default search action
Luigi Logrippo
Person information
- affiliation: Université du Québec en Outaouais (UQO), Gatineau, QC, Canada
- affiliation: University of Ottawa, ON, Canada
- affiliation (PhD 1974): University of Waterloo, ON, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j39]Abdelouadoud Stambouli, Luigi Logrippo:
Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN). J. Cybersecur. Priv. 4(3): 468-493 (2024) - 2022
- [j38]Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, Marco Roveri, Aidin Rasti, Ali Roudak, John Mylopoulos:
Specification and analysis of legal contracts with Symboleo. Softw. Syst. Model. 21(6): 2395-2427 (2022) - 2021
- [j37]Luigi Logrippo:
Multi-level models for data security in networks and in the Internet of things. J. Inf. Secur. Appl. 58: 102778 (2021) - 2019
- [j36]Abdelouadoud Stambouli, Luigi Logrippo:
Data flow analysis from capability lists, with application to RBAC. Inf. Process. Lett. 141: 30-40 (2019) - 2017
- [j35]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. Int. J. Inf. Sec. 16(1): 91-113 (2017) - 2015
- [j34]Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
A Metamodel for Hybrid Access Control Policies. J. Softw. 10(7): 784-797 (2015) - 2013
- [j33]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A framework for risk assessment in access control systems. Comput. Secur. 39: 86-103 (2013) - 2012
- [j32]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4): 447-464 (2012) - 2011
- [j31]Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Concrete- and abstract-based access control. Int. J. Inf. Sec. 10(4): 223-238 (2011) - 2007
- [j30]Rui Gustavo Crespo, Miguel Carvalho, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications. Comput. Networks 51(2): 382-397 (2007) - [j29]Yiqun Xu, Luigi Logrippo, Jacques Sincennes:
Detecting feature interactions in CPL. J. Netw. Comput. Appl. 30(2): 775-799 (2007) - 2006
- [j28]Kamel Adi, Daniel Amyot, Luigi Logrippo:
Foreword - New technologies in distributed systems. Ann. des Télécommunications 61(11-12): 1226-1228 (2006) - [j27]Dongmei Jiang, Ramiro Liscano, Luigi Logrippo:
Personalization of internet telephony services for presence with SIP and extended CPL. Comput. Commun. 29(18): 3766-3779 (2006) - [j26]Nicolas Gorse, Luigi Logrippo, Jacques Sincennes:
Detecting feature interaction in CPL. Softw. Syst. Model. 5(2): 121-134 (2006) - [j25]Nicolas Gorse, Luigi Logrippo, Jacques Sincennes:
Formal detection of feature interactions with logic programming and LOTOS. Softw. Syst. Model. 5(2): 135 (2006) - 2005
- [j24]Daniel Amyot, Luigi Logrippo, Michael Weiss:
Generation of test purposes from Use Case Maps. Comput. Networks 49(5): 643-660 (2005) - [j23]Daniel Amyot, Tom Gray, Ramiro Liscano, Luigi Logrippo, Jacques Sincennes:
Interactive conflict detection and resolution for personalized features. J. Commun. Networks 7(3): 353-366 (2005) - 2004
- [j22]Daniel Amyot, Luigi Logrippo:
Directions in feature interaction research. Comput. Networks 45(5): 563-567 (2004) - [j21]Petre Dini, Alexander Clemm, Tom Gray, Fuchun Joseph Lin, Luigi Logrippo, Stephan Reiff-Marganiec:
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges. Comput. Networks 45(5): 585-603 (2004) - 2002
- [j20]Bernard Stepien, Luigi Logrippo:
Graphic visualization and animation of LOTOS execution traces. Comput. Networks 40(5): 665-681 (2002) - 2000
- [j19]Xiao Jun Chen, Luigi Logrippo:
Deriving use cases for distributed systems from knowledge requirements. Ann. des Télécommunications 55(1-2): 45-57 (2000) - [j18]Q. Fu, P. Harnois, Luigi Logrippo, Jacques Sincennes:
Feature interaction detection: a LOTOS-based approach. Comput. Networks 32(4): 433-448 (2000) - [j17]Luigi Logrippo, John Visser:
Future wireless networks. Comput. Networks 34(5): 701-703 (2000) - [j16]Brahim Ghribi, Luigi Logrippo:
Understanding GPRS: the GSM packet radio service. Comput. Networks 34(5): 763-779 (2000) - [j15]Daniel Amyot, Luigi Logrippo:
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system. Comput. Commun. 23(12): 1135-1157 (2000) - 1998
- [j14]Randall Tuok, Luigi Logrippo:
Formal Spacification and Use Case Generation for a Mobile Telephony System. Comput. Networks 30(11): 1045-1063 (1998) - [j13]Petre Dini, Luigi Logrippo:
Feature Interactions in Telecommunications Software. Comput. Networks 30(14): 1359-1362 (1998) - 1997
- [j12]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Structural Models for Specifying Telephone Systems. Comput. Networks ISDN Syst. 29(4): 501-528 (1997) - 1996
- [j11]Jean-Pierre Courtiat, Piotr Dembinski, Gerard J. Holzmann, Luigi Logrippo, Harry Rudin, Pamela Zave:
Formal Methods after 15 Years: Status and Trends (Paper based on contributions of the panelists at the FORmal TEchnique '95, Conference, Montreal, October 1995). Comput. Networks ISDN Syst. 28(13): 1845-1855 (1996) - [j10]Kazi Farooqui, Luigi Logrippo:
Group communication models. Comput. Commun. 19(14): 1276-1288 (1996) - 1995
- [j9]Kazi Farooqui, Luigi Logrippo, Jan de Meer:
The ISO Reference Model for Open Distributed Processing: An Introduction. Comput. Networks ISDN Syst. 27(8): 1215-1229 (1995) - 1993
- [j8]Rezki Boumezbeur, Luigi Logrippo:
Specifying telephone systems in LOTOS. IEEE Commun. Mag. 31(8): 38-45 (1993) - 1992
- [j7]Luigi Logrippo, Mohammed Faci, Mazen Haj-Hussein:
An Introduction to LOTOS: Learning by Examples. Comput. Networks ISDN Syst. 23(5): 325-342 (1992) - 1991
- [j6]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Formal Specification of Telephone Systems in LOTOS: The Contraint-Oriented Style Approach. Comput. Networks ISDN Syst. 21: 53-67 (1991) - 1988
- [j5]Luigi Logrippo, Abdellatif Obaid, J. P. Briand, M. C. Fehri:
An Interpreter for LOTOS, a Specification Language for Distributed Systems. Softw. Pract. Exp. 18(4): 365-385 (1988) - 1986
- [j4]Luigi Logrippo, Bernard Stepien:
Cluster analysis for the computer-assisted statistical analysis of melodies. Comput. Humanit. 20(1): 19-33 (1986) - 1983
- [j3]Luigi Logrippo, Douglas R. Skuce:
File Structures, Program Structures, and Attributed Grammars. IEEE Trans. Software Eng. 9(3): 260-266 (1983) - 1979
- [j2]Luigi Logrippo:
Renamings, Maximal Parallelism, and Space-Time Tradeoff in Program Schemata. J. ACM 26(4): 819-833 (1979) - 1978
- [j1]Luigi Logrippo:
Renamings and Economy of Memory in Program Schemata. J. ACM 25(1): 10-22 (1978)
Conference and Workshop Papers
- 2023
- [c67]Daniel Amyot, Luigi Logrippo, John Mylopoulos, Marco Roveri, Amal Ahmed Anda, Alireza Parvizimosaed, Sofana Alfuhaid, Sepehr Sharifi, Aidin Rasti, Regan Meloche, Daniel Sousa-Diaz:
Engineering Smart Contracts with Symboleo: A Progress Report. CASCON 2023: 235-237 - 2022
- [c66]Alireza Parvizimosaed, Marco Roveri, Aidin Rasti, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Model-checking legal contracts with SymboleoPC. MoDELS 2022: 278-288 - [c65]Aidin Rasti, Daniel Amyot, Alireza Parvizimosaed, Marco Roveri, Luigi Logrippo, Amal Ahmed Anda, John Mylopoulos:
Symboleo2SC: from legal contract specifications to smart contracts. MoDELS 2022: 300-310 - 2021
- [c64]John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi:
Social Requirements Models for Services. Next-Gen Digital Services 2021: 100-108 - 2020
- [c63]Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Subcontracting, Assignment, and Substitution for Legal Contracts in Symboleo. ER 2020: 271-285 - [c62]John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi:
Social Dependence Relationships in Requirements Engineering. iStar 2020: 55-60 - [c61]Sepehr Sharifi, Alireza Parvizimosaed, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Symboleo: Towards a Specification Language for Legal Contracts. RE 2020: 364-369 - 2018
- [c60]Luigi Logrippo, Abdelouadoud Stambouli:
Configuring Data Flows in the Internet of Things for Security and Privacy Requirements. FPS 2018: 115-130 - 2017
- [c59]Luigi Logrippo:
Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy. FPS 2017: 111-123 - [c58]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Flexible Access Control. MCETECH 2017: 77-95 - 2016
- [c57]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. FPS 2016: 135-142 - 2015
- [c56]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Information Flow-Based Security Levels Assessment for Access Control Systems. MCETECH 2015: 105-121 - [c55]Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
Metamodelling with Formal Semantics with Application to Access Control Specification. MODELSWARD 2015: 354-362 - 2014
- [c54]Luigi Logrippo:
Logical Method for Reasoning About Access Control and Data Flow Control Models. FPS 2014: 205-220 - [c53]Omar Abahmane, Luigi Logrippo:
Granularity based flow control. PST 2014: 239-248 - 2013
- [c52]Waël Hassan, Luigi Logrippo:
Towards a process for legally compliant software. RELAW 2013: 44-52 - [c51]Salim Khamadja, Kamel Adi, Luigi Logrippo:
Designing flexible access control models for the cloud. SIN 2013: 225-232 - [c50]Salim Khamadja, Kamel Adi, Luigi Logrippo:
An access control framework for hybrid policies. SIN 2013: 282-286 - 2012
- [c49]Bernard Stepien, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
CatBAC: A generic framework for designing and validating hybrid access control models. ICC 2012: 6721-6726 - [c48]Muyiwa Olurin, Carlisle Adams, Luigi Logrippo:
Platform for privacy preferences (P3P): Current status and future directions. PST 2012: 217-220 - [c47]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. SEC 2012: 187-198 - 2011
- [c46]Nadera Slimani, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
UACML: Unified Access Control Modeling Language. NTMS 2011: 1-8 - [c45]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - 2010
- [c44]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c43]Waël Hassan, Nadera Slimani, Kamel Adi, Luigi Logrippo:
Secrecy UML Method for Model Transformations. ASM 2010: 400 - [c42]Ji Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski:
Risk Analysis in Access Control Systems Based on Trust Theories. Web Intelligence/IAT Workshops 2010: 415-418 - [c41]Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. ICDIM 2010: 1-8 - [c40]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422 - [c39]Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo:
Risk analysis in access control systems. PST 2010: 160-166 - 2009
- [c38]Waël Hassan, Luigi Logrippo:
Interactions among secrecy models - (Work-in-progress paper). ICFI 2009: 160-165 - [c37]Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Typing for Conflict Detection in Access Control Policies. MCETECH 2009: 212-226 - [c36]Waël Hassan, Luigi Logrippo:
Governance Requirements Extraction Model for Legal Compliance Validation. RELAW 2009: 7-12 - 2008
- [c35]Waël Hassan, Luigi Logrippo:
Requirements and compliance in legal systems: a logic approach. RELAW 2008: 40-44 - 2007
- [c34]Romelia Plesa, Luigi Logrippo:
An Agent-Based Architecture for Context-Aware Communication. AINA Workshops (2) 2007: 133-138 - [c33]Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turner:
Conflict Detection in Call Control Using First-Order Logic Model Checking. ICFI 2007: 66-82 - [c32]Luigi Logrippo:
Normative Systems: the meeting point between Jurisprudence and Information Technology? - A position paper. SoMeT 2007: 343-354 - 2005
- [c31]Waël Hassan, Luigi Logrippo:
Governance Policies for Privacy Access Control and their Interactions. FIW 2005: 114-130 - 2002
- [c30]Rui Gustavo Crespo, Luigi Logrippo, Tom Gray:
Feature Execution Trees and Interactions. PDPTA 2002: 1230-1236 - 2000
- [c29]Luigi Logrippo:
Immaturity and Potential of Formal Methods: A Personal View. FIW 2000: 9-13 - [c28]Masahide Nakamura, Tohru Kikuno, Jameleddine Hassine, Luigi Logrippo:
Feature Interaction Filtering with Use Case Maps at Requirements Stage. FIW 2000: 163-178 - [c27]Daniel Amyot, Leïla Charfi, Nicolas Gorse, Tom Gray, Luigi Logrippo, Jacques Sincennes, Bernard Stepien, Tom Ware:
Feature Description and Feature Interaction Analysis with Use Case Maps and LOTOS. FIW 2000: 274-289 - [c26]Daniel Amyot, Luigi Logrippo:
Structural Coverage For LOTOS - a Probe Insertion Technique. TestCom 2000: 19-34 - 1999
- [c25]Daniel Amyot, Luigi Logrippo, Raymond J. A. Buhr, Tom Gray:
Use Case Maps for the Capture and Validation of Distributed Systems Requirements. RE 1999: 44- - 1998
- [c24]Jalel Kamoun, Luigi Logrippo:
Goal-Oriented Feature Interaction Detection in the Intelligent Network Model. FIW 1998: 172-186 - 1995
- [c23]Bernard Stepien, Luigi Logrippo:
Representing and Verifying Intentions in Telephony Features Using Abstract Data Types. FIW 1995: 141-155 - [c22]Daniel Amyot, Francis Bordeleau, Raymond J. A. Buhr, Luigi Logrippo:
Formal Support for Design Techniques: A Timethreads-LOTOS Approach. FORTE 1995: 57-72 - 1994
- [c21]Mohammed Faci, Luigi Logrippo:
Specifying features and analysing their interactions in a LOTOS environment. FIW 1994: 136-151 - [c20]Bernard Stepien, Luigi Logrippo:
Feature interaction detection using backward reasoning with LOTOS. PSTV 1994: 71-86 - 1993
- [c19]Mohammed Faci, Luigi Logrippo:
Specifying Hardware Systems in LOTOS. CHDL 1993: 319-326 - [c18]Brahim Ghribi, Luigi Logrippo:
A Validation Environment for LOTOS. PSTV 1993: 93-108 - 1992
- [c17]Mazen Haj-Hussein, Luigi Logrippo, Jacques Sincennes:
Goal oriented execution for LOTOS. FORTE 1992: 311-327 - 1991
- [c16]S. Gallouzi, Luigi Logrippo, Abdellatif Obaid:
An expressive trace theory for LOTOS. PSTV 1991: 159-175 - 1990
- [c15]Luigi Logrippo, Tim Melanchuk, Robert J. Du Wors:
The algebraic specification language LOTOS: an industrial experience. Formal Methods in Software Development 1990: 59-66 - [c14]S. Gallouzi, Luigi Logrippo, Abdellatif Obaid:
A Hoare-style Proof System for LOTOS. FORTE 1990: 49-62 - [c13]Luigi Logrippo:
The University of Ottawa LOTOS Toolkit. FORTE 1990: 563-566 - 1989
- [c12]Djaffar Gueraichi, Luigi Logrippo:
Derivation of Test Cases for LAP-B from a LOTOS Specification. FORTE 1989: 361-374 - [c11]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Formal Specifications of Telephone Systems in LOTOS. PSTV 1989: 25-34 - 1988
- [c10]Renaud Guillemot, Luigi Logrippo:
Derivation of Useful Execution Trees from LOTOS by using an Interpreter. FORTE 1988: 311-325 - 1987
- [c9]Abdellatif Obaid, Luigi Logrippo:
An Atomic Calculus of Communicating Systems. PSTV 1987: 91-104 - 1986
- [c8]J. P. Briand, M. C. Fehri, Luigi Logrippo, Abdellatif Obaid:
Structure of a LOTOS interpreter. SIGCOMM 1986: 167-175 - 1985
- [c7]Chris A. Vissers, Luigi Logrippo:
The importance of the service concept in the design of data communications protocols. PSTV 1985: 3-17 - 1984
- [c6]Luigi Logrippo, Didier Simon, Hasan Ural:
Executable Description of the OSI Transport Service in Prolog. PSTV 1984: 279-293 - 1983
- [c5]Luigi Logrippo:
"Constructive" and "Executable" Specifications of Protocol Services by using Abstract Data Types and Finite State Transducers. Protocol Specification, Testing, and Verification 1983: 111-124 - 1982
- [c4]Luigi Logrippo, Robert L. Probert:
Protocol/Specification-Level Validation. PSTV 1982: 303-304 - 1981
- [c3]Luigi Logrippo:
Input-directed program design. ACM Annual Conference 1981: 263-267 - 1972
- [c2]Luigi Logrippo:
Renamings in Program Schemas (Extended Abstract). SWAT 1972: 67-70 - 1969
- [c1]Luigi Logrippo:
Storage Interference in Asynchronous Computations. SWAT 1969: 46-60
Editorship
- 2018
- [e5]Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro:
Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10723, Springer 2018, ISBN 978-3-319-75649-3 [contents] - 2003
- [e4]Daniel Amyot, Luigi Logrippo:
Feature Interactions in Telecommunications and Software Systems VII, June 11-13, 2003, Ottawa, Canada. IOS Press 2003, ISBN 1-58603-348-4 [contents] - 1997
- [e3]Petre Dini, Raouf Boutaba, Luigi Logrippo:
Feature Interactions in Telecommunications Networks IV, June 17-19, 1997, Montréal, Canada. IOS Press 1997, ISBN 90-5199-347-1 [contents] - 1991
- [e2]Luigi Logrippo:
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 19-21, 1991. ACM 1991, ISBN 0-89791-439-2 [contents] - 1990
- [e1]Luigi Logrippo, Robert L. Probert, Hasan Ural:
Protocol Specification, Testing and Verification X, Proceedings of the IFIP WG6.1 Tenth International Symposium on Protocol Specification, Testing and Verification, Ottawa, Ontario, Canada, 12-15 June, 1990. North-Holland 1990, ISBN 0-444-88810-1 [contents]
Informal and Other Publications
- 2024
- [i1]Luigi Logrippo:
The order-theoretical foundation for data flow security. CoRR abs/2403.07226 (2024)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint