References

  1. Business Process Model and Notation. http://www.bpmn.org.
  2. Compiler fromłeavevmode black101210\p@ plus2\p@ minus5\p@ \z@ plus3\p@ 6\p@ plus3\p@ minus3\p@ \defłeftmarginłeftmargini 6\p@ plus2\p@ minus2\p@ 3\p@ plus2\p@ minus\p@ıtemsep \parsepłeftmarginłeftmargini 6\p@ plus2\p@ minus2\p@ 3\p@ plus2\p@ minus\p@ıtemsep IoT-LySa to CFSMs. https://bitbucket.org/lillo/iotlysa.
  3. Alfred V. Aho, Ravi Sethi & Jeffrey D. Ullman (1986): Compilers: Principles, Techniques, and Tools. Addison-Wesley.
  4. Amber Ankerholz (2017): Bruce Schneier on New Security Threats from the Internet of Things. https://www.linux.com/news/event/open-source-leadership-summit/2017/3/bruce-schneier-new-security-threats-internet-things. Linux.com interviews Bruce Schneier.
  5. Massimo Bartoletti, Alceste Scalas, Emilio Tuosto & Roberto Zunino (2016): Honesty by Typing. Logical Methods in Computer Science 12(4), doi:10.2168/LMCS-12(4:7)2016.
  6. Laura Bocchi, Julien Lange & Nobuko Yoshida (2015): Meeting Deadlines Together. In: CONCUR 2015, pp. 283–296, doi:10.4230/LIPIcs.CONCUR.2015.283.
  7. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson & Hanne Riis Nielson (2005): Static validation of security protocols. Journal of Computer Security 13(3), pp. 347–390, doi:10.3233/JCS-2005-13302.
  8. Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari & Letterio Galletta (2016): A step towards checking security in IoT. In: Procs. of ICE 2016, EPTCS 223, pp. 128–142, doi:10.4204/EPTCS.223.9.
  9. Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari & Letterio Galletta (2016): Where do your IoT ingredients come from?. In: Procs. of Coordination 2016, LNCS 9686. Springer, pp. 35–50, doi:10.1007/978-3-319-39519-7.
  10. Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari & Letterio Galletta (2017): Tracing where IoT data are collected and aggregated. Logical Methods in Computer Science 13(3:5), pp. 1–38, doi:10.23638/LMCS-13(3:5)2017.
  11. Daniel Brand & Pitro Zafiropulo (1983): On Communicating Finite-State Machines. Journal of the ACM 30(2), pp. 323–342, doi:10.1145/322374.322380.
  12. Pierre-Malo Deniélou & Nobuko Yoshida (2012): Multiparty Session Types Meet Communicating Automata. In: ESOP 2012, pp. 194–213, doi:10.1007/978-3-642-28869-2_10.
  13. Julien Lange & Emilio Tuosto (2015): black101210\p@ plus2\p@ minus5\p@ \z@ plus3\p@ 6\p@ plus3\p@ minus3\p@ \defłeftmarginłeftmargini 2.5\p@ plus1.5\p@ minus\p@ 5\p@ plus2\p@ minus5\p@ıtemsep 2.5\p@ plus1.5\p@ minus\p@łeftmarginłeftmargini 6\p@ plus2\p@ minus2\p@ 3\p@ plus2\p@ minus\p@ıtemsep ChorGram: tool support for choreographic development. Available at https://bitbucket.org/emlio_tuosto/chorgram/wiki/Home.
  14. Julien Lange, Emilio Tuosto & Nobuko Yoshida (2015): From Communicating Machines to Graphical Choreographies. In: POPL15, pp. 221–232, doi:10.1145/2676726.2676964.
  15. Julien Lange, Emilio Tuosto & Nobuko Yoshida (2017): A tool for choreography-based analysis of message-passing software. To appear. Available at http://www.cs.le.ac.uk/~et52/chorgram_betty_ch.pdf.
  16. Robin Milner (1993): Elements of Interaction \begingroupłet [Pleaseinsert\PrerenderUnicode¬≠intopreamble] Turing Award Lecture. CACM 36(1), doi:10.1145/151233.151240.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org