Conference Modeling datalog fact assertion and retraction in linear logic 2012 • PPDP'12 - Proceedings of the 2012 ACM SIGPLAN Principles and Practice of Declarative Programming • 67-78 Lam ESL, Cervesato I
Conference QWeS2T for Type-Safe Web Programming 2012 • EPiC series in computing • 7:96-78 Sans T, Cervesato I
Preprint Relating Reasoning Methodologies in Linear Logic and Process Algebra 2012 Deng Y, Cervesato I, Simmons RJ
Journal Article Relating Reasoning Methodologies in Linear Logic and Process Algebra 2012 • Electronic Proceedings in Theoretical Computer Science • 50-60 Deng Y, Cervesato I, Simmons RJ
Journal Article SPECIAL ISSUE THE FRONTIER BETWEEN DECIDABILITY AND UNDECIDABILITY AND RELATED PROBLEMS PREFACE 2012 • International Journal of Foundations of Computer Science • 23(7):1419-1421 Durand-Lose J, Margenstern M, Sutner K
Conference Trace matching in a concurrent logical framework 2012 • LFMTP'12 - Proceedings of the ACM SIGPLAN Workshop on Logical Frameworks and Meta Languages, Theory and Practice • 1-12 Cervesato I, Pfenning F, Sacchini JL, Schürmann C, Simmons RJ
Journal Article Cryptographically sound security proofs for basic and public-key Kerberos 2011 • International Journal of Information Security • 10(2):107-134 Backes M, Cervesato I, Jaggard AD, Scedrov A, Tsay J-K
Conference Discovering logic through comics 2011 • ITiCSE'11 - Proceedings of the 16th Annual Conference on Innovation and Technology in Computer Science • 103-107 Cervesato I
Conference Getting CS undergraduates to communicate effectively 2011 • ITiCSE'11 - Proceedings of the 16th Annual Conference on Innovation and Technology in Computer Science • 283-287 Karatsolis A, Cervasato I, Harras K, Cooper Y, Oflazer K, Abu-Ghazaleh N, Sans T
Journal Article NEXCEL, A Deductive Spreadsheet 2011 • Qatar Foundation Annual Research Forum Proceedings • csp25 Cervesato I
Journal Article Designing a new programming language for building securecloud computing-based applications 2010 • Qatar Foundation Annual Research Forum Proceedings • cso6 Sans, T, Cervesato I
Journal Article Effective programming for large distributed ensembles 2010 • Qatar Foundation Annual Research Forum Proceedings • cso12 Cervesato I
Journal Article Special Issue on Selected papers of the 5th International Workshop on Formal Aspects of Component Software (FACS'08) Preface 2010 • Science of Computer Programming • 75(10):809-810 Canal C, Pasareanu CS
Journal Article Relating state-based and process-based concurrency through linear logic (full-version) 2009 • Information and Computation • 207(10):1044-1077 Cervesato I, Scedrov A
Journal Article Breaking and fixing public-key Kerberos 2008 • Information and Computation • 206(2-4):402-424 Cervesato I, Jaggard AD, Scedrov A, Tsay J-K, Walstad C
Journal Article Specifying Properties of Concurrent Computations in CLF 2008 • Electronic Notes in Theoretical Computer Science • 199:67-87 Watkins K, Cervesato I, Pfenning F, Walker D
Conference Breaking and fixing public-key Kerberos 2007 • Lecture Notes in Computer Science • 4435:167-+ Cervesato I, Jaggard AD, Scedrov A, Tsay J-K, Walstad C
Journal Article NEXCEL, a deductive spreadsheet 2007 • Knowledge engineering review (Print) • 22(3):221-236 Cervesato I
Journal Article On Matching Concurrent Traces 2007 Cervesato I, Pfenning F, Sacchini JL, Schurmann C, Simmons RJ
Journal Article One picture is worth a dozen connectives: A fault-tree representation of NPATRL security requirements 2007 • IEEE Transactions on Dependable and Secure Computing • 4(3):216-227 Cervesato I, Meadows C
Journal Article Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types 2007 • Higher-Order and Symbolic Computation • 20(1-2):3-35 Cervesato I, Stehr MO
Conference A spreadsheet for everyday symbolic reasoning 2006 • AAAI Fall Symposium - Technical Report • FS-06-04:1-8 Cervesato I
Conference Cryptographically sound security proofs for basic and public-key Kerberos 2006 • Lecture Notes in Computer Science • 4189 LNCS:362-383 Backes M, Cervesato I, Jaggard AD, Scedrov A, Tsay JK
Journal Article Deriving Key Distribution Protocols and their Security Properties 2006 Cervesato I, Meadows C, Pavlovic D