LaPadula (1976): Secure Computer Systems: Unified Exposition and Multics Interpretation.. Technical Report ESD-TR-75-306. Mitre C..
  3. C. Bodei (2000): Security Issues in Process Calculi.. Dipartimento di Informatica, Università di Pisa. TD-2/00, March, 2000.
  4. C. Bodei, L. Brodo & R. Focardi (2015): Static Evidences for Attack Reconstruction. In: Programming Languages with Applications to Biology and Security, LNCS 9465. Springer, pp. 162–182, doi:10.1007/978-3-319-25527-9.
  5. C. Bodei, M. Buchholtz, P. Degano, F. Nielson & H. Riis Nielson (2005): Static validation of security protocols. Journal of Computer Security 13(3), pp. 347–390, doi:10.3233/JCS-2005-13302.
  6. C. Bodei, P. Degano, G-L. Ferrari & L. Galletta (2016): Where do your IoT ingredients come from?. In: Procs. of Coordination 2016, LNCS 9686. Springer, pp. 35–50, doi:10.1007/978-3-319-39519-7.
  7. C. Bodei, P. Degano, F. Nielson & H. Riis Nielson (2001): Static analysis for the π-calculus with applications to security. Information and Computation 168, pp. 68–92, doi:10.1006/inco.2000.3020.
  8. M. Buchholtz, H. Riis Nielson & Flemming F. Nielson (2004): A calculus for control flow analysis of security protocols. International Journal of Information Security 2(3), pp. 145–167, doi:10.1007/s10207-004-0036-x.
  9. N. Carriero & D. Gelernter (2001): A Computational Model of Everything. Commun. ACM 44(11), pp. 77–81, doi:10.1145/384150.384165.
  10. D.E Denning (1982): Cryptography and Data Security. Addison-Wesley, Reading Mass..
  11. P. Elejoste, A. Perallos, A. Chertudi, I. Angulo, A. Moreno, L. Azpilicueta, J.J Astrain, F. Falcone & J. E. Villadangos (2013): An Easy to Deploy Street Light Control System Based on Wireless Communication and LED Technology. Sensors 13(5), pp. 6492–6523, doi:10.3390/s130506492.
  12. S. Escolar, J. Carretero, M. Marinescu & S Chessa (2014): Estimating Energy Savings in Smart Street Lighting by Using an Adaptive Control System. IJDSN 2014, doi:10.1155/2014/971587.
  13. D. Gelernter (1985): Generative Communication in Linda. ACM Trans. Program. Lang. Syst. 7(1), pp. 80–112, doi:10.1145/2363.2433.
  14. M. Herlihy (1991): Wait-Free Synchronization. ACM Trans. Program. Lang. Syst. 13(1), pp. 124–149, doi:10.1145/114005.102808.
  15. IERC (2012): The Internet of Things 2012 – New Horizons. Available at http://www.internet-of-things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf.
  16. I. Lanese, L. Bedogni & M. Di Felice (2013): Internet of things: a process calculus approach. In: Procs of the 28th Annual ACM Symposium on Applied Computing, SAC '13. ACM, pp. 1339–1346, doi:10.1145/2480362.2480615.
  17. I. Lanese & D. Sangiorgi (2010): An operational semantics for a calculus for wireless systems. Theor. Comput. Sci. 411(19), pp. 1928–1948, doi:10.1016/j.tcs.2010.01.023.
  18. R. Lanotte & M. Merro (2016): A Semantic Theory of the Internet of Things.. In: Procs. of Coordination 2016, LNCS 9686. Springer, pp. 157–174, doi:10.1007/978-3-319-39519-7.
  19. S. Nanz, F. Nielson & H. Riis Nielson (2010): Static analysis of topology-dependent broadcast networks. Inf. Comput. 208(2), pp. 117–139, doi:10.1016/j.ic.2009.10.003.
  20. A. Singh, C. R. Ramakrishnan & S.A. Smolka (2010): A process calculus for Mobile Ad Hoc Networks. Sci. Comput. Program. 75(6), pp. 440–469, doi:10.1016/j.scico.2009.07.008.
  21. T. Zillner (2015): ZigBee Exploited. Available at https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org