Modularity in logic programming M Bugliesi, E Lamma, P Mello The Journal of Logic Programming 19, 443-502, 1994 | 200 | 1994 |
Boxed ambients M Bugliesi, G Castagna, S Crafa International Symposium on Theoretical Aspects of Computer Software, 38-63, 2001 | 196 | 2001 |
Access control for mobile agents: The calculus of boxed ambients M Bugliesi, G Castagna, S Crafa ACM Transactions on Programming Languages and Systems (TOPLAS) 26 (1), 57-124, 2004 | 121 | 2004 |
Secure safe ambients M Bugliesi, G Castagna Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of …, 2001 | 97 | 2001 |
Content security problems? evaluating the effectiveness of content security policy in the wild S Calzavara, A Rabitti, M Bugliesi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 78 | 2016 |
Communication interference in mobile boxed ambients M Bugliesi, S Crafa, M Merro, V Sassone FST TCS 2002: Foundations of Software Technology and Theoretical Computer …, 2002 | 76 | 2002 |
Reasoning about security in mobile ambients M Bugliesi, G Castagna, S Crafa International Conference on Concurrency Theory, 102-120, 2001 | 64 | 2001 |
CookiExt: Patching the browser against session hijacking attacks M Bugliesi, S Calzavara, R Focardi, W Khan Journal of Computer Security 23 (4), 509-537, 2015 | 59 | 2015 |
A declarative view of inheritance in logic programming M Bugliesi | 59 | 1991 |
Formal methods for web security M Bugliesi, S Calzavara, R Focardi Journal of Logical and Algebraic Methods in Programming 87, 110-126, 2017 | 56 | 2017 |
Automata, languages and programming C Dwork, M Bugliesi, B Preneel, V Sassone 33rd international colloquium, ICALP, 2006 | 56 | 2006 |
Communication and mobility control in boxed ambients M Bugliesi, S Crafa, M Merro, V Sassone Information and Computation 202 (1), 39-86, 2005 | 56 | 2005 |
Semantics-based analysis of content security policy deployment S Calzavara, A Rabitti, M Bugliesi ACM Transactions on the Web (TWEB) 12 (2), 1-36, 2018 | 54 | 2018 |
Information flow security for boxed ambients S Crafa, M Bugliesi, G Castagna Electronic Notes in Theoretical Computer Science 66 (3), 76-97, 2002 | 51 | 2002 |
Subtyping constraints for incomplete objects V Bono, M Bugliesi, M Dezani-Ciancaglini, L Liquori TAPSOFT'97: Theory and Practice of Software Development: 7th International …, 1997 | 42 | 1997 |
Lintent: Towards security type-checking of Android applications M Bugliesi, S Calzavara, A Spanò International Conference on Formal Methods for Open Object-Based Distributed …, 2013 | 41 | 2013 |
Authenticity by tagging and typing M Bugliesi, R Focardi, M Maffei Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004 | 40 | 2004 |
Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication S Calzavara, G Tolomei, M Bugliesi, S Orlando Proceedings of the 23rd international conference on World wide web, 189-200, 2014 | 38 | 2014 |
Differential logic programming A Bossi, M Bugliesi, M Gabbrielli, G Levi, MC Meo Proceedings of the 20th ACM SIGPLAN-SIGACT symposium on Principles of …, 1993 | 38 | 1993 |
Dynamic types for authentication M Bugliesi, R Focardi, M Maffei Journal of Computer Security 15 (6), 563-617, 2007 | 37 | 2007 |