Luigi Logrippo

Orcid: 0000-0001-8804-0450

Affiliations:
  • Université du Québec en Outaouais (UQO), Gatineau, QC, Canada
  • University of Ottawa, ON, Canada
  • University of Waterloo, ON, Canada (PhD 1974)


According to our database1, Luigi Logrippo authored at least 107 papers between 1969 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN).
J. Cybersecur. Priv., September, 2024

The order-theoretical foundation for data flow security.
CoRR, 2024

2023
Engineering Smart Contracts with Symboleo: A Progress Report.
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering, 2023

2022
Specification and analysis of legal contracts with Symboleo.
Softw. Syst. Model., 2022

Symboleo2SC: from legal contract specifications to smart contracts.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 2022

Model-checking legal contracts with SymboleoPC.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 2022

2021
Multi-level models for data security in networks and in the Internet of things.
J. Inf. Secur. Appl., 2021

Social Requirements Models for Services.
Proceedings of the Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future, 2021

2020
Symboleo: Towards a Specification Language for Legal Contracts.
Proceedings of the 28th IEEE International Requirements Engineering Conference, 2020

Social Dependence Relationships in Requirements Engineering.
Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE 2020), 2020

Subcontracting, Assignment, and Substitution for Legal Contracts in Symboleo.
Proceedings of the Conceptual Modeling - 39th International Conference, 2020

2019
Data flow analysis from capability lists, with application to RBAC.
Inf. Process. Lett., 2019

2018
Configuring Data Flows in the Internet of Things for Security and Privacy Requirements.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

2017
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.
Int. J. Inf. Sec., 2017

Insider Threat Likelihood Assessment for Flexible Access Control.
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017

Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
A Metamodel for Hybrid Access Control Policies.
J. Softw., 2015

Metamodelling with Formal Semantics with Application to Access Control Specification.
Proceedings of the MODELSWARD 2015, 2015

Information Flow-Based Security Levels Assessment for Access Control Systems.
Proceedings of the E-Technologies - 6th International Conference, 2015

2014
Granularity based flow control.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Logical Method for Reasoning About Access Control and Data Flow Control Models.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
A framework for risk assessment in access control systems.
Comput. Secur., 2013

An access control framework for hybrid policies.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Designing flexible access control models for the cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Towards a process for legally compliant software.
Proceedings of the Sixth International Workshop on Requirements Engineering and Law, 2013

2012
Dynamic risk-based decision methods for access control systems.
Comput. Secur., 2012

A Framework for Threat Assessment in Access Control Systems.
Proceedings of the Information Security and Privacy Research, 2012

Platform for privacy preferences (P3P): Current status and future directions.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

CatBAC: A generic framework for designing and validating hybrid access control models.
Proceedings of IEEE International Conference on Communications, 2012

2011
Concrete- and abstract-based access control.
Int. J. Inf. Sec., 2011

Risk-based decision method for access control systems.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

UACML: Unified Access Control Modeling Language.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Risk analysis in access control systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk management in dynamic role based access control systems.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Risk Analysis in Access Control Systems Based on Trust Theories.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

Secrecy UML Method for Model Transformations.
Proceedings of the Abstract State Machines, 2010

Inconsistency detection method for access control policies.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Governance Requirements Extraction Model for Legal Compliance Validation.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

Typing for Conflict Detection in Access Control Policies.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

Interactions among secrecy models - (Work-in-progress paper).
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

2008
Requirements and compliance in legal systems: a logic approach.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008

2007
Detecting feature interactions in CPL.
J. Netw. Comput. Appl., 2007

Distributed resolution of feature interactions for internet applications.
Comput. Networks, 2007

Normative Systems: the meeting point between Jurisprudence and Information Technology? - A position paper.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2007

Conflict Detection in Call Control Using First-Order Logic Model Checking.
Proceedings of the Feature Interactions in Software and Communication Systems IX, 2007

An Agent-Based Architecture for Context-Aware Communication.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Formal detection of feature interactions with logic programming and LOTOS.
Softw. Syst. Model., 2006

Detecting feature interaction in CPL.
Softw. Syst. Model., 2006

Personalization of internet telephony services for presence with SIP and extended CPL.
Comput. Commun., 2006

Foreword - New technologies in distributed systems.
Ann. des Télécommunications, 2006

2005
Interactive conflict detection and resolution for personalized features.
J. Commun. Networks, 2005

Generation of test purposes from Use Case Maps.
Comput. Networks, 2005

Governance Policies for Privacy Access Control and their Interactions.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VIII, 2005

2004
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges.
Comput. Networks, 2004

Directions in feature interaction research.
Comput. Networks, 2004

2002
Graphic visualization and animation of LOTOS execution traces.
Comput. Networks, 2002

Feature Execution Trees and Interactions.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

2000
Use Case Maps and <sub>LOTOS</sub> for the prototyping and validation of a mobile group call system.
Comput. Commun., 2000

Future wireless networks.
Comput. Networks, 2000

Understanding GPRS: the GSM packet radio service.
Comput. Networks, 2000

Feature interaction detection: a LOTOS-based approach.
Comput. Networks, 2000

Deriving use cases for distributed systems from knowledge requirements.
Ann. des Télécommunications, 2000

Structural Coverage For LOTOS - a Probe Insertion Technique.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000

Feature Interaction Filtering with Use Case Maps at Requirements Stage.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000

Immaturity and Potential of Formal Methods: A Personal View.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000

Feature Description and Feature Interaction Analysis with Use Case Maps and LOTOS.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000

1999
Use Case Maps for the Capture and Validation of Distributed Systems Requirements.
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

1998
Formal Spacification and Use Case Generation for a Mobile Telephony System.
Comput. Networks, 1998

Feature Interactions in Telecommunications Software.
Comput. Networks, 1998

Goal-Oriented Feature Interaction Detection in the Intelligent Network Model.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998

1997
Structural Models for Specifying Telephone Systems.
Comput. Networks ISDN Syst., 1997

1996
Group communication models.
Comput. Commun., 1996

Formal Methods after 15 Years: Status and Trends (Paper based on contributions of the panelists at the FORmal TEchnique '95, Conference, Montreal, October 1995).
Comput. Networks ISDN Syst., 1996

1995
The ISO Reference Model for Open Distributed Processing: An Introduction.
Comput. Networks ISDN Syst., 1995

Formal Support for Design Techniques: A Timethreads-LOTOS Approach.
Proceedings of the Formal Description Techniques VIII, 1995

Representing and Verifying Intentions in Telephony Features Using Abstract Data Types.
Proceedings of the Feature Interactions in Telecommunications III, 1995

1994
Feature interaction detection using backward reasoning with LOTOS.
Proceedings of the Protocol Specification, 1994

Specifying features and analysing their interactions in a LOTOS environment.
Proceedings of the Feature Interactions in Telecommunications Systems, 1994

1993
Specifying telephone systems in LOTOS.
IEEE Commun. Mag., 1993

A Validation Environment for LOTOS.
Proceedings of the Protocol Specification, 1993

Specifying Hardware Systems in LOTOS.
Proceedings of the Computer Hardware Description Languages and their Applications, Proceedings of the 11th IFIP WG10.2 International Conference on Computer Hardware Description Languages and their Applications, 1993

1992
An Introduction to LOTOS: Learning by Examples.
Comput. Networks ISDN Syst., 1992

Goal oriented execution for LOTOS.
Proceedings of the Formal Description Techniques, 1992

1991
Formal Specification of Telephone Systems in LOTOS: The Contraint-Oriented Style Approach.
Comput. Networks ISDN Syst., 1991

An expressive trace theory for LOTOS.
Proceedings of the Protocol Specification, 1991

1990
The University of Ottawa LOTOS Toolkit.
Proceedings of the Formal Description Techniques, 1990

A Hoare-style Proof System for LOTOS.
Proceedings of the Formal Description Techniques, 1990

The algebraic specification language LOTOS: an industrial experience.
Proceedings of the Conference proceedings on Formal methods in software development, 1990

1989
Formal Specifications of Telephone Systems in LOTOS.
Proceedings of the Protocol Specification, 1989

Derivation of Test Cases for LAP-B from a LOTOS Specification.
Proceedings of the Formal Description Techniques, 1989

1988
An Interpreter for LOTOS, a Specification Language for Distributed Systems.
Softw. Pract. Exp., 1988

Derivation of Useful Execution Trees from LOTOS by using an Interpreter.
Proceedings of the Formal Description Techniques, 1988

1987
An Atomic Calculus of Communicating Systems.
Proceedings of the Protocol Specification, 1987

1986
Cluster analysis for the computer-assisted statistical analysis of melodies.
Comput. Humanit., 1986

Structure of a LOTOS interpreter.
Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols, 1986

1985
The importance of the service concept in the design of data communications protocols.
Proceedings of the Protocol Specification, 1985

1984
Executable Description of the OSI Transport Service in Prolog.
Proceedings of the Protocol Specification, 1984

1983
File Structures, Program Structures, and Attributed Grammars.
IEEE Trans. Software Eng., 1983

"Constructive" and "Executable" Specifications of Protocol Services by using Abstract Data Types and Finite State Transducers.
Proceedings of the Protocol Specification, Testing, and Verification, III, Proceedings of the IFIP WG 6.1 Third International Workshop on Protocol Specification, Testing and Verification, organized by IBM Research, Rüschlikon, Switzerland, 31 May, 1983

1982
Protocol/Specification-Level Validation.
Proceedings of the Protocol Specification, 1982

1981
Input-directed program design.
Proceedings of the ACM 1981 Annual Conference, Los Angeles, CA, USA, November 9-11, 1981., 1981

1979
Renamings, Maximal Parallelism, and Space-Time Tradeoff in Program Schemata.
J. ACM, 1979

1978
Renamings and Economy of Memory in Program Schemata.
J. ACM, 1978

1972
Renamings in Program Schemas (Extended Abstract)
Proceedings of the 13th Annual Symposium on Switching and Automata Theory, 1972

1969
Storage Interference in Asynchronous Computations
Proceedings of the 10th Annual Symposium on Switching and Automata Theory, 1969


  Loading...