Abstract is missing.
- Pierpaolo DeganoChiara Bodei, Gian Luigi Ferrari, Corrado Priami. 1-6 [doi]
- Pierpaolo, a Great FriendMarco Maria Massai. 7-9 [doi]
- Distributed Authorization with Distributed GrammarsMartín Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly. 10-26 [doi]
- Causal Trees, FinallyRoberto Bruni, Ugo Montanari, Matteo Sammartino. 27-43 [doi]
- Limited Disclosure and Locality in GraphsJoshua D. Guttman. 44-46 [doi]
- Hoare Logic for Disjunctive Information FlowHanne Riis Nielson, Flemming Nielson, Ximeng Li. 47-65 [doi]
- Alice and Bob: Reconciling Formal Models and ImplementationOmar Almousa, Sebastian Mödersheim, Luca Viganò. 66-85 [doi]
- Asynchronous Traces and Open Petri NetsPaolo Baldan, Filippo Bonchi, Fabio Gadducci, Giacoma ValentinValentinaMonreale. 86-102 [doi]
- Compliance in Behavioural Contracts: A Brief SurveyMassimo Bartoletti, Tiziana Cimoli, Roberto Zunino. 103-121 [doi]
- Safe Adaptation Through Implicit Effect CoercionDavide Basile, Letterio Galletta, Gianluca Mezzetti. 122-141 [doi]
- Validation of Decentralised Smart Contracts Through Game Theory and Formal MethodsGiancarlo Bigi, Andrea Bracciali, Giovanni Meacci, Emilio Tuosto. 142-161 [doi]
- Static Evidences for Attack ReconstructionChiara Bodei, Linda Brodo, Riccardo Focardi. 162-182 [doi]
- A Declarative View of Signaling PathwaysDavide Chiarugi, Moreno Falaschi, Carlos Olarte, Catuscia Palamidessi. 183-201 [doi]
- Securing Android with Local PoliciesGabriele Costa. 202-218 [doi]
- Global Protocol Implementations via Attribute-Based CommunicationRocco De Nicola, Claudio Antares Mezzina, Hugo Torres Vieira. 219-237 [doi]
- Symbolic Protocol Analysis with Disequality Constraints Modulo Equational TheoriesSantiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago. 238-261 [doi]
- Language Representability of Finite P/T NetsRoberto Gorrieri. 262-282 [doi]
- Soulmate AlgorithmsFabrizio Luccio, Linda Pagli. 283-291 [doi]
- Active Knowledge, LuNA and Literacy for Oncoming CenturiesVictor Malyshkin. 292-303 [doi]
- There are Two Sides to Every Question - Controller Versus AttackerFabio Martinelli, Ilaria Matteucci, Francesco Santini. 304-318 [doi]
- From Safety Critical Java Programs to Timed Process ModelsBent Thomsen, Kasper Søe Luckow, Lone Leth, Thomas Bøgholm. 319-338 [doi]
- When to Move to Transfer Nets - On the Limits of Petri Nets as Models for Process CalculiGianluigi Zavattaro. 339-353 [doi]
- ℓ: An Imperative DSL to Stochastically Simulate Biological SystemsRoberto Zunino, Durica Nikolic, Corrado Priami, Ozan Kahramanogullari, Tommaso Schiavinotto. 354-374 [doi]