L. Spalazzi - Academia.edu (original) (raw)

Art Schneiderheinze related author profile picture

Loizos Symeou related author profile picture

Yiasemina Karagiorgi related author profile picture

Rodrigo Zaroni related author profile picture

Professor Jesus Martinez related author profile picture

Gwo-dong  Chen related author profile picture

Anastasios A Economides related author profile picture

Elissavet  Georgiadou related author profile picture

Dan  Surry related author profile picture

Dawn Wright related author profile picture

Uploads

Papers by L. Spalazzi

Research paper thumbnail of Socially-Based Design of Distributed Agent System

Socially-Based Design of Distributed Agent System

Research paper thumbnail of Programming Planners with Flexible Architectures

Programming Planners with Flexible Architectures

Workshops in Computing, 1993

Research paper thumbnail of A Logic of Belief and a Model Checking Algorithm for Security Protocols

Formal Methods for Distributed System Development, 2000

Model checking is a very successful technique which has been applied in the design and verificati... more Model checking is a very successful technique which has been applied in the design and verification of finite state concurrent reactive processes. In this paper we show how this technique can be used for the verification of security protocols using a logic of belief. The underlying idea is to treat separately the temporal evolution and the belief aspects of principals. In practice, things work as follows: when we consider the temporal evolution of a principal we treat belief atoms (namely, atomic formulae expressing belief) as atomic propositions. When we deal with the beliefs of a principal § , we model its beliefs about another principal¨as the fact that § has access to a representation of¨as a process. Then, any time it needs to verify the truth value of some belief atom about¨, e.g.,© , § simply tests whether, e.g., holds in its (appropriate) representation of¨. Beliefs are essentially used to control the "jumping" among processes. Our approach allows us to reuse the technology and tools developed in model checking.

Research paper thumbnail of Inter Data

Research paper thumbnail of Evaluation of Cooperation Strategies for Mediator-based Systems

Evaluation of Cooperation Strategies for Mediator-based Systems

Research paper thumbnail of Implementing planning as tactical reasoning

I n this p a p e r we present a system (called MRG) for the development of planners that have t o... more I n this p a p e r we present a system (called MRG) for the development of planners that have t o work in real-world, complex and unpredictable application domains. The idea underlying MRG is that domain independent problem solving architectures, instead of featuring powerful but fixed control mechanisms, should provide powerful and flexible tools for the definition of domain dependent control mechanisms. Complex strategies and control mechanisms are uniformly represented an MRG b y tactics, explicit data structures that can be reused, modified, reasoned about and executed. A t the m oment, MRG is being successfully used within a c o mplex real world application under development at IRS T.

Research paper thumbnail of Recent developments in high performance computing and security: An editorial

Future Generation Computer Systems, 2013

Fig. 1. A classification of defenses in HPC systems.

Research paper thumbnail of A goal-oriented framework tocope with requirements changes: tropos and alan

A goal-oriented framework tocope with requirements changes: tropos and alan

Research paper thumbnail of Socially-Based Design of Distributed Agent System

Socially-Based Design of Distributed Agent System

Research paper thumbnail of Programming Planners with Flexible Architectures

Programming Planners with Flexible Architectures

Workshops in Computing, 1993

Research paper thumbnail of A Logic of Belief and a Model Checking Algorithm for Security Protocols

Formal Methods for Distributed System Development, 2000

Model checking is a very successful technique which has been applied in the design and verificati... more Model checking is a very successful technique which has been applied in the design and verification of finite state concurrent reactive processes. In this paper we show how this technique can be used for the verification of security protocols using a logic of belief. The underlying idea is to treat separately the temporal evolution and the belief aspects of principals. In practice, things work as follows: when we consider the temporal evolution of a principal we treat belief atoms (namely, atomic formulae expressing belief) as atomic propositions. When we deal with the beliefs of a principal § , we model its beliefs about another principal¨as the fact that § has access to a representation of¨as a process. Then, any time it needs to verify the truth value of some belief atom about¨, e.g.,© , § simply tests whether, e.g., holds in its (appropriate) representation of¨. Beliefs are essentially used to control the "jumping" among processes. Our approach allows us to reuse the technology and tools developed in model checking.

Research paper thumbnail of Inter Data

Research paper thumbnail of Evaluation of Cooperation Strategies for Mediator-based Systems

Evaluation of Cooperation Strategies for Mediator-based Systems

Research paper thumbnail of Implementing planning as tactical reasoning

I n this p a p e r we present a system (called MRG) for the development of planners that have t o... more I n this p a p e r we present a system (called MRG) for the development of planners that have t o work in real-world, complex and unpredictable application domains. The idea underlying MRG is that domain independent problem solving architectures, instead of featuring powerful but fixed control mechanisms, should provide powerful and flexible tools for the definition of domain dependent control mechanisms. Complex strategies and control mechanisms are uniformly represented an MRG b y tactics, explicit data structures that can be reused, modified, reasoned about and executed. A t the m oment, MRG is being successfully used within a c o mplex real world application under development at IRS T.

Research paper thumbnail of Recent developments in high performance computing and security: An editorial

Future Generation Computer Systems, 2013

Fig. 1. A classification of defenses in HPC systems.

Research paper thumbnail of A goal-oriented framework tocope with requirements changes: tropos and alan

A goal-oriented framework tocope with requirements changes: tropos and alan

Log In