Michele Bugliesi Curriculum Vitæ - PDF

Description
Michele Bugliesi Curriculum Vitæ Aprile 2014 Università Ca Foscari, Venezia Fax: Via Torino 155 Phone: Venezia - Mestre, Italy Profilo di ricerca

Please download to get full document.

View again

of 15
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information
Category:

Press Releases

Publish on:

Views: 9 | Pages: 15

Extension: PDF | Download: 0

Share
Transcript
Michele Bugliesi Curriculum Vitæ Aprile 2014 Università Ca Foscari, Venezia Fax: Via Torino 155 Phone: Venezia - Mestre, Italy Profilo di ricerca Professore Ordinario di Informatica. Analisi statica Verifica di Programmi Sicurezza Sistemi Distribuiti. Carriera Accademica Professore Ordinario 11/2006 oggi Dipartimento di Scienze Ambientali, Informatica e Statistica Università Ca Foscari. Profssore Associato 9/ /2006 Dipartimento di Informatica, Università Ca Foscari. Ricercatore 11/1998 8/2000 Dipartimento di Informatica, Università Ca Foscari. Ricercatore 12/ /1998 Dip. Matematica Pura ed Applicata, Università di Padova. Esperienze didattiche e di ricerca internazionali Visiting Scientist 6/2007 7/2007 Laboratoire PPS, Université Paris VII, Paris, France Visiting Scientist 7/2004 8/2004 University of Sussex, Department of Computer Science, Brighton. Invited Professor 2/2000 2/2000 École Normale Supérieure, Dépt. d Informatique, Paris, France Visting Lecturer 1/1999 5/1999 Dept. of Computer Science, Boston University, MA, USA Esperienze nel settore privato Co-fondatore 2011 oggi Digitalview SRL. (Spin-off Ca Foscari). Co-fondatore DS Logics, s.r.l. Bologna. Senior Software Engineer 6/1990 5/ 1992 DS Logics, s.r.l. Bologna. Software Engineer 11/1987 6/1990 ENIDATA S.p.A. / ARS S.p.A. Bologna. 1 Titoli di studio Université Paris VII Didier-Diderot 2003 Doctorat en Infomatique. Purdue University 1992 MSc in Computer Science. Università di Pisa 1987 Laurea in Scienze dell Informazione. Premi e riconoscimenti * Premio per il EATCS Best Theory Paper alla European Joint Conferences on Theory and Practice of Software (ETAPS 2013). * Vincitore della Borsa Fullbright per studiare a Purdue University, USA. Interessi di ricerca * 2001 oggi: Sicurezza nei sistemi distribuiti Verifica delle proprietà di sicurezza in sistemi distribuiti basata su tecniche delle algebre di processo e dei sistemi di tipo. * 2001 oggi: Protocolli Crittorafici Verifica formale dei protocolli di sicurezza mediante sistemi di tipo e equivalenze osservazionali. * : Fondamenti dei linguaggi Orientati agli oggetti Teorie di tipo, sistemi di inferenze di tipo, e semantica per calcoli ad oggetti. * : Programmazione Logica. Estensione della programmazione logica con costrutti per la modularità e la programmazione ad oggetti. Tecniche di valutazione parziale. Attività Didattica Corsi di Laurea Magistrale * Programmazione Funzionale. Laurea in Scienze dell Informazione, Laurea Magistrale in Informatica, Ca Foscari * Compilatori Laurea Magistrale in Informatica, Ca Foscari oggi. * Sistemi di Tipo per Linguaggi ad Oggetti. Dottorato in Matematica Computazionale e Informatica. Università di Padova Corsi di Laurea Triennale * Metodologie di Programmazione. Laurea Triennale in Informatica, Laurea in Scienze dell Informazione, Ca Foscari * Programmazione a Oggetti. Laurea Triennale in Informatica, Ca Foscari oggi. * Algoritmi e Strutture Dati. Laurea in Scienze dell Informazione, Laurea Triennale in Informatica, Ca Foscari * Concepts of Programming Languages. College of Arts and Sciences. Boston * Teoria e Applicazioni delle Macchine Calcolatrici. Laurea in Matematica. Università di Padova * Fondamenti dei Linguaggi di Programmazione. Laurea in Matematica. Università di Padova Contratti e Proposte di Ricerca * ADAPT Accessible Data for Accessible Proto-Types in the Social Sector. MIUR. Smart Cities Responsabile Scientifico per DAIS. (e ) * Certificazione di sicurezza per applicazioni mobili e web POR FESR Responsabile Scientifico. (e ) * Sicurezza e Privacy per piattaforme Mobile Enterprise 2.0. POR FESR Responsabile Scientifico. (e ). * CINA Compositionality, Interaction, Negotiation, Autonomicity. MIUR. PRIN Responsabile di Unità. (e in totale) * IPODS Interacting Processes in Open-ended Distributed Systems. MIUR. PRIN CO-PI, Responsabile di Unità. (e in totale) * Analisi e Riinegnerizzazione di Codice Legacy Regione Veneto. POR FESR Responsabile Scientifico (e ). * Logical Foundations of Distributed Systems and Mobile Code: MIUR. PRIN Responsabile Scientifico Nazionale (e in totale) * COMMA Control Mechanisms in Mobile Ambients. EPSRC Visiting Fellowship: June 1 - July 31, Responsabile Scientifico per Venezia. (8.000 Sterline inglesi) * MYTHS Models and Types for Security in Mobile Distributed Systems. IST Project, FET Proactive Initiative Global Computing : Jan Jan Responsabile Scientifico di Unità. (e in totale) * Static Analysis Techniques for Mobility and Security on Internet. France-Italy Azione Integrata GALILEO Responsabile Scientifico locale (e 6.000). Coordinamento di attività di innovazione sociale e tecnologica Membro del Comitato di Gestione 2014 oggi Associazione Treviso Smart Community Membro del Comitato Scientifico 2014 oggi Progetto Ca Foscari Regione del Veneto per l osservatorio e il monitoraggio dei processi di sanità territoriale Membro del Comitato Scientifico Nesting. S.c.a.r.l. Supervisione di Studenti di Dottorato * Wilayat Khan oggi. * Stefano Calzavara, Static Verification and Enforcement of Authorization Policies. (Attualmente Assegnista di Ricerca, Ca Foscari). * Giuseppe Maggiore Casanova: a language for making games. (Attualmente Lecturer, NHTV Univesità di Breda). * Alvise Spanò, PhD Information Extraction by Type Analysis. (Attualmente Assegnista di Ricerca, Ca Foscari). * M-P. Perinato. MSc Development of a Privacy Preserving Liferay Portal document synchronizer for Android. * Paolo Modesti. PhD Verified Security Protocol Modeling and Implementation with AnBx. (Postoc, Università di Newcastle). * Marco Giunti, PhD Secure Implementations of Typed Channel Ab- 3 stractions. (Postdoc, Università di Lisbona). * Silvia Crafa, PhD Models and Types for Wide Area Computing: The calculus of Boxed Ambients. (Ricercatrice, Università di Padova). Supervisione di Studenti di Laurea Magistrale (dal 2009) * M-P. Perinato. MSc Development of a Privacy Preserving Liferay Portal document synchronizer for Android. * E. Costa. MSc Differential Privacy and Trajectories * A. Frazza. MSc An Information Flow Type System for Android. * Tobia Zambon. MSc. Abstract interpretation in legacy COBOL code * Francesco Restifo. MSc. LALR Parsing Techniques for COBOL * Giovanni Bernardi. MSc. A Theory of Adaptable Contract-Based Service Composition (PhD Trinity College, Dublin). * L. Pino. MSc. A Theory of compliance in web services choreographies (PhD. UCL, London). * Federico Ulliana. MSc A formal study for type system for XQuery Optimization. (Postdoc, LIG Grenoble). Supervisione di Assegnisti e Postdoc * Alvise Spanò, * Stefano Calzavara, * Hamadou Sardaouna, * Damiano Macedonio, * Dario Colazzo, * Silvia Crafa, Pubblicazioni Rivieste Internazionali [1] M. Bugliesi, A. Marin, and S. Rossi. Model Checking Adaptive Service Compositions. Science of Computer Programmaing, xx(xx):xx, To appear. Revised and extended version of [38]. [2] Michele Bugliesi, Lucia Gallina, Andrea Marin, Sabina Rossi, and Sardaouna Hamadou. Behavioral equivalences and interference metrics for mobile ad-hoc networks. Performance Evaluation, 73:41 72, Revised and extended version of [31]. [3] M. Bugliesi and V. Sassone. Selected Papers of the Conference International Colloquium on Automata, Languages and Programming Logical Methods in Computer Science, Editorial. [4] M. Bugliesi and R. Focardi. Channel abstractions for network security. Mathematical Structures in Computer Science, 20(1):3 44, Revised and extended version of [40] and [39]. [5] M. Bugliesi, D. Colazzo, S. Crafa, and D. Macedonio. A type system for discretionary access control. Mathematical Structures in Computer Science, 19: , Revised and extended version of [45]. 4 [6] F. Barbanera, M. Bugliesi, M. Dezani-Ciancaglini, and V. Sassone. Space-Aware Ambients and Processes. Theor. Comput. Sci., 373(1-2):41 69, Revised and extended version of [51]. [7] M. Bugliesi, R. Focardi, and M. Maffei. Dynamic Types for Authentication. Journal of Computer Security, 15(6): , Revised and extended version of [46]. [8] M. Bugliesi and S. Rossi. Non Interference Proof Techniques for the Analysis of Cryptographic Protocols. Journal of Computer Security, 13(1):87 113, Revised and extended version of [48]. [9] M. Bugliesi, S. Crafa, M. Merro, and V. Sassone. Communication and Mobility Control in Boxed Ambients. Information and Computation, 202(1):39 86, Revised and extended version of [53]. [10] M. Bugliesi, G. Castagna, and S. Crafa. Access Control for Mobile Agents: the Calculus of Boxed Ambients. ACM Transactions on Programming Languages and Systems (TOPLAS), 26(1):57 124, Revised and extended version of [56] and [58]. [11] M. Bugliesi and G. Castagna. Behavioral Typing for Safe Ambients. Computer Languages, 28(1):61 99, Revised and extended version of [57]. [12] V. Bono, M. Bugliesi, and S. Crafa. Typed Interpretations of Extensible Objects. ACM Transactions on Computational Logic (TOCL), 3(4): , Revised and extended version of [63]. [13] M. Bugliesi and S Pericas-G. Type Inference for Variant Object Types. Information and Computation, 177(1):2 27, Revised and extended version of [62]. [14] M. Bugliesi, G. Delzanno, L. Liquori, and M. Martelli. Object Calculi in Linear Logic. Journal of Logic and Computation, 10(1):75 104, Revised and extended version of [68]. [15] V. Bono and M. Bugliesi. Matching for the Lambda Calculus of Objects. Theoretical Computer Science, 212(1-2): , Revised and extended version of [65]. [16] V. Bono, Bugliesi M., L. Liquori, and M. Dezani-Ciancaglini. A Subtyping for Extensible, Incomplete Objects. Fundamenta Informaticae, 38(4): , Revised and extended version of [66]. [17] M. Bugliesi, A. Ciampolini, E. Lamma, and P. Mello. Optimizing Modular Logic Language. ACM Computing Surveys, 30(3):10 15, [18] A. Bossi, M. Bugliesi, M. Gabbrielli, M.C. Meo, and G. Levi. Differential Logic Programming: Programming Methodologies and Semantics. Science of Computer Programmaing, 27(3): , Revised and extended version of [71]. [19] M. Bugliesi, E. Lamma, and P. Mello. Modularity in Logic Programming. Journal of Logic Programming, (19,20): , [20] M. Bugliesi, E. Lamma, and P. Mello. Partial Deduction for Structured Logic Programming. Journal of Logic Programming, 16:89 122, Revised and extended version of [78]. 5 Atti di Conferenze Internazionali con Revisione [21] Stefano Calzavara, Gabriele Tolomei, Michele Bugliesi, and Salvatore Orlando. Quite a mess in my cookie jar! leveraging machine learning to protect web authentication. In 23rd International World Wide Web Conference (WWW 2014), pages xx xx. ACM, To appear. [22] Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, and Wilayat Khan. Automatic and robust client-side protection for cookie-based sessions. In International Symposium on Engineering Secure Software and Systems (ESSOS 2014), volume 8364 of Lecture Notes in Computer Science, pages Springer, [23] Michele Bugliesi, Stefano Calzavara, and Alvise Spanò. Lintent: Towards security typechecking of android applications. In Formal Techniques for Distributed Systems - Joint IFIP WG 6.1 International Conference, FMOODS/FORTE Florence, Italy, June 3-5, Proceedings, volume 7892 of Lecture Notes in Computer Science, pages Springer, [24] Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei. Logical foundations of secure resource management. In International Conference of Principles of Security and Trust (POST 2013), volume 7796 of Lecture Notes in Computer Science, pages Springer, [25] Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei. Affine refinement types for authentication and authorization. In Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers, volume 8191 of Lecture Notes in Computer Science, pages Springer, [26] Giuseppe Maggiore, Alvise Spanò, Renzo Orsini, Michele Bugliesi, Mohamed Abbadi, and Enrico Steffinlongo. A formal specification for casanova, a language for computer games. In ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS 12, Copenhagen, Denmark - June 25-28, 2012, pages ACM, [27] Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, and Marco Squarcina. Gran: Model checking grsecurity rbac policies. In 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pages IEEE, [28] Giuseppe Maggiore, Pieter Spronck, Renzo Orsini, Michele Bugliesi, Enrico Steffinlongo, and Mohamed Abbadi. Writing real-time.net games in casanova. In Entertainment Computing - ICEC th International Conference, ICEC 2012, Bremen, Germany, September 26-29, Proceedings, volume 7522 of Lecture Notes in Computer Science, pages Springer, [29] Giuseppe Maggiore, Alvise Spanò, Renzo Orsini, Giulia Costantini, Michele Bugliesi, and Mohamed Abbadi. Designing casanova: A language for games. In ACG Advances in Computer Games - 13th International Conference, ACG 2011, Tilburg, The Netherlands, November 20-22, 2011, Revised Selected Papers, volume 7168 of Lecture Notes in Computer Science, pages Springer-Verlag, [30] Giuseppe Maggiore, Fabio Pittarello, Michele Bugliesi, and Mohamed Abbadi. A compilation technique to increase x3d performance and safety. In Proceedings of the ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy, March 26-30, 2012, pages ACM, [31] Michele Bugliesi, Lucia Gallina, Andrea Marin, Sabina Rossi, and Sardaouna Hamadou. Interference-sensitive preorders for manets. In Ninth International Conference on Quantitative Evaluation of Systems, QEST 2012, London, United Kingdom, September 17-20, 2012, pages IEEE Computer Society, [32] Alvise Spanò, Michele Bugliesi, and Agostino Cortesi. Type-flow analysis for legacy cobol code. In ICSOFT (2), pages SciTePress, [33] M. Bugliesi, S. Calzavara, F. Eigner, and M. Maffei. Resource-aware authorization policies for statically typed cryptographic protocols. In Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, pages IEEE Computer Society, [34] Giuseppe Maggiore, Alvise Spanò, Renzo Orsini, Giulia Costantini, Michele Bugliesi, and Mohamed Abbadi. Designing casanova: A language for games. In Advances in Computer Games - 13th International Conference, ACG 2011, Tilburg, The Netherlands, November 20-22, 2011, Revised Selected Papers, volume 7168 of Lecture Notes in Computer Science, pages Springer, [35] M. Bugliesi and P. Modesti. Abstractions for Distributed Protocol Design. In ARSPA- WITS 2010, volume 6186 of Lecture Notes in Computer Science, pages Springer- Verlag, [36] M. Bugliesi, S. Calzavara, and D. Macedonio. Secrecy and Authenticity Types for Distributed Messaging. In ARSPA-WITS 2010, volume 6186 of Lecture Notes in Computer Science, pages Springer-Verlag, [37] G. Bernardi, M. Bugliesi, D. Macedonio, and S. Rossi. A theory of adaptable contractbased service composition. In 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC/GLOBALCOMP 08), pages IEEE Press, [38] G. Bernardi, M. Bugliesi, D. Macedonio, and S. Rossi. Compliance preorders for web services. In WS-FM 2009, volume 6194 of Lecture Notes in Computer Science, pages Springer-Verlag, [39] M. Bugliesi and R. Focardi. Security abstractions and intruder models. In SecCo & Express 2008, number 242 in ENTCS, pages Elsevier Science, [40] M. Bugliesi and R. Focardi. Language based secure communication. In CSF 2008, Proceedings of the 21st IEEE Computer Security Foundations Symposium, Pittsburgh, Pennsylvania., pages IEEE Computer Society, [41] M. Bugliesi and M. Giunti. Secure Implementations of Typed Channel Abstractions. In POPL 07, ACM Symposium on Principles of Programming Languages, pages ACM Press, [42] M. Bugliesi, D. Macedonio, and S. Rossi. Static vs dynamic typing for access control in pi-calculus. In ASIAN Computer and Network Security, 12th Asian Computing Science Conference, volume 4846 of Lecture Notes in Computer Science, pages , [43] M. Bugliesi. Typed Access Control in Untyped Contexts. In TGC 05 Symposium on Trustworthy Global Computing, number 3705 in LNCS, pages 19 32, [44] M. Bugliesi, R. Focardi, and M. Maffei. Analysis of Typed Analyses of Authentication Protocols. In CSFW 05, IEEE Computer Security Foundation Workshop, pages , [45] M. Bugliesi, D. Colazzo, and S. Crafa. Type Based Discretionary Access Control. In CONCUR 04, Int. Conference on Concurrency Theory, number 3170 in LNCS, pages , [46] R. Bugliesi, M. Focardi and M. Maffei. Authentiticy by Tagging and Typing. In FMSE 04, ACM Workshop on Formal Methods in Software Engineering, [47] M. Bugliesi, R. Focardi, and M. Maffei. Compostional Analysis of Entity Authentication Protocols. In ESOP 04, European Symposium on Programming, number 2986 in LNCS, pages , [48] M. Bugliesi, A. Ceccato, and S. Rossi. Non Interference Proof Techniques for the Analysis of Cryptographic Protocols. In WITS 03, Workshop on Issues in the Theory of Security. Electronic Proceedings, [49] M. Bugliesi, Ceccato A., and Rossi S. Context-Sensitive Equivalences for Non- Interference based Protocol Analysis. In FCT 03, International Symposium on Fundamentals of Computing, number 2751 in LNCS, pages Springer Verlag, [50] M. Bugliesi, S. Crafa, Prelic A., and V. Sassone. Secrecy in Untrusted Networks. In ICALP 03, Int. Colloquium on Automata Languages and Programming, number 2719 in LNCS, pages Springer Verlag, [51] F. Barbanera, M. Bugliesi, M. Dezani-Ciancaglini, and V. Sassone. A Calculus of Bounded Capacities. In ASIAN 03, Eighth Asian Computing Science Conference, number 2896 in LNCS, pages , [52] M. Bugliesi, R. Focardi, and M. Maffei. Principles for Entity Authentication. In PSI 2003, Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, number 2890 in LNCS, pages Springer Verlag, [53] M. Bugliesi, S. Crafa, M. Merro, and V. Sassone. Communication Interference in Mobile Boxed Ambients. In FSTTCS 02, Int. Conf. on Foundations of Software Technology and Theoretical Computer Science, number 2556 in LNCS, pages Springer Verlag, [54] S. Crafa, M. Bugliesi, and G. Castagna. Information Flow Security for Boxed Ambients. In F-WAN, Int. Workshop on Foundations of Wide Area Networks, number 66(3) in ENTCS. Elsevier Science, [55] M. Bugliesi, G. Castagna, and S. Crafa. Subtyping and Matching for Mobile Objects. In ICTCS 01, Italian Conference on Theoretical Computer Science, number 2202 in LNCS, pages Springer-Verlag, [56] M. Bugliesi, G. Castagna, and S. Crafa. Boxed Ambients. In TACS 01, Int. Conference on Theoretical Aspects of Computer Science, number 2215 in LNCS, pages Springer-Verlag, [57] M. Bugliesi and G. Castagna. Secure Safe Ambients. In POPL 01, ACM Symposium on Principles of Programming Languages, pages ACM Press, [58] M. Bugliesi, G. Castagna, and S. Crafa. Reasoning about security in Mobile Ambients. In CONCUR 01, Int. Conference on Concurrency Theory, number 2154 in LNCS, pages Springer-Verlag, [59] M. Bugliesi and G. Castagna. Secure Safe Ambients and JVM Security. In WITS 00, Workshop on Issues in the Theory of Security Electronic Proceedings, [60] M. Bugliesi and G. Castagna. Mobile Objects. In FOOL 7, Int. Workshop on Foundations of Object Oriented Languages. Electronic Proceedings., [61] M. Bugliesi, G. Castagna, and S. Crafa. Typed Mobile Objects. In CONCUR2000, Int. Conference on Concurrency Theory, number 1877 in LNCS, pages Springer- Verlag, [62] M. Bugliesi and S. Pericas-G. Depth Subtyping and Type Inference for Object Calculi. In FOOL 7, Int. Workshop on Foundations of Object Oriented Languages. Electronic Proceedings., [63] V. Bono and M. Bugliesi. Interpretations of Extensible Objects and Types. In FCT 99, Int. Symposium on Fundamentals of Computing, number 1684 in LNCS, pages Springer-Verlag, [64] M. Bugliesi and S. Crafa. Object Calculi with Dynamic Messages. In FOOL 6, Int. Workshop on Foundations of Object Oriented La
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks