Selected papers by Luigi Logrippo and associates (other papers
can be found here)
The following list is a mix of recent papers and older
ones that may still be useful, in chronological order.
In most cases, they are corrected or updated versions
of published papers.
Refer to the publisher’s sources to find the published
versions.
If you have remarks or questions on these materials, I
am interested in hearing from you.
PDF
Luigi Logrippo. Data
flow security in Role-Based Access Control (RBAC). Submitted for publication.
PDF Luigi Logrippo. The order-theoretical foundation for
data flow security. Technical report, Université du Québec en
Outaouais, 2023. (This paper was submitted to a journal, which proposed it
to six potential referees, all of which declined).
PDF
Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, Marco
Roveri, Aidin Rasti, Ali Roudak, John Mylopoulos. Specification and Analysis of Legal
Contracts with Symboleo. Softw. Syst. Model. 21(6):
2395-2427 (2022).
PDF Abdelouadoud Stambouli, Luigi
Logrippo. Implementation of a partial order data security model for the
Internet of things (IoT) using Software defined networking (SDN). Journal of
Cybersecurity and Privacy 4 (3) (2024), 468-493.
PDF John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi. Social Requirements Models for Services. Next-Gen Digital Services
2021 Essays Dedicated to Michael
Papazoglou on the Occasion of His 65th Birthday and
His Retirement. LNCS 12521, Springer 2021, ISBN 978-3-030-73202-8: 100-108
PDF Luigi Logrippo, Abdelouadoud Stambouli.
Proposal for industrial tools for data security (2020). Our recent papers have
led to the discovery of methods and algorithms of industrial interest, they are
described here. Technical Report : Université du
Québec en Outaouais, December 2020.
PDF Alireza Parvizimosaed, Sepehr
Sharifi, Daniel Amyot, Luigi Logrippo, John Mylopoulos. Subcontracting,
Assignment, and Substitution for Legal Contracts in Symboleo. Intern. Conf. on
Conceptual Modeling, ER 2020, Springer LNCS 12400, 271-285. ISBN 978-3-030-62521-4.
PDF Sepehr Sharifi, Alireza Parvizimosaed, Daniel Amyot, Luigi Logrippo,
John Mylopoulos. Symboleo: Towards a Specification Language for Legal
Contracts. 28th IEEE Intern. Requirements Engineering Conference (RE
2020),364-369. ISBN 978-1-7281-7438-9.
PDF Luigi Logrippo. Multi-level models for data security in networks and in
the Internet of things. Journ. of Information Security and Applications
(Elsevier) 58: 102778 (2021).
PDF Luigi Logrippo, Abdelouadoud
Stambouli. Configuring data flows in the Internet of
Things for security and privacy requirements. 11th International Symposium on
Foundations and Practice of Security (FPS 2018). Montreal, Nov. 13-15, 2018.
Springer LNCS 11358, 115-130. See also
the presentation.
PDF Abdelouadoud Stambouli, Luigi
Logrippo. Data flow analysis from capability lists, with application to RBAC
and LaBAC. Augmented version of paper titled: Data flow analysis from
capability lists, with application to RBAC. Information Processing Letters (Elsevier)
141 (2019) 30–40.
PDF Luigi Logrippo. Multi-level
access control, directed graphs and partial orders in flow control for
data secrecy and privacy. Augmented version of paper appeared in: Foundations
and Practice of Security. FPS 2017. Springer LNCS 10723 (2018), 111-123.
Springer, DOI https://doi.org/10.1007/978-3-319-75650-9_8. See also the presentation.
PDF Sofiene Boulares, Kamel Adi, Luigi
Logrippo. Insider threat likelihood assessment for flexible access control. Proc.
of the 7th Intern. MCETECH Conference on eTechnologies.
Ottawa, 2017. Refer to Springer site for the official copy. In:
Aïmeur E., Ruhi U., Weiss M. (eds) E-Technologies:
Embracing the Internet of Things. LNBIP 289, Springer, 77-95.
PDF Sofiene Boulares, Kamel Adi, Luigi
Logrippo. Insider threat likelihood assessment for access control
systems: Quantitative approach. Proc. of the 9th International
Symposium on Foundations and Practice of Security (FPS), Québec, October 2016,
Lecture Notes in Computer Science 10128, Springer 2017, 135-142. Springer
Copyright. Refer to Springer LNBIP site for the official copy.
PDF Luigi
Logrippo, Causality in Computer Science.
Letter to the Editor of the Communications of the ACM,
59(7), 9, 2016.
PDF
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. A data classification method for
inconsistency and incompleteness detection in access control policy data sets. International
Journal of Information Security, 16(1), 91-113, 2017. A related policy generation tool
is available.
PDF Jamal Abd-Ali, Karim
El Guemhioui, Luigi Logrippo. Metamodelling with
Formal Semantics with Application to Access Control Specification. MODELSWARD
2015: 354-36
PDF Jamal Abd-Ali, Karim
El Guemhioui, Luigi Logrippo. A Meta-model for Access Control Policies. Journal
of Software 10(7), 2015, 784-797.
PDF
Sofiene Boulares, Kamel Adi, Luigi Logrippo. Information
flow-based security levels assessment for access control systems. LNBIP 209
105-121. Proc. of the 6th International MCETECH Conference on eTechnologies. Montreal, May 2015. Springer Copyright.
Refer to Springer LNBIP site for the official copy.
PDF
Luigi Logrippo. Logical Method for
Reasoning about Access Control and Data Flow Control Models. Proc. of the 7th
International Symposium on Foundations and Practice of Security, Montréal, Nov.
2014. F. Cuppens et al. (Eds.): FPS 2014, LNCS 8930, 205–220, 2015. Springer
Copyright. Refer to Springer LNCS volume for the official copy (this is an
extended version). (See also PRESENTATION). This
paper is my first in this research direction, My view
of this topic has changed considerably.
PDF Omar Abahmane,
Luigi Logrippo. Granularity Based Flow Control. Proc. 12th Annual
International Conference on Privacy, Security and Trust (PST), Toronto, July
2014, 239-248. (see also PRESENTATION).
PDF Salim Khamadja, Kamel Adi, Luigi Logrippo. Designing Flexible Access Control Models for the
Cloud. Proc. of the 6th International Conference on Security of Information and
Networks (SIN 2013), Aksaray, Turkey, Nov. 2013,
225-232. ACM Copyright. Refer to ACM site for official copy.
PDF Waël Hassan, Luigi Logrippo. Towards a Process for Legally Compliant Software. Proc. 6th
International IEEE Workshop on Requirements Engineering and Law, (RELAW 2013)
Rio de Janeiro, 44-52. IEEE copyright: Refer to IEEE site for official copy.
PDF Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo. A
Framework for Risk Assessment in Access Control Systems. Computers
& Security (Elsevier), 39, Part A, 2013, 86-103.
PDF Muyiwa Olurin, Carlisle
Adams, Luigi Logrippo. Platform for Privacy Preferences (P3P): Current Status
and Future Directions. In: N. Cuppens-Boulahia, P.Fong, J. García-Alfaro, S. Marsh, J.-P. Steghöfer (Eds.): Tenth Annual International Conference on
Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012,
217-220.
PDF Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. Dynamic
Risk-based Decision Methods for Access Control Systems. Computers and Security
(Elsevier), 31(4): 447-464, 2012.
PDF Bernard Stepien, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo. CatBAC: A Generic Framework for Designing and Validating
Hybrid Access Control Models. Proc. of SFCS 2012, the First IEEE International
Workshop on Security and Forensics in Communication Systems, Ottawa, June
10-15, 6721-6726.
This paper continues the work
presented in the paper by Slimani et al. (see below) by presenting an access
control language that extends the graphical UML notation proposed in this
second paper.
PDF Yacine Bouzida, Luigi Logrippo, Sergei Mankovski. Concrete and Abstract Based Access Control. Intern.J. of Inform. Security, 10 (4) Aug. 2011, 223-238. Copyright by Springer www.springerlink.com.
PDF Logrippo, L. From e-business to e-laws and
e-judgments: 4,000 years of experience. CYBERLAWS 2011, Proc. of the Second
International Conference on Technical and Legal Aspects of the e-Society,
Guadeloupe, Feb 2011, 22-28.
Several Google
searches in year 2011 on keyword ‘e-judgment’ or ‘electronic judgment’ have
consistently ranked this document among the top five. The other documents
listed used the term in a different meaning (as databases of judgments). So it appears that I am the inventor of this term. We’ll see
how useful it will be. In 1961, fresh from law school, I was hired to study the
uses that computers could have in legal establishments. It then occurred to me
that computers could help decide simple legal cases. It took me fifty years to
come up with a paper on this topic! People interested in this subject may be
interested also in the following: HTML
PDF Slimani, N., Khambhammettu, H., Adi, K., Logrippo, L.
UACML: Unified Access Control Modeling Language. In: New Technologies, Mobility
and Security (NTMS), 2011 4th IFIP Intern. Conf. on, 2011, 1-8. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5721143
PDF Ma, J., Logrippo, L., Adi, K., Mankovski, S. Risk
Analysis in Access Control Systems Based on Trust Theories. The 3rd Workshop on
Logics for Intelligent Agents and Multi-Agent Systems (WLIAMas
2010). Toronto, Aug. 2010, 415-418.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5614467
Shaikh, R.A., Adi, K., Logrippo, L., Mankovski, S. Inconsistency
Detection Method for Access Control Policies. IEEE sixth International
Conference on Information Assurance and Security (IAS 2010), Atlanta, Aug.
2010, 204-209. This paper has been superseded by our 2017 paper: PDF
PDF Ma, J., Adi, K., Mejri, M., Logrippo,
L. Risk Analysis in Access Control Systems. Eight Intern. Conf. on Privacy,
Security, and Trust (PST 2010). Ottawa, Aug. 2010, 160-166.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5593248
Shaikh, R.A., Adi,K., Logrippo, L.,
Mankovski, S. Detecting Incompleteness in Access Control Policies Using Data
Classification Schemes, In Proc. of the 5th International Conference on Digital
Information Management (ICDIM 2010), Thunder Bay, Canada, July 2010, IEEE Press, 417-422. This paper
has been superseded by our 2017 paper: PDF
PDF Ma, J., Adi, K., Logrippo, L.,
Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International
Conference on Digital Information Management (ICDIM 2010), Thunder Bay, Canada,
July 2010, IEEE Press, 423-430.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5664658
PDF Plesa, R., Logrippo, L. An Agent-Based Architecture
for Providing Enhanced Communication Services. Chapter 15 in: Laurence T. Yang
(Ed.) Research in Mobile Intelligence – Wiley series on Parallel and
Distributed Computing, 2010. 320-342.
PDF Hassan, W., Slimani, N., Adi, K., Logrippo, L.,
Secrecy UML method for model transformations. 2nd International Conference ABZ
Short Papers, 2010, 16-21.
PDF Hassan, W., Logrippo, L. A Governance Requirements
Extraction Model for Legal Compliance Validation. In Proc. IEEE 17th
International Requirements Engineering Conference (RE'09): RELAW Workshop.
Atlanta, GA. Sep. 2009, 7-12.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5459844
PDF Adi, K., Bouzida, Y., Hattak, I., Logrippo, L., Mankovskii, S. Typing for Conflict Detection in Access
Control Policies. In: G. Babin, P. Kropf, M. Weiss (Eds.): E-Technologies:
Innovation in an Open World. Proc. of the 4th Intern. Conf. MCETECH
2009 (Ottawa, May 2009), Lecture Notes in Business Information Processing
(LNBIP 26), Springer, 2009, 212-226.
PDF Hassan, W., Logrippo, L. Detecting inconsistencies of mixed secrecy models and business policies.
University of Ottawa Technical Report, 2009.
PDF
Hassan, W. and Logrippo, L. Requirements and Compliance in Legal
Systems: a Logic Approach. In Proc. IEEE 16th International Requirements
Engineering Conference (RE'08): RELAW Workshop. Barcelona, Spain. Sep. 2008, 40-44.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4797473
PDF Logrippo, L. Normative Systems: the
Meeting Point between Jurisprudence and Information Technology? In: H. Fujita,
D. Pisanelli (Eds.): New Trends in Software Methodologies, Tools and Techniques
– Proc. of the 6th SoMeT_07. IOS Press, 2007, 343-354.
PDF Layouni, A., Logrippo, L., Turner, K.J. Conflict Detection in
Call Control Using First-Order Logic Model Checking. In: L. DuBousquet,
Jean-Luc Richier (Eds): 9th International Conference
on Feature Interactions in Software and Communication Systems, IOS Press, 2008
(Proc. of ICFI ’07, Grenoble, France, Sept. 2007), 77-92.
PDF
Plesa, R., Logrippo, L. An
Agent-Based Architecture for Contex-Aware
Communications. Proc. of the 21st International Conference on Advanced
Information Networking and Applications Workshops (PCAC-07 Niagara Falls, May
2007), IEEE Press, Vol.2, 133-138.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4224094
PDF Xu, Y., Logrippo, L., Sincennes, J. Detecting Feature
Interactions in CPL. Journal of Network and Computer Applications 30 (2)
(2007), 775-799.
Keywords: Call Processing Language, consistency
PDF Crespo, R.G., Carvalho, M., Logrippo, L. Distributed
Resolution of Feature Interactions for Internet Applications. Computer Networks
51 (2) (2007) 382-397.
PDF Jiang, D., Liscano, R., Logrippo, L. Personalization
of Internet Telephony Services for Presence with SIP and Extended CPL. Computer
Communications 29 (18)
(Nov. 2006) 3766-3779.
PDF Gorse, N., Logrippo, L., Sincennes, J. Formal
Detection of Feature Interactions with Logic Programming and LOTOS. Journal on Software and System Modelling, 5
(2), 2006,
121-134.
Note 1: This paper was mistakenly published
under the title: Detecting Feature Interactions in CPL. Note 2: Although the title of this paper is rather specific with
its reference to Logic Programming and LOTOS, the principles presented in the
first part are generic and have been used in other papers.
PDF de Castro Andrade, R. M., Logrippo, L. MoRaR: A
Pattern Language for Mobility and Radio Resource Management. Appeared in
reedited form in: D.Manolescu,
J.Noble, M. Voelter -
Pattern Languages of Program Design 5, Chapter 10. Addison-Wesley, 2006,
213-255
This paper is a rather extensive
study of patterns occurring in mobile telephony systems software, almost unique
in its kind.
PDF Amyot, D., Gray, T., Liscano, R., Logrippo, L.,
Sincennes, J. Interactive Conflict Detection and Resolution for Personalized
Features. Journal of Communications and Networks, 7 (3), 2005, 353-366.
PDF Plesa, R., Logrippo, L. Enhanced Communications
Servers through Context Integration. In T. Magedanz, A. Karmouch, S. Pierre, I.
Venieris (Eds) - Mobility Aware Technologies and
Applications – (MATA, Montreal Oct. 2005) Short papers volume, 1-5.
PDF Mankai, M., Logrippo, L.
Access Control Policies: Modeling and Validation. Proceedings of NOTERE 2005
(Gatineau, August) 85-91. Keywords: XACML, consistency checking, Alloy
This was one of the very first papers
published on the subject of consistency checking for XACML policies
but it doesn’t get cited. Oh, well …
PDF Hassan, W., Logrippo, L. Governance Policies for
Privacy Access Control and their Interactions. In: S.Reiff-Marganiec, M.D. Ryan (Eds) Feature
Interactions in Telecommunications and Software Systems. (Proc. of the VIII
International Conference on Feature Interaction, ICFI 2005), Leicester, UK, IOS
Press, 2005, 114-130.
PDF Amyot, L., Logrippo, L., Weiss, M. Generation of test
purposes from Use Case Maps. Computer Networks 49 (5), 2005, 643-660.
PDF Dini, P., Clemm, A., Gray, T., Lin, F.J., Logrippo,
L., Reiff-Marganiec, S. Policy-enabled Mechanisms for
Feature Interactions: Reality, Expectations, Challenges. Computer Networks, 45
(5), 2004, 585 - 603.
Old papers that
are still cited occasionally …
This is a repository where I put papers that are still
being cited or for which I have received requests.
PDF Haj-Hussein,
M., Logrippo, L., Sincennes, J. Goal-oriented Execution of LOTOS Specifications. In: M. Diaz and R. Groz
(Eds.) Formal Description Techniques, V. North- Holland, 1993 (Proc. of the 4rth FORmal
TEchniques International Conference, Perros- Guirec,
France, 1992. Sponsored by IFIP WG 6.1) 311-327.
The concept of goal-oriented
execution for LOTOS was discovered almost simultaneously by our group and a
Dutch group (Ed Brinksma and Henk Eertink).
It is applicable to CCS and CSP, as well as to other process-algebraic
languages. However strangely, many years later, this extension has not been done, for what I know. It is a useful technique for state
exploration in infinite-state systems. The PhD thesis of Mazen Haj-Hussein,
that explained the concept in detail, is available in
the web.
PDF Logrippo, L., Faci, M., and Haj-Hussein, M. An
Introduction to LOTOS: Learning by Examples.
Computer Networks and ISDN Systems 23(5) (1992) 325-342. Errata in 25(1)
(1992) 99-100.
PDF Guillemot, R., Haj-Hussein, M.,
Logrippo, L. Executing large LOTOS specifications. In: S. Aggarwal, K. Sabnani
(Eds): Protocol Specification, Testing and Verification VIII (Proc. of the PSTV
VIII Symposium). Elsevier-IFIP 1988, 399-410.
PDF Logrippo, L., Obaid, A., Briand, J.P., Fehri, M.C. An Interpreter for LOTOS, a Specification
Language for Distributed Systems. Software-Practice and Experience Vol 18(4),
365-385 (April 1988).
Note: This paper was written in
1986. It presents the first LOTOS interpreter realized in the world. However the language discussed is different from the one
that eventually became a standard.
PDF Vissers, C.A., Logrippo, L. The Importance of the Service Concept in the Design of
Data Communications Protocols.
This paper appeared, in slightly
different form, in M. Diaz (Ed.) Protocol Specification, Testing, and
Verification, V. (Proc. of the IFIP WG 6.1 Fifth International Workshop on
Protocol Specification, Testing and Verification) Elsevier-North-Holland, 1986,
3-17.
PDF Logrippo, L., Stepien, B. Cluster
Analysis for the Computer-Assisted Statistical Analysis of Melodies. Computers
and the Humanities, Vol. 20, No. 1, 19-33 (Jan.-March 1986).
Keywords: Inuit music; Canadian
Eskimo music; a-ja-jai songs; ajajai songs;
statistical methods in ethno-musicology; transcriptions; music score.
A chapter by the same authors,
including further documentation on this work, can be found in the following
book: Pelinski, R. La musique des inuit
du caribou. Presses de l’Université de Montréal,
1981. Because this book is out of print, I have put on line
the following excerpts (PDF) which include: 1) transcriptions of
the songs collected by Pelinski; 2) information on
the CD realized by Pelinsky, which I believe can
still be purchased.
PDF Pelinski, R., Logrippo, L., Hickey, P.J.,
Strong, E. A comparative computer analysis of Inuit songs. University of
Ottawa, Computer Science Department, Technical Report TR80.08 (1980).
Keywords: Inuit music; Canadian
Eskimo music; a-ja-jai songs; ajajai songs;
statistical methods in ethno-musicology. See also previous
title.
Open
Distributed Processing (ODP) Tutorials
The Open Distributed Processing (ODP) concept was much
ahead of its time and is still of current interest.
Although this is not often recognized, the Service
Oriented Architecture (SOA) is based on ODP concepts.
Here are some tutorial papers and research reports
that we wrote quite a while ago (1993-1996), with my student Kazi Farooqui.
I think that they are still useful.
PDF Farooqui, K.,
Logrippo, L., DeMeer, J. The ISO Reference Model for
Open Distributed Processing:
an introduction.
Computer Networks and ISDN Systems 27 (1995) 1215-1229.
PDF Farooqui, K., Logrippo, L. Architecture for Open
Distributed Software Systems. Technical Report, University of Ottawa, 1994. A shorter version of this tutorial was
published in: Zomaya, A.Y.S. (Ed.). Parallel and Distributed Computing
Handbook. McGraw-Hill, 1996, 303-329.
PDF Farooqui, K., Logrippo, L. Introduction to the ODP
Computational Model. Technical Report, University of Ottawa, 1994.
PDF Farooqui, K., Logrippo, L. Introduction to the ODP
Engineering Model. Technical Report, University of Ottawa, 1994.
Very old papers
that haven’t been cited at all…
Some of my best papers are those that resulted from my
PhD thesis, years of work… with the help of my supervisors, John Brzozowski and
Ed Ashcroft, as well as the inspiration of my external examiner, Ray Miller.
They have received extremely few citations, probably because the topic has not
been fashionable. But I know that they are a lot better than some papers of
mine that have been cited dozens of times. So much for citation counts.
PDF Logrippo, L. Renamings and Economy of Memory in Program Schemata. J. ACM
25(1), (Jan. 1978), 10-22
It is possible to change the name of
the variables in programs in such a way that the results computed are
unchanged. This equivalence-preserving transformation is at the basis of
program optimizations such as efficient register allocation or efficient memory
allocation, used in optimizing compilers. This paper justifies theoretically
this transformation and explains how it works.
PDF Logrippo, L. Renamings,
Maximal Parallelism, and Space-Time Tradeoff in Program Schemata. J. ACM 26(4),
(Oct. 1979), 819 - 833
This paper continues the work presented in the previous paper. It shows formally that by allocating more memory space, more variables, or more registers, the parallelism of a program can be increased. For example, the parallelism of a producer-consumer system can be increased by increasing the length of the queue between the producer and consumer. Pipelined processors with instruction look-ahead use the same principle. This equivalence-preserving transformation can be applied automatically in order to take advantage of computational resources as they become available, at execution time or at compilation time.
It is useful to
review the results of this paper in the light of Amdahl’s famous law. One of
several ways of interpreting this law states that the speedup that can be
obtained in the execution of a program P by using increasingly larger numbers
of processors in parallel computing arrangements is limited by the time needed
for executing the sequential parts of P. Amdahl’s law assumes that the
sequential and parallelizable parts of P are known in advance and cannot be
changed (unless the program is redesigned). This paper shows that: 1) it may be
possible to execute a program at different levels of parallelisms at different
points of execution 2) it may possible
to increase the parallelism of a program by spreading its working space in
memory, essentially by using queue or queue-like mechanisms. This paper also
characterizes the program structures where this can or cannot be done.
Intuitively, these concepts are well recognized in Computer Science
however here they are formally analyzed.
Some
non-technical papers
HTML From Sumerian Codes to Computer Code: A Formal Logic Perspective
on Legal Theory and Information Technology in a Historical Context.
This is a sort of evolving notebook
that I keep on this subject. I make it available in case others are interested
and I am always interested in readers’ opinions.
HTML Pierre Stanislas Bédard : a
precursor of symbolic logic. October 2013
PDF Mario Bolognani, Luigi Logrippo. Le origini del software industriale in Italia (The origins of
Software Industry in Italy, in Italian). Sviluppo e Organizzazione,
Marzo-Aprile 2009, 52-63.
HTML My first two
computers: Elea 9003 and Elea 6001. Winter 2007.
PDF Review of two books on early electronic music in
Italy. MusicWorks. Winter 2006
PDF A capsule history of the Department of Computer Science, University of
Ottawa
HTML Memorial: Otto G. Wadsted
Neither papers,
nor technical, nor mine!
PDF L’église de Saint Joachim. Sculptures par François
Baillargé et autres, photos par Licia Paolucci
PDF
(1 MB); JPEG (6 MB);
TIFF (97 MB); IMAGO URBIS ROMAE ANNO
MDCCCLXX – Pianta Map Carte Roma Rome 1870