{"id":"https://openalex.org/W2168688913","doi":"https://doi.org/10.1016/s1571-0661(04)80684-4","title":"A formal approach for checking security properties in SecSpaces1 1Work partially supported by MEFISTO Progetto \u201cMetodi Formali per la Sicurezza e il Tempo\u201d and Microsoft Research Europe.","display_name":"A formal approach for checking security properties in SecSpaces1 1Work partially supported by MEFISTO Progetto \u201cMetodi Formali per la Sicurezza e il Tempo\u201d and Microsoft Research Europe.","publication_year":2003,"publication_date":"2003-08-01","ids":{"openalex":"https://openalex.org/W2168688913","doi":"https://doi.org/10.1016/s1571-0661(04)80684-4","mag":"2168688913"},"language":"en","primary_location":{"id":"doi:10.1016/s1571-0661(04)80684-4","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80684-4","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/s1571-0661(04)80684-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087497204","display_name":"Roberto Lucchi","orcid":null},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Roberto Lucchi","raw_affiliation_strings":["Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066677397","display_name":"Mario Bravetti","orcid":"https://orcid.org/0000-0001-5193-2914"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Mario Bravetti","raw_affiliation_strings":["Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000720054","display_name":"Roberto Gorrieri","orcid":"https://orcid.org/0000-0001-5502-0584"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Roberto Gorrieri","raw_affiliation_strings":["Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze dell'Informazione, Universit\u00e0 di Bologna, Mura Anteo Zamboni 7, I-40127 Bologna, Italy","institution_ids":["https://openalex.org/I9360294"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000720054","https://openalex.org/A5066677397","https://openalex.org/A5087497204"],"corresponding_institution_ids":["https://openalex.org/I9360294"],"apc_list":null,"apc_paid":null,"fwci":1.8877,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88497376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"54","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6800199151039124},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.5387107133865356},{"id":"https://openalex.org/keywords/geodetic-datum","display_name":"Geodetic datum","score":0.5339381098747253},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5296596884727478},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5222017168998718},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5180302262306213},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4838884770870209},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.47384530305862427},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4365186095237732},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.42741188406944275},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42311254143714905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3078426718711853},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18049609661102295},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1376396119594574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6800199151039124},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.5387107133865356},{"id":"https://openalex.org/C58754882","wikidata":"https://www.wikidata.org/wiki/Q1502887","display_name":"Geodetic datum","level":2,"score":0.5339381098747253},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5296596884727478},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5222017168998718},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5180302262306213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4838884770870209},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.47384530305862427},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4365186095237732},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.42741188406944275},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42311254143714905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3078426718711853},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18049609661102295},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1376396119594574},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/s1571-0661(04)80684-4","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80684-4","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:zenodo.org:26389","is_oa":true,"landing_page_url":"https://www.openaccessrepository.it/record/26389","pdf_url":null,"source":{"id":"https://openalex.org/S4306402478","display_name":"INFM-OAR (INFN Catania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210116497","host_organization_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Catania","host_organization_lineage":["https://openalex.org/I4210116497"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1016/s1571-0661(04)80684-4","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80684-4","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1480908949","https://openalex.org/W1513989276","https://openalex.org/W1562901937","https://openalex.org/W1591291626","https://openalex.org/W1595284105","https://openalex.org/W1644882639","https://openalex.org/W1977764760","https://openalex.org/W1981994545","https://openalex.org/W1987603655","https://openalex.org/W1987986558","https://openalex.org/W1994676271","https://openalex.org/W2068369715","https://openalex.org/W2117666062","https://openalex.org/W2148586346","https://openalex.org/W2156688573","https://openalex.org/W2157144873","https://openalex.org/W2161307885","https://openalex.org/W2161353020","https://openalex.org/W4285719527","https://openalex.org/W6630637541","https://openalex.org/W6758942801"],"related_works":["https://openalex.org/W2049993111","https://openalex.org/W2145025660","https://openalex.org/W2171674700","https://openalex.org/W1922520186","https://openalex.org/W1544097700","https://openalex.org/W1946493810","https://openalex.org/W1553537032","https://openalex.org/W1495250406","https://openalex.org/W17088386","https://openalex.org/W1608485412"],"abstract_inverted_index":{"SecSpaces":[0,50],"is":[1,8],"a":[2,11,23,42,62,108],"Linda-like":[3],"coordination":[4,15],"model":[5,78],"whose":[6],"aim":[7],"to":[9,25,29,72,83,98],"provide":[10],"support":[12],"for":[13,45,79],"secure":[14],"in":[16,33,57],"Open":[17],"System":[18],"applications.":[19],"Substantially":[20],"it":[21],"provides":[22],"methodology":[24],"restrict":[26],"the":[27,30,34,74,77,81,84],"access":[28,82],"objects":[31],"stored":[32],"shared":[35,85],"dataspace.":[36],"In":[37,70],"this":[38,58],"paper":[39],"we":[40,60,87],"introduce":[41],"formal":[43],"language":[44],"representing":[46],"systems":[47],"interacting":[48],"via":[49],"primitives":[51],"and":[52],"its":[53],"operational":[54],"semantics.":[55],"Moreover":[56],"context":[59],"consider":[61],"notion":[63],"of":[64,76,91,107],"observational":[65],"equivalence,":[66],"namely":[67],"testing":[68],"equivalence.":[69],"order":[71],"evaluate":[73],"adequacy":[75],"limiting":[80],"dataspace,":[86],"present":[88],"some":[89,100],"examples":[90],"interaction":[92],"protocols":[93],"that":[94],"can":[95],"be":[96],"used":[97],"obtain":[99],"security":[101],"properties":[102],"(e.g.,":[103],"authentication":[104],"or":[105],"privacy":[106],"datum).":[109]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
