M. Abadi (1999):
Secrecy by Typing In Security protocols.
Journal of the ACM 5(46),
pp. 18–36,
doi:10.1145/324133.324266.
D.E. Bell & L.J. LaPadula (1976):
Secure Computer Systems: Unified Exposition and Multics Interpretation..
Technical Report ESD-TR-75-306.
Mitre C..
C. Bodei (2000):
Security Issues in Process Calculi..
Dipartimento di Informatica, Università di Pisa. TD-2/00, March, 2000.
C. Bodei, L. Brodo & R. Focardi (2015):
Static Evidences for Attack Reconstruction.
In: Programming Languages with Applications to Biology and Security,
LNCS 9465.
Springer,
pp. 162–182,
doi:10.1007/978-3-319-25527-9.
C. Bodei, M. Buchholtz, P. Degano, F. Nielson & H. Riis Nielson (2005):
Static validation of security protocols.
Journal of Computer Security 13(3),
pp. 347–390,
doi:10.3233/JCS-2005-13302.
C. Bodei, P. Degano, G-L. Ferrari & L. Galletta (2016):
Where do your IoT ingredients come from?.
In: Procs. of Coordination 2016,
LNCS 9686.
Springer,
pp. 35–50,
doi:10.1007/978-3-319-39519-7.
C. Bodei, P. Degano, F. Nielson & H. Riis Nielson (2001):
Static analysis for the π-calculus with applications to security.
Information and Computation 168,
pp. 68–92,
doi:10.1006/inco.2000.3020.
M. Buchholtz, H. Riis Nielson & Flemming F. Nielson (2004):
A calculus for control flow analysis of security protocols.
International Journal of Information Security 2(3),
pp. 145–167,
doi:10.1007/s10207-004-0036-x.
N. Carriero & D. Gelernter (2001):
A Computational Model of Everything.
Commun. ACM 44(11),
pp. 77–81,
doi:10.1145/384150.384165.
D.E Denning (1982):
Cryptography and Data Security.
Addison-Wesley, Reading Mass..
P. Elejoste, A. Perallos, A. Chertudi, I. Angulo, A. Moreno, L. Azpilicueta, J.J Astrain, F. Falcone & J. E. Villadangos (2013):
An Easy to Deploy Street Light Control System Based on Wireless Communication and LED Technology.
Sensors 13(5),
pp. 6492–6523,
doi:10.3390/s130506492.
S. Escolar, J. Carretero, M. Marinescu & S Chessa (2014):
Estimating Energy Savings in Smart Street Lighting by Using an Adaptive Control System.
IJDSN 2014,
doi:10.1155/2014/971587.
D. Gelernter (1985):
Generative Communication in Linda.
ACM Trans. Program. Lang. Syst. 7(1),
pp. 80–112,
doi:10.1145/2363.2433.
M. Herlihy (1991):
Wait-Free Synchronization.
ACM Trans. Program. Lang. Syst. 13(1),
pp. 124–149,
doi:10.1145/114005.102808.
I. Lanese, L. Bedogni & M. Di Felice (2013):
Internet of things: a process calculus approach.
In: Procs of the 28th Annual ACM Symposium on Applied Computing, SAC '13.
ACM,
pp. 1339–1346,
doi:10.1145/2480362.2480615.
I. Lanese & D. Sangiorgi (2010):
An operational semantics for a calculus for wireless systems.
Theor. Comput. Sci. 411(19),
pp. 1928–1948,
doi:10.1016/j.tcs.2010.01.023.
R. Lanotte & M. Merro (2016):
A Semantic Theory of the Internet of Things..
In: Procs. of Coordination 2016,
LNCS 9686.
Springer,
pp. 157–174,
doi:10.1007/978-3-319-39519-7.
S. Nanz, F. Nielson & H. Riis Nielson (2010):
Static analysis of topology-dependent broadcast networks.
Inf. Comput. 208(2),
pp. 117–139,
doi:10.1016/j.ic.2009.10.003.
A. Singh, C. R. Ramakrishnan & S.A. Smolka (2010):
A process calculus for Mobile Ad Hoc Networks.
Sci. Comput. Program. 75(6),
pp. 440–469,
doi:10.1016/j.scico.2009.07.008.