The University of Southampton
Telephone:
+442380599009
Email:
vsassone@soton.ac.uk

Professor vladi Sassone PhD FBCS MAE

Royal Academy of Engineering Research Chair

Cyber Security Group, Head

NCSC/EPSRC Academic Centre of Excellence for Cyber Security Research, Director

Cyber Security Academy, Founding Director

I am a Professor of Cyber Security at the University of Southampton, where I hold a Royal Academy of Engineering Research Chair and lead the University's activities on cyber security. Specifically, I am the Head of the Cyber Security Group (CSG), the Director of the NCSC/EPSRC Academic Centre of Excellence for Cyber Security Research (ACE), and have been the Founding Director of the Cyber Security Academy (CSA), a partnership between Academia, Industry and Government to advance cyber security through research, innovation, education and training.

A  computer scientist by training, I have since acquired strong expertise by research on cyber security, including social and human factors, cyber-crime, data privacy (including anonymity and anonymisation), internet-of-things, trust, provenance, blockchain, internet computing, foundations of computation and AI, and developed large networks of collaborators in academia, industry and government. I authored about 250 publications, reaching an h-index of 38 and around 3800 citations (source PoP at the time of writing).

I am enthusiastic about spreading best practice: I developed cyber security education and outreach programmes for undergraduates, graduates and industry, and collaborate with industry and public bodies internationally, including Cabinet Office, FCO, DBEIS, NCA, ICO, NAO, FCA and Bank of England. I worked with ministers in the UK, Italy, Malta and West Bengal, and with government bodies such as NCSC/GCHQ, DSTL, the Regional Organised Crime Units (ROCUs) and Hampshire Police. I am the Chief Scientific Officer for the Italian Ministry of Economy and Finance (MEF).

Research

Research interests

My activity focusses on cyber security since 2001. I worked on (idealised) programming languages for mobility of ambients over untrusted networks (444 citations in total at the time of writing), on trust management (122 citations), and was among the originators of the notion of 'trust structures' (257 citations), a novel approach to distributed trust management. I then focussed on `predictive' trust-and-reputation models. These are models of behaviour aimed at assessing the trustworthiness of computational agents, encompassing machine-learning and decision-making probabilistic techniques (189 citations).

More recent work focussed on anonymity and privacy, its interactions with trust and attackers' belief systems, with particular focus on understanding and analysing collaboration mechanisms in anonymity networks (47 citations). I am one of the originators of the information-theoretic measure of vulnerability with beliefs (34 citations). This quantifies data leakages in the presence of uncertain external information, which currently is one of the major threats to privacy in open network such as the Internet.

Recently, I have been focussing on distributed ledger technologies (DLT), aka blockchains, and their applications to distributed and cloud computing, and to the Internet-of-Things (IoT). DLT provides a first-time concept of decentralised digitally-enforceable contracts which do not rely on a trusted third-party, making the realisation of fully decentralised computations in trustless scenarios possible. This makes blockchains suited to a broad area of problems, including IoT and Cloud computing, and to application domains as diverse as smart energy and supply chain security. Decentralised computation, democratic control of data and immutability of records pave the way for blockchains to be the next-generation infrastructure for building reliable aggregations of IT components. This was exemplified very neatly by the first-ever blockchain-based solution to security and trust weaknesses in cloud computing, which I conceived to bring innovative solutions to the Police in the UK, MEF in Italy and Inland Revenue in Malta, and which is now drawing attention from other public administrations and applications worldwide.

Teaching

I have inspired and contributed to the development of the MSc in Cyber Security and the MEng in Computer Science with Cyber Security. Over the past few years, I have driven the development of a comprehensive programme of professional cyber training for industry. In this context, I have worked on innovative `gamification' techniques to deliver complex cyber concepts in a non-technical manner.

Publications

Montanari, U. and Sassone, V. (1992) Dynamic Congruence vs. Progressing Bisimulation for CCS. Fundamenta Informaticae, 16 (2), 171-199.

Meseguer, J., Montanari, U. and Sassone, V. (1996) Process versus Unfolding Semantics for Place/Transition Petri Nets. Theoretical Computer Science, 153 (1-2), 171-210.

Sassone, V., Nielsen, M. and Winskel, G. (1996) Models for Concurrency: Towards a Classification. Theoretical Computer Science, 170 (1-2), 297-348.

Sassone, V. (1996) An Axiomatization of the Algebra of Petri Net Concatenable Processes. Theoretical Computer Science, 170 (1-2), 277-296.

Meseguer, J., Montanari, U. and Sassone, V. (1997) On the Semantics of Place/Transition Petri Nets. Mathematical Structures in Computer Science, 7, 359-397.

Sassone, V. (1998) An Axiomatization of the Category of Petri Net Computations. Mathematical Structures in Computer Science, 8, 117-151.

Hildebrandt, T. and Sassone, V. (1997) Transition Systems with Independence and Multi-Arcs. Peled, D., Pratt, V. and Holzmann, G. (eds.) Partial Order Methods in Verification, POMIV '96. pp. 273-288 .

Nielsen, M. and Sassone, V. (1998) Petri Nets and Other Models of Concurrency. Reisig, W. and Rozenberg, G. (eds.) Lectures on Petri Nets I: Basic Models. pp. 587-642 .

Sassone, V. (2000) On the Algebraic Structure of Petri Nets. Bulletin of the European Association for Theoretical Computer Science, 72, 133-148.

Bruni, R. and Sassone, V. (2001) Two Algebraic Process Semantics for Contextual Nets. Ehrig, H., Juhäs, G., Padberg, J. and Rozenberg, G. (eds.) Unifying Petri Nets. pp. 427-456 .

Sassone, V. and Sobocinski, P. (2003) Deriving Bisimulation Congruences using 2-Categories. Nordic Journal of Computing, 10, 163-183.

Kwiatkowska, M., Milner, R. and Sassone, V. (2004) Science for Global Ubiquitous Computing. Bulletin of EATCS, 82, 325-333.

Milicia, G. and Sassone, V. (2005) Jeeg: Temporal Constraints for the Synchronization of Concurrent Objects. Concurrency and Computation: Practice & Experience, 17 (5-6), 539-572.

Sassone, V. and Sobocinski, P. (2005) Locating Reactions using 2-Categories. Theoretical Computer Science, 333 (1-2), 297-327.

Kwiatkowska, M. and Sassone, V. , Hoare, T. and Milner, R. (eds.) (2005) GC2: Science for Global Ubiquitous Computing. Grand Challenges in Computing, 9-12.

Bruni, R., Montanari, U. and Sassone, V. (2005) Observational Congruences for Dynamically Reconfigurable Tile Systems. Theoretical Computer Science, 335 (2-3), 331-372.

Carbone, M., Nielsen, M. and Sassone, V. (2005) A Calculus of Trust Management. ALP Newsletter, 17 (4), 4 pp..

Bugliesi, M., Crafa, S., Merro, M. and Sassone, V. (2005) Communication and Mobility Control in Boxed Ambients. Information and Computation, 202 (1), 39-86.

Barbanera, F., Bugliesi, M., Dezani, M. and Sassone, V. (2007) Space-Aware Ambients and Processes. Theoretical Computer Science, 373 (1-2), 41-69.

Braghin, C., Gorla, D. and Sassone, V. (2006) Role-based access control for a distributed calculus. Journal of Computer Security, 14 (2), 133-155.

Gorla, D., Hennessy, M. and Sassone, V. (2005) Security Policies as Membranes in Systems for Global Computing. Logical Methods in Computer Science, 1 (3:2), 163-21.

Chadha, R., Macedonio, D. and Sassone, V. (2006) A Hybrid Intuitionistic Logic: Semantics and Decidability. Journal of Logic and Computation, 16 (1), 27-59.

Conforti, G., Macedonio, D. and Sassone, V. (2006) BiLog: Spatial Logics for Bigraphs University of Southampton

Krukow, K., Nielsen, M. and Sassone, V. (2007) A Logical Framework for Reputation Systems. Journal of Computer Security, (In pr.

Chadha, R., Macedonio, D. and Sassone, V. (2004) A Distributed Kripke Semantics s.n.

Sassone, V. (2002) Foundations of Global Computing.

Sassone, V. (2003) Building the Case for Global Computing.

Sassone, V. (2003) Global Computing II. Terms of reference for the FP6-EU-FET call. Bulletin of the European Association for Theoretical Computer Science, 82, 319-324.

Varadharajan, V. and Sassone, V. (1991) A unifying Petri net model of non-interference and non-deducibility information flow security s.n.

Meseguer, J., Montanari, U. and Sassone, V. (1993) ω-Inductive completion of monoidal categories and infinite petri net computations. Workshop on Topology and Completion in Semantics, Chartres, France. 51 pp .

Sassone, V. (1994) On the Semantics of Petri Nets: Processes, Unfoldings and Infinite Computations. s.n.

Bugliesi, M., Castagna, G., Crafa, S., Focardi, R. and Sassone, V. (2004) Name-passing calculi and crypto-primitives: A survey. International School on Foundations of Security Analysis and Design, FOSAD 01/02.. pp. 91-138 .

Sassone, V. (2004) The Algebraic Structure of Petri Nets. In, Paun, G., Rozenberg, G. and Salomaa, A. (eds.) Current Trends in Theoretical Computer Science. World Scientific, pp. 385-410.

Klin, B., Sassone, V. and Sobocinski, P. (2005) Labels from Reductions: Towards a General Theory. First International Conference on Algebras and Coalgebras in Computer Science.. pp. 30-50 .

Milicia, G. and Sassone, V. (2003) Temporal Constraints for Concurrent Object Synchronisation. International Workshop on Object Oriented Developments, WOODS 2003.. 3 pp. .

Montanari, U. and Sassone, V. (1991) CCS Dynamic Bisimulation is Progressing. 16th International Symposium on the Mathematical Foundations of Computer Science, MFCS 1991.. pp. 346-356 .

Sassone, V. (2004) Engineering Trust-based Software Intensive Systems. Wirsing, M. and Ronchaud, R. (eds.) Joint EU/NSF Strategic Research Workshop on Engineering Software Intensive Systems.

Meseguer, J., Montanari, U. and Sassone, V. (1992) On the Semantics of Petri Nets. 3rd International Conference on Concurrency Theory, CONCUR 92.. pp. 286-301 .

Di Meglio, R. and Sassone, V. (1993) A Unification Free Introduction to Logic Programming. 8th Meeting on Logic Programming, GULP '93.

Sassone, V. (1993) A Note on Logic Programming Fixed-Point Semantics. 8th Meeting on Logic Programming, GULP '93..

Sassone, V., Nielsen, M. and Winskel, G. (1993) A Classification of Models for Concurrency. 4th International Conference on Concurrency Theory, CONCUR '93.. pp. 82-96 .

Sassone, V., Nielsen, M. and Winskel, G. (1993) Deterministic Behavioural Models for Concurrency. 18th International Symposium on the Mathematical Foundations of Computer Science, MFCS '93.. pp. 682-692 .

Nielsen, M., Sassone, V. and Winskel, G. (1994) Relationships between Models for Concurrency. REX School '93. A Decade of Concurrency: Reflections and Perspectives.. pp. 425-476 .

Meseguer, J., Montanari, U. and Sassone, V. (1994) On the Model of Computation of Place/Transition Petri Nets. 15th International Conference on Application and Theory of Petri Nets, ICATPN '94.. pp. 16-38 .

Sassone, V. (1994) An Approach to the Category of Net Computations. 6th Nordic Workshop on Programming Theory, NWPT '94.. pp. 385-399 .

Sassone, V. (1995) On the Category of Petri Net Computations. 6}th International Conference on Theory and Practice of Software Development, TAPSOFT '95.. pp. 334-348 .

Sassone, V. (1995) Axiomatizing Petri Net Concatenable Processes. 10th Conference on Fundamentals of Computation Theory, FCT '95.. pp. 414-423 .

Nielsen, M., Priese, L. and Sassone, V. (1995) Characterizing Behavioural Congruences for Petri Nets. 6th International Conference on Concurrency Theory, CONCUR '95.. pp. 175-189 .

Cattani, G.L. and Sassone, V. (1996) Higher Dimensional Transition Systems. 11th Symposium of Logics in Computer Science, LICS '96.. pp. 55-62 .

Hildebrandt, T. and Sassone, V. (1996) Comparing Transition Systems with Independence and Asynchronous Transition Systems. 7th International Conference on Concurrency Theory, CONCUR '96.. pp. 84-97 .

Meseguer, J., Montanari, U. and Sassone, V. (1997) Representation Theorems for Petri Nets. Foundations of Computer Science : Potential - Theory - Cognition.. pp. 239-249 .

Bruni, R., Meseguer, J., Montanari, U. and Sassone, V. (1998) A Comparison of Petri Net Semantics under the Collective Token Philosophy. Advances in Computing Science, 4th Asian Computing Science Conference, ASIAN '98.. pp. 225-244 .

Bruni, R., Meseguer, J., Montanari, U. and Sassone, V. (1999) Functorial Semantics for Petri Nets under the Individual Token Philosophy. Category Theory and Computer Science, CTCS '99.. 18 pp. .

Bruni, R. and Sassone, V. (2000) Algebraic Models for Contextual Nets. 27th International Colloquium on Automata, Languages and Programming, ICALP 2000.. pp. 175-186 .

Bruni, R., Montanari, U. and Sassone, V. (2000) Open Ended Systems, Dynamic Bisimulation, and Tile Logic. IFIP International Conference on Theoretical Computer Science, IFIP TCS 2000.. pp. 440-456 .

Buscemi, M. and Sassone, V. (2001) High-Level Petri Nets as Type Theories in the Join Calculus. Foundations of Software Science and Computation Structures, FOSSACS 2001.. pp. 104-120 .

Nielsen, M., Sassone, V. and Srba, J. (2001) Towards a Notion of Distributed Time for Petri Nets. 22nd International Conference on Application and Theory of Petri Nets, ICATPN 2001.. pp. 23-31 .

Nielsen, M., Sassone, V. and Srba, J. (2001) Properties of Distributed Time Arc Petri Nets. Foundation of Software Technology and Theoretical Computer Science, FST&TCS 2001.. pp. 280-291 .

Barbanera, F., Dezani, M., Salvo, I. and Sassone, V. (2001) A Type Inference Algorithm for Secure Ambients. Theory of Concurrency, Higher Order and Types, TOSCA Workshop 2001.. 19 pp .

Merro, M. and Sassone, V. (2002) Typing and Subtyping Mobility in Boxed Ambients. 13th Int. Conference on Concurrency Theory, CONCUR '02.. pp. 304-320 .

Godskesen, J.Chr., Hildebrandt, T. and Sassone, V. (2002) A Calculus of Mobile Resources. 13th Int. Conference on Concurrency Theory, CONCUR '02.. pp. 272-287 .

Milicia, G. and Sassone, V. (2002) Jeeg: A Programming Language for Concurrent Objects Synchronization. Joint ACM-ISCOPE Conference on Java Grande, JGI'02.. pp. 212-221 .

Sassone, V. and Sobocinski, P. (2002) Deriving Bisimulation Congruences: A 2-Categorical Approach. 9th Int. Workshop on Expressiveness in Concurrency, EXPRESS 2002.. 19 pp. .

Bugliesi, M., Crafa, S., Merro, M. and Sassone, V. (2002) Communication Interference in Mobile Boxed Ambients. 22nd Conference on Foundations of Software Technology and Theoretical Computer Science, FST&TCS 2002.. pp. 71-84 .

Sassone, V. and Sobocinski, P. (2003) Deriving Bisimulation Congruences: 2-categories vs precategories. Foundations of Software Science and Computation Structures, FOSSACS 2003.. pp. 409-424 .

Bugliesi, M., Crafa, S., Prelic, A. and Sassone, V. (2003) Secrecy in Untrusted Networks. 30th International Colloquium on Automata, Languages and Programming, ICALP 2003.. pp. 969-983 .

Carbone, M., Nielsen, M. and Sassone, V. (2003) A Formal Model for Trust in Dynamic Networks. Cerone, A. and Lindsay, P. (eds.) Int. Conference on Software Engineering and Formal Methods, SEFM 2003.. pp. 54-61 .

Bruni, R., Meseguer, J., Montanari, U. and Sassone, V. (2003) Algebraic theories for contextual pre-nets. Blundo, C. and Laneve, C. (eds.) 8th Italian Conference on Theoretical Computer Science, ICTCS 2003.. pp. 256-270 .

Barbanera, F., Bugliesi, M., Dezani, M. and Sassone, V. (2003) A Calculus of Bounded Capacities. Advances in Computing Science, 9th Asian Computing Science Conference, ASIAN'03.. pp. 205-223 .

Milicia, G. and Sassone, V. (2004) The Inheritance Anomaly: Ten years after. 19th ACM Symposium on Applied Computing, SAC'04.. pp. 1267-1274 .

Lhoussaine, C. and Sassone, V. (2004) A Dependently Typed Ambient Calculus. European Symposium on Programming, ESOP'04.. pp. 171-187 .

Braghin, C., Gorla, D. and Sassone, V. (2004) A Distributed Calculus for Role-Based Access Control. 17th IEEE Computer Security Foundations Workshop, CSFW'04.. pp. 48-60 .

Carbone, M., Nielsen, M. and Sassone, V. (2004) A Calculus of Trust Management. 24th Conference on Foundations of Software Technology and Theoretical Computer Science, FST&TCS 2004.. pp. 161-173 .

Sassone, V. and Sobocinski, P. (2005) A Congruence for Petri Nets. International Workshop on Petri Nets and Graph Transformations.. pp. 107-120 .

Sassone, V. and Sobocinski, P. (2005) Reactive Systems over Cospans. 20th Symposium on Logic in Computer Science, LICS 2005.. pp. 311-320 .

Conforti, G., Macedonio, D. and Sassone, V. (2005) Spatial Logics for Bigraphs. 32th International Colloquium on Automata, Languages and Programming, ICALP 2005.. pp. 766-778 .

Conforti, G., Macedonio, D. and Sassone, V. (2005) Bigraphical Logics for XML. 13th Symposium on Advanced Database Systems, SEDB 2005.. pp. 392-399 .

Krukow, K., Nielsen, M. and Sassone, V. (2005) A Formal Framework for Concrete Reputation Systems. 12th ACM Conference on Computer and Communication Security, CCS'05.. pp. 260-269 .

Sassone, V. (2002) Communication Interference in Mobile Boxed Ambients (talk).

Sassone, V. (2002) Capacity-Bounded Computational Ambients (talk).

Sassone, V. (2005) A Framework for Concrete Reputation Systems with applications to History-Based Access Control (talk).

Sassone, V. (2005) Labels from Reductions - the theory of relative pushouts (talk).

Sassone, V. (2006) BiLog - A Framework for Structural Logics (talk).

Sassone, V. (2003) Subtyping for Access Control (talk).

Sassone, V. (2003) A 2-Categorical Approach to Bisimulation Congruences (talk).

Sassone, V. (2003) Deriving Bisimulation Congruences: 2-categories vs precategories (talk).

Sassone, V. (2003) Temporal Constraints for Concurrent Object Synchronisation (talk).

Sassone, V. (2003) A Calculus of Bounded Capacities (talk).

Sassone, V. (2001) An Introduction to the π-Calculus - Model, Variations, Semantics (talk).

Sassone, V. (2004) Congruences for Contextual Graph-Rewriting (talk).

Sassone, V. (2004) Background and Structure of a Coordination Action (talk).

Sassone, V. (2003) Calculi and Types for Global Computing (talk).

Sassone, V. (2003) A Role for Theory in UbiNet (talk).

Sassone, V. (2004) A dependently typed ambient calculus (talk).

Sassone, V. (2004) Context-Aware Software-Intensive Systems - An autonomic approach (talk).

Sassone, V. (2004) Trust and Concurrency - A Theory Contribution to Ubiquitous Computing (talk).

Sassone, V. (2004) Foundations of Global Computing - A Personal Perspective (talk).

Sassone, V. (2004) Global Computing II - A new FET Programme for FP6 (talk).

Sassone, V. (2004) A Calculus for Trust Management (talk).

Sassone, V. (2004) Security Policies as Membranes in Systems for Global Computing (talk).

Sassone, V. (2004) A Distributed Calculus for Role-Based Access Control (talk).

Bundgaard, M. and Sassone, V. (2006) Typed polyadic pi-calculus in bigraphs. 8th Symposium on Principles ad Practice of Declarative Programming, PPDP'06, , Venice, Italy. pp. 1-12 .

Gorla, D., Hennessy, M. and Sassone, V. (2006) Inferring Dynamic Credentials for Role-based Trust Management. 8th Symposium on Principles ad Practice of Declarative Programming, PPDP'06, , Venice, Italy. pp. 213-223 .

Sassone, V. (2006) Elements towards a foundation of computational trust (talk).

Sassone, V. (2006) Semantic barbs: what's in an observation? (talk).

Rathke, J., Sassone, V. and Sobocinski, P. (2007) Semantic Barbs and Biorthogonality. Foundations of Software Science and Computation Structures, FOSSACS 2007. pp. 302-316 .

Nielsen, M., Krukow, K. and Sassone, V. (2007) A Bayesian model for event-based trust. In, Cardelli, L., Fiore, M. and Winskel, G. (eds.) Festschrift in hounour of Gordon Plotkin. Elsevier.

Bruni, R., Meseguer, J., Montanari, U. and Sassone, V. (2001) Functorial Models for Petri Nets. Information and Computation, 170 (2), 207-236.

Sassone, V., Nielsen, M. and Krukow, K. , de Boer, F.S. (ed.) (2007) Towards a Formal Framework for Computational Trust. Formal Methods for Components and Objects, LNCS 4, 175-184.

Klin, B. and Sassone, V. (2008) Structural Operational Semantics for Stochastic Process Calculi. Proceedings of FOSSACS 2008. pp. 428-433 .

Conforti, G., Macedonio, D. and Sassone, V. (2007) Static BiLog: a Unifying Language for Spatial Structures. Fundamenta Informaticae, 80, 1-20.

Sassone, V. , Sassone, V. (ed.) (2008) Preface. Theoretical Computer Science, 390 ((2-3)), 127-128. (doi:10.1016/j.tcs.2007.09.019).

Sassone, V. , Sassone, V. (ed.) (2008) Foundations of Software Science and Computational Structures (Theoretical Computer Science, 390(2-), vol. 390(2-, Elsevier

Sannella, D. and Sassone, V. , Sannella, D. and Sassone, V. (eds.) (2007) Semantic and logical foundations of global computing: Papers from the EU-FET global computing initiative (2001–2005). Theoretical Computer Science, 389 (3), 337-340.

Hamadou, Sardaouna, Palamidessi, Catuscia, Sassone, Vladimiro and ElSalamouny, Ehab (2009) Probable innocence in the presence of independent knowledge. International Workshop on Formal Aspects in Security and Trust (FAST2009), , Eindhoven, Netherlands. 05 - 06 Nov 2009. pp. 141-156 . (Submitted)

ElSalamouny, Ehab, Sassone, Vladimiro and Nielsen, Mogens (2009) HMM-based Trust Model. International Workshop on Formal Aspects in Security and Trust (FAST2009), , Eindhoven, Netherlands. 05 - 06 Nov 2009. pp. 21-35 . (Submitted)

ElSalamouny, Ehab, Krukow, Karl Tikjøb and Sassone, Vladimiro (2009) An analysis of the exponential decay principle in probabilistic trust models. [in special issue: Festschrift for Mogens Nielsen’s 60th birthday] Theoretical Computer Science, 410 (41), 4067-4084. (doi:10.1016/j.tcs.2009.06.011).

Hamadou, Sardaouna, Sassone, Vladimiro and Palamidessi, Catuscia (2010) Reconciling Belief and Vulnerability in Information Flow. IEEE Symposium of Security and Privacy. pp. 79-92 .

Bugliesi, Michele and Sassone, Vladimiro (2010) International Colloquium of Automata, Languages and Programming: Preface to the 'Logical Methods in Computer Science', special issue for ICALP 2006 , Creative Commons Licence

Sassone, Vladimiro, El-Salamouny, Ehab and Hamadou, Sardaouna (2010) Trust in Crowds: probabilistic behaviour in anonymity protocols. Symposium on Trustworthy Global Computing, TGC 2010, Lecture Notes in Computer Science 6084. pp. 88-102 .

Bruni, Roberto and Sassone, Vladimiro (2008) Models of Computation: A Tribute to Ugo Montanari’s Vision. Concurrency, Graphs and Models. Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday. pp. 503-509 .

Krukow, Karl, Nielsen, Mogens and Sassone, Vladimiro (2008) Trust models in ubiquitous computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366 (1881), 3781-3793. (doi:10.1098/rsta.2008.0134).

Krukow, Karl, Nielsen, Mogens and Sassone, Vladimiro (2009) Probabilistic Computational Trust. Lodaya, Kamal, Mukund, Madhavan and Ramanunjan, R (eds.) Perspectives in Concurrency Theory.

Souilah, Issam, Francalanza, Adrian and Sassone, Vladimiro (2009) A Formal Model of Provenance in Distributed Systems. Cheney, James (ed.) Workshop on the Theory and Practice of Provenance.

Abramsky, Samson, Gelenbe, Erol and Sassone, Vladimiro (2008) Visions of Computer Science - BCS International Academic Conference , BCS Press

Sassone, V. (2006) Typed polyadic pi-calculus in bigraphs (talk). 8th Symposium on Principles ad Practice of Declarative Programming, PPDP'06, , Venice, Italy. (In Press)

Sassone, V. (2006) Inferring Dynamic Credential for Rôle-based Trust Management (talk). (In Press)

Sassone, V. (2007) Opportunities for Formal Methods in the analysis of pervasive adaptation (talk). (In Press)

Sassone, V. (2007) A Bayesian model for event-based trust - Elements of a foundation for computational trust (talk). (In Press)

Sassone, V. (2008) Data Provenance in a Distributed Calculus (talk). (In Press)

Sassone, V. (2008) Inference of Probability Distributions for Trust and Security Applications (talk). (In Press)

Sassone, V. (2008) Data Provenance in a Distributed Calculus (talk). (In Press)

Sassone, V. (2008) Structural Operational Semantics for Stochastic Systems (talk). (In Press)

Sassone, V. (2009) Permission-based separation logic for message-passing concurrency (talk). (In Press)

Sassone, V. (2009) Exponential Decay in Probabilistic Trust Models (talk). (In Press)

Sassone, V. (2009) Exponential Decay in Probabilistic Trust Models (talk). (In Press)

Sassone, V. (2009) Elements of Foundations for Ubiquitous Computing (talk). (In Press)

Sassone, V. (2009) On the anonymity in the Crowds protocol (talk). (In Press)

Sassone, V. (2010) Trust in Crowds - Probabilistic Behaviour in Anonymity Protocols (talk). (In Press)

Sassone, Vladimiro (2009) I dag er det Mogens’ fødselsdag. Theoretical Computer Science, 410 (41).

Sassone, V (2008) Foundations of Software Science and Computational Structures: Selected papers from FOSSACS 2005. Theoretical Computer Science, 390, 127-128.

Sassone, Vladimiro, Hamadou, Sardaouna and Yang, Mu (2010) Trust in Anonymity Networks. Lecture Notes in Computer Science, ARCoSS, 6269, 48-70.

Horne, Ross and Sassone, Vladimiro (2011) A Verified Algebra for Linked Data. Revara, Antonio and Mousavi, MohammadReza (eds.) 10th International Workshop on the Foundations of Coordination Languages and Software Architectures, EPTCS 58, Aachen, Germany. pp. 20-33 .

Horne, Ross, Sassone, Vladimiro and Gibbins, Nicholas (2012) Operational semantics for SPARQL Update. Pan, Jeff Z., Chen, Huajun, Kim, Hong-Gee, Li, Juanzi, Wu, Zhe, Horrocks, Ian, Mizoguchi, Riichiro and Wu, Zhaohui (eds.) In The Semantic Web. Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4-7, 2011, Proceedings. Springer. pp. 242-257 .

Horne, Ross and Sassone, Vladimiro (2011) A Typed Model for Linked Data University of Southampton (Submitted)

Francalanza, Adrian, Rathke, Julian and Sassone, Vladimiro (2011) Permission-based separation logic for message-passing concurrency. Logical Methods in Computer Science, 7 (3), 1-47. (doi:10.2168/LMCS-7(3:7)2011).

Yang, Mu and Sassone, Vladimiro (2011) Minimising anonymity loss in anonymity networks under DoS attacks. In: 13th International Conference on Information and Communications Security, 23rd-26th, Nov, 2011, Beijing, China. Lecture Notes in Computer Science, 7043, 414-429.

Yang, Mu, Sassone, Vladimiro and Hamadou, Sardaouna , Degano, Pierpaolo and Guttman, Joshua (eds.) (2012) A Game-Theoretic Analysis of Cooperation in Anonymity Networks. Proceedings of Principles of Security and Trust, POST 2012 (a member of ETAPS 2012), Lecture Notes in Computer Science (ARCoSS). (In Press)

Horne, Ross and Sassone, Vladimiro (2012) A verified algebra for read-write linked data. Author's Original, 1-30. (Submitted)

Dezani, Mariangiola, Horne, Ross and Sassone, Vladimiro (2012) Tracing where and who provenance in Linked Data: a calculus. [in special issue: New Directions in Rewriting (Honoring the 60th Birthday of Yoshihito Toyama)] Theoretical Computer Science, 464, 113-129. (doi:10.1016/j.tcs.2012.06.020).

Klin, Bartek and Sassone, Vladimiro (2013) Structural operational semantics for stochastic and weighted transition systems. Information and Computation, 227, 58-83. (doi:10.1016/j.ic.2013.04.001).

Sassone, V., Dezani-Ciancaglini, M. and Horne, R. (2012) Tracing where and who provenance in linked data - a calculus - Southampton, GB. University of Southampton

Sassone, V. (2012) Dagstuhl Perspective Workshop 12452 “Publication Culture in Computing Research”. Publication Culture in Computing Research, Dagstuhl, Germany.

Yang, Mu, Sassone, Vladimiro and O'Hara, Kieron (2012) Appendix 3. Practical examples of some anonymisation techniques. In, Anonymisation: Managing Data Protection Risk Code of Practice. Wilmslow, GB. Information Commissioner's Office, pp. 80-103.

Hussein, Jamal, Moreau, Luc and Sassone, Vladimiro (2015) Obscuring provenance confidential information via graph transformation. Damsgaard Jensen, C., Marsh, S., Dimitrakos, T. and Murayama, Y. (eds.) In Proceedings of Trust Management IX. vol. 454, Springer. pp. 109-125 . (doi:10.1007/978-3-319-18491-3_8).

Hussein, Jamal, Sassone, vladi and Moreau, Luc (2016) A template-based graph transformation system for the PROV data model. GCM 2016: Seventh International Workshop on Graph Computation Models, Vienna, Austria. 03 Jul 2016. 15 pp .

Ciobanu, Gabriel, Horne, Ross and Sassone, Vladimiro (2016) A descriptive type foundation for RDF Schema. Journal of Logical and Algebraic Methods in Programming, 85 (5), 681-706. (doi:10.1016/j.jlamp.2016.02.006).

Hamadou, Sardouna, Palamidessi, Catuscia and Sassone, Vladimiro (2017) Quantifying leakage in the presence of unreliable sources of information. Journal of Computer and System Sciences, 88, 27-52. (doi:10.1016/j.jcss.2017.03.013).

Ferdous, Sadek, Margheri, Andrea, Paci, Federica and Sassone, Vladimiro (2017) Decentralised runtime monitoring for access control systems in cloud federations Southampton, GB. University of Southampton 11pp.

Howard, Giles, Butler, Michael, Colley, John and Sassone, Vladimiro (2017) Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology. 2nd Workshop on Safety & Security aSSurance, , Paris, France. 29 Apr 2017. 6 pp . (In Press) (doi:10.1109/EuroSPW.2017.68).

Alansari, Shorouq, Paci, Federica and Sassone, Vladimiro (2017) A distributed access control system for cloud federations. In ICDCS 2017: pROCEEDINGS, IEEE 37th International Conference on Distributed Computing Systems. IEEE. 6 pp . (doi:10.1109/ICDCS.2017.241).

Alansari, Shorouq, Paci, Federica, Margheri, Andrea and Sassone, Vladimiro (2017) Privacy-preserving access control in cloud federations. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE. pp. 757-760 . (doi:10.1109/CLOUD.2017.108).

Aniello, Leonardo, Baldoni, Roberto, Gaetani, Edoardo, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. In 2017 13th European Dependable Computing Conference (EDCC). IEEE. 4 pp . (doi:10.1109/EDCC.2017.31).

Margheri, Andrea, Ferdous, Md Sadek, Yang, Mu and Sassone, Vladimiro (2017) A distributed infrastructure for democratic cloud federations. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE.. (doi:10.1109/CLOUD.2017.93).

Ferdous, Md Sadek, Margheri, Andrea, Paci, Federica, Yang, Mu and Sassone, Vladimiro (2017) Decentralised runtime monitoring for access control systems in cloud federations. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE. pp. 2632-2633 . (doi:10.1109/ICDCS.2017.178).

Gaetani, Edoardo, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) Blockchain-based database to ensure data integrity in cloud computing environments. Italian Conference on Cybersecurity, , Venice, Italy. 17 - 20 Jan 2017. 10 pp .

Hu, Runshan, Stalla-Bourdillon, Sophie, Yang, Mu, Schiavo, Valeria and Sassone, Vladimiro (2017) Bridging policy, regulation and practice? A techno-legal analysis of three types of data in the GDPR. In, Leenes, Ronald, van Brakel, Rosamunde, Gutwirth, Serge and De Hert, Paul (eds.) Data Protection and Privacy: the Age of Intelligent Machines. (Computers, Privacy and Data Protection, 10) Haywards Heath. Hart.

Yang, Mu, Margheri, Andrea, Hu, Runshan and Sassone, Vladimiro (2018) Differentially private data sharing in Cloud Federation with blockchain. IEEE Cloud Computing, 5 (6), 69-79. (doi:10.1109/MCC.2018.064181122).

De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2018) PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain. Italian Conference on Cyber Security, Milan, Italy. 11 pp .

Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo (2018) Cross-cloud management of sensitive data via blockchain: A payslip calculation use case. Ferrari, Elena, Baldi, Marco and Baldoni, Roberto (eds.) In Proceedings of the Second Italian Conference on Cybersecurity: ITASEC18. vol. 2058, CEUR-WS.org. 5 pp .

Lombardi, Federico, Aniello, Leonardo, De Angelis, Stefano, Margheri, Andrea and Sassone, Vladimiro (2018) A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids. Living in the Internet of Things Conference: Cybersecurity of the IoT - A PETRAS, IoTUK & IET Event, Savoy Place, London, United Kingdom. 27 - 28 Mar 2018. 6 pp .

Massi, Massimiliano, Miladi, Abdallah, Margheri, Andrea, Sassone, Vladimiro and Rosenzweig, Jason (2018) Using PROV and Blockchain to Achieve Health Data Provenance 24pp.

Argento, Luciano, Margheri, Andrea, Paci, Federica, Sassone, Vladimiro and Zannone, Nicola (2018) Towards adaptive access control. In Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. vol. 10980 LNCS, Springer. pp. 99-109 . (doi:10.1007/978-3-319-95729-6_7).

Stevens, Brian, Ashmore, Rob, Margheri, Andrea and Sassone, Vladimiro (2019) Developing critical software in the modern threat environment. Safety Critical System Symposium. 05 - 07 Feb 2019. 17 pp .

Howard, Giles, Butler, Michael, Colley, John and Sassone, Vladimiro (2019) A methodology for assuring the safety and security of critical infrastructure based on STPA and Event-B. International Journal of Critical Computer-Based Systems, 56-75. (doi:10.1504/IJCCBS.2019.098815).

Fadhel, Nawfal, Lombardi, Federico, Aniello, Leonardo, Margheri, Andrea and Sassone, Vladimiro (2019) Towards a semantic modelling for threat analysis of IoT applications: a case study on transactive energy. In IET Living in the Internet of Things 2019. Institute of Engineering and Technology, IET..

O'Sullivan, Michael, Aniello, Leonardo and Sassone, Vladimiro (2020) A methodology to select topology generators for ad hoc mesh network simulations. Journal of Communications, 15 (10). (doi:10.12720/jcm.15.10.741-746).

Hart, Stephen, Margheri, Andrea, Paci, Federica and Sassone, Vladimiro (2020) Riskio: A serious game for cyber security awareness and education. Computers and Security, 95, [101827].

Margheri, Andrea, Masi, Massimiliano, Miladi, Abdallah, Sassone, Vladimiro and Rosenzweig, Jason (2020) Decentralised provenance for healthcare data. International Journal of Medical Informatics, 141, [104197]. (doi:10.1016/j.ijmedinf.2020.104197).

Dghaym, Dana, Hoang, Thai Son, Butler, Michael, Hu, Runshan, Aniello, Leonardo and Sassone, Vladimiro (2021) Verifying System-level Security of a Smart Ballot Box. In ABZ 2021 – 8th International Conference on Rigorous State Based Methods: ABZ 2021. Springer Nature Switzerland AG. 16 pp . (In Press)

Hussein, Raid, Khalid Hussein and Sassone, Vladimiro (2019) Threat modelling for the virtual machine image in cloud computing. In Computer Science & Information Technology. vol. 9, AIRCC Publishing Corporation. pp. 119-132 . (doi:10.5121/csit.2019.90911).

Thorburn, Robert, Paci, Federica, Sassone, Vladimiro and Stalla-Bourdillon, Sophie (2021) Connecting regulatory requirements to audit outcomes: a model-driven approach to auditable compliance. In Companion Proceedings - 24th International Conference on Model-Driven Engineering Languages and Systems, MODELS-C 2021. Institute of Electrical and Electronics Engineers Inc. pp. 641-642 . (doi:10.1109/MODELS-C53483.2021.00100).

Contact

Share this profile FacebookTwitterWeibo