Michele Bugliesi
#126,968
Most Influential Person Now
Italian computer scientist
Michele Bugliesi's AcademicInfluence.com Rankings
Michele Bugliesicomputer-science Degrees
Computer Science
#7279
World Rank
#7666
Historical Rank
Database
#9432
World Rank
#9935
Historical Rank

Download Badge
Computer Science
Michele Bugliesi's Degrees
- PhD Computer Science Consorzio ICoN
Similar Degrees You Can Earn
Why Is Michele Bugliesi Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michele Bugliesi is Full Professor in Computer Science in the Ca' Foscari University of Venice. He has been elected Rector of this University for the mandate 2014-2015 to 2019-2020. Scientific activity Michele Bugliesi works on analysis and formal systems in informatics, with publications on models of communications and logic programming.
Michele Bugliesi's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Modularity in Logic Programming (1994) (178)
- Boxed Ambients (2001) (143)
- Access control for mobile agents: The calculus of boxed ambients (2004) (97)
- Secure safe ambients (2001) (73)
- Communication Interference in Mobile Boxed Ambients (2002) (62)
- A Declarative View of Inheritance in Logic Programming (1992) (50)
- Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild (2016) (47)
- Reasoning about Security in Mobile Ambients (2001) (47)
- Communication and mobility control in boxed ambients (2005) (45)
- Secure implementations of typed channel abstractions (2007) (42)
- Information Flow Security for Boxed Ambients (2002) (36)
- Dynamic types for authentication (2007) (34)
- CookiExt: Patching the browser against session hijacking attacks (2015) (32)
- Authenticity by tagging and typing (2004) (30)
- A Calculus of Bounded Capacities (2003) (30)
- Subtyping Constraints for Incomplete Objects (Extended Abstract) (1997) (29)
- Quite a mess in my cookie jar!: leveraging machine learning to protect web authentication (2014) (28)
- Lintent: Towards Security Type-Checking of Android Applications (2013) (28)
- Compositional Analysis of Authentication Protocols (2004) (27)
- Language Based Secure Communication (2008) (27)
- Semantics-Based Analysis of Content Security Policy Deployment (2018) (26)
- Provably Sound Browser-Based Enforcement of Web Session Integrity (2014) (25)
- A Lambda Calculus of Incomplete Objects (1996) (25)
- Formal methods for web security (2017) (25)
- Analysis of typed analyses of authentication protocols (2005) (25)
- Behavioural typing for safe ambients (2002) (24)
- Automatic and Robust Client-Side Protection for Cookie-Based Sessions (2014) (22)
- Differential logic programming (1993) (22)
- A Subtyping for Extensible, Incomplete Objects (1999) (21)
- A Supervised Learning Approach to Protect Client Authentication on the Web (2015) (21)
- Principles for Entity Authentication (2003) (21)
- Type Based Discretionary Access Control (2004) (20)
- Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols (2011) (19)
- Partial Evaluation in Prolog: Some Improvements about Cut (1989) (18)
- Interference-Sensitive Preorders for MANETs (2012) (18)
- Security protocol specification and verification with AnBx (2016) (17)
- Matching for the lambda Calculus of Objects (1999) (17)
- A Stable Model Semantics for Behavioral Inheritance in Deductive Object Oriented Languages (1995) (17)
- A Linear Logic Calculus Objects (1996) (16)
- Behavioural equivalences and interference metrics for mobile ad-hoc networks (2014) (15)
- Matching Constraints for the Lambda Calculus of Objects (1997) (15)
- Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Lecture Notes in Computer Science) (2006) (15)
- Space-aware ambients and processes (2007) (14)
- A formal specification for casanova, a language for computer games (2012) (14)
- A Logic for Encapsulation in Object Oriented Languages (1994) (14)
- Gran: Model Checking Grsecurity RBAC Policies (2012) (14)
- AnBx - Security Protocols Design and Verification (2010) (13)
- Logical Foundations of Secure Resource Management in Protocol Implementations (2013) (13)
- A New Fixpoint Semantics for Prolog (1993) (13)
- A Theory of Adaptable Contract-Based Service Composition (2008) (12)
- Object calculi in linear logic (2000) (12)
- Compliance Preorders for Web Services (2009) (12)
- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (2015) (11)
- Secrecy in Untrusted Networks (2003) (10)
- Partial Deduction for Structured Logic Programming (1993) (10)
- Sub-session hijacking on the web: Root causes and prevention (2019) (10)
- Client Side Web Session Integrity as a Non-interference Property (2014) (10)
- Typed Mobile Objects (2000) (10)
- Depth Subtyping and Type Inference for Object Calculi (2000) (8)
- A type system for Discretionary Access Control† (2009) (8)
- Monadic Scripting in F# for Computer Games (2011) (8)
- CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition (2017) (8)
- Affine Refinement Types for Secure Distributed Programming (2015) (8)
- Typed Processes in Untyped Contexts (2005) (8)
- Testing for Integrity Flaws in Web Sessions (2019) (7)
- Type Inference for Variant Object Types (2002) (7)
- Partial Evaluation for Hierarchies of Logic Theories (1990) (7)
- Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (2006) (7)
- Designing Casanova: A Language for Games (2011) (7)
- Channel abstractions for network security† (2010) (6)
- Compositional Typed Analysis of ARBAC Policies (2015) (5)
- Non-interference proof techniques for the analysis of cryptographic protocols (2005) (5)
- Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I (2006) (5)
- Interpretations of Extensible Objects and Types (1999) (5)
- Object Calculi with Dynamic Messages (1999) (4)
- Combinatory Forms for Equational Programming: Instances, Unification and Narrowing (1990) (4)
- Behavioral Equivalences and Interference Metrics for Mobile Ad-hoc Networks (2013) (4)
- Typed interpretations of extensible objects (2002) (3)
- Context-Sensitive Equivalences for Non-interference Based Protocol Analysis (2003) (3)
- Writing Real-Time .Net Games in Casanova (2012) (2)
- Subtyping Constraints for In omplete Obje ts (1997) (2)
- Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them (2018) (2)
- Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems (2016) (2)
- Model checking adaptive service compositions (2014) (2)
- SelfLog: Language and Implementation (1993) (2)
- Subtyping Constraints for Incomplete Objects (2018) (2)
- Type-flow Analysis for Legacy COBOL Code (2011) (2)
- Name-passing calculi and crypto primitives: a survey (2004) (2)
- Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (2006) (2)
- Affine Refinement Types for Authentication and Authorization (2012) (2)
- Formal Verification of Liferay RBAC (2015) (2)
- Compositional Analysis of Entity Authentication Protocols (2003) (2)
- Optimizing modular logic languages (1998) (2)
- Secure Implementations of Typed Channel Abstractions (Extended Abstract) (2007) (2)
- Typing Legacy COBOL Code (2011) (1)
- A compilation technique to increase X3D performance and safety (2012) (1)
- On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction (1992) (1)
- Differential Logic Programs: Programming Methodologies and Semantics (1996) (1)
- On Casanova and Databases or the Similarity Between Games and DBs (2012) (1)
- Subtyping and Matching for Mobile Objects (2001) (1)
- Type based dDscretionary Access Control (2004) (1)
- Automata, Languages and Programming (1998) (1)
- Capacity bounded computational ambients (2003) (1)
- Security Abstractions and Intruder Models (2009) (1)
- Security Abstractions and Intruder Models (Extended Abstract) (2009) (1)
- An overview of Boxed Ambients (2002) (1)
- Secure Safe Ambients and JVM Security ( Abstract ) (2000) (1)
- Casanova: a declarative language for safe games (2011) (1)
- LGOAP: simulating realistic agents with Layered Goal Oriented Action Planning (2013) (0)
- Static Verication of Android Security (2013) (0)
- Secrecy and Authenticity Types for Secure Distributed Messaging (2010) (0)
- A Survey of Name-Passing Calculi and Crypto-Primitives (2001) (0)
- Differential Privacy (2013) (0)
- Differential logic programs: semantics and programming methodologies (1993) (0)
- Semantically Sound Analysis of Content Security Policies (2019) (0)
- RAPPORT Differential logic programs : semantics and programming methodologies (2007) (0)
- Compositional Analysis of Authentication Protocols (Full Version) (2003) (0)
- Compiling X 3 D for increased performance and safety (2011) (0)
- Preface (2004) (0)
- Multiparty Session Actors Rumyana Neykova Nobuko Yoshida (2014) (0)
- Non-Interferen e Proof Te hniques for theAnalysis of Cryptographi Proto ols ? (2003) (0)
- Mobile Objects (preliminary Report) (2000) (0)
- First Workshop on Object Oriented Developments - Preface (2003) (0)
- Proceedings of the Workshop on Object-Oriented Developments (WOOD 2004) (2005) (0)
- Static vs Dynamic Typing for Access Control in Pi-Calculus (2007) (0)
- Messge from the ECPE Organizing Committee (2016) (0)
- International Colloquium of Automata, Languages and Programming: Preface to the 'Logical Methods in Computer Science', special issue for ICALP 2006 (2010) (0)
- Design and Analysis of Distributed Protocols with AnBx (2010) (0)
- First Workshop on Object Oriented Developments (WOOD 2003) (2003) (0)
- A Pi-calculus with Dynamic Typing (2008) (0)
- Second Workshop on Object Oriented Developments (WOOD 2004) (2005) (0)
This paper list is powered by the following services:
Other Resources About Michele Bugliesi
What Schools Are Affiliated With Michele Bugliesi?
Michele Bugliesi is affiliated with the following schools: