Selected papers by Luigi Logrippo and associates (other papers can be found here)

 

The following list is a mix of recent papers and older ones that may still be useful, in chronological order.

In most cases, they are corrected or updated versions of published papers.

Refer to the publisher’s sources to find the published versions.

If you have remarks or questions on these materials, I am interested in hearing from you.

PDF Luigi Logrippo. Data flow security in Role-Based Access Control (RBAC). Submitted for publication.

PDF Luigi Logrippo. The order-theoretical foundation for data flow security. Technical report, Université du Québec en Outaouais, 2023. (This paper was submitted to a journal, which proposed it to six potential referees, all of which declined).

PDF Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, Marco Roveri, Aidin Rasti, Ali Roudak, John Mylopoulos. Specification and Analysis of Legal Contracts with Symboleo. Softw. Syst. Model. 21(6): 2395-2427 (2022).

PDF Abdelouadoud Stambouli, Luigi Logrippo. Implementation of a partial order data security model for the Internet of things (IoT) using Software defined networking (SDN). Journal of Cybersecurity and Privacy 4 (3) (2024), 468-493.

PDF John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi. Social Requirements Models for Services. Next-Gen Digital Services Essays Dedicated to Michael Papazoglou on the Occasion of His 65th Birthday and His Retirement. LNCS 12521, Springer 2021, ISBN 978-3-030-73202-8: 100-108

PDF Luigi Logrippo, Abdelouadoud Stambouli. Proposal for industrial tools for data security (2020). Our recent papers have led to the discovery of methods and algorithms of industrial interest, they are described here. Technical Report : Université du Québec en Outaouais, December 2020.

PDF Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, John Mylopoulos. Subcontracting, Assignment, and Substitution for Legal Contracts in Symboleo. Intern. Conf. on Conceptual Modeling, ER 2020, Springer LNCS 12400, 271-285. ISBN 978-3-030-62521-4.

PDF Sepehr Sharifi, Alireza Parvizimosaed, Daniel Amyot, Luigi Logrippo, John Mylopoulos. Symboleo: Towards a Specification Language for Legal Contracts. 28th IEEE Intern. Requirements Engineering Conference (RE 2020),364-369. ISBN 978-1-7281-7438-9.

PDF Luigi Logrippo. Multi-level models for data security in networks and in the Internet of things. Journ. of Information Security and Applications (Elsevier) 58: 102778 (2021).

PDF Luigi Logrippo, Abdelouadoud Stambouli. Configuring data flows in the Internet of Things for security and privacy requirements. 11th International Symposium on Foundations and Practice of Security (FPS 2018). Montreal, Nov. 13-15, 2018. Springer LNCS 11358, 115-130.  See also the presentation.

PDF Abdelouadoud Stambouli, Luigi Logrippo. Data flow analysis from capability lists, with application to RBAC and LaBAC. Augmented version of paper titled: Data flow analysis from capability lists, with application to RBAC. Information Processing Letters (Elsevier) 141 (2019) 30–40.

PDF Luigi Logrippo. Multi-level access control, directed graphs and partial orders in flow control for data secrecy and privacy. Augmented version of paper appeared in: Foundations and Practice of Security. FPS 2017. Springer LNCS 10723 (2018), 111-123. Springer, DOI https://doi.org/10.1007/978-3-319-75650-9_8. See also the presentation.

PDF Sofiene Boulares, Kamel Adi, Luigi Logrippo. Insider threat likelihood assessment for flexible access control. Proc. of the 7th Intern. MCETECH Conference on eTechnologies. Ottawa, 2017. Refer to Springer site for the official copy. In: Aïmeur E., Ruhi U., Weiss M. (eds) E-Technologies: Embracing the Internet of Things. LNBIP 289, Springer, 77-95.

PDF Sofiene Boulares, Kamel Adi, Luigi Logrippo. Insider threat likelihood assessment for access control systems: Quantitative approach. Proc. of the 9th International Symposium on Foundations and Practice of Security (FPS), Québec, October 2016, Lecture Notes in Computer Science 10128, Springer 2017, 135-142. Springer Copyright. Refer to Springer LNBIP site for the official copy.

PDF Luigi Logrippo, Causality in Computer Science. Letter to the Editor of the Communications of the ACM, 59(7), 9, 2016.

PDF Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. A data classification method for inconsistency and incompleteness detection in access control policy data sets. International Journal of Information Security, 16(1), 91-113, 2017. A related policy generation tool is available.

PDF Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo. Metamodelling with Formal Semantics with Application to Access Control Specification. MODELSWARD 2015: 354-36

PDF Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo. A Meta-model for Access Control Policies. Journal of Software 10(7), 2015, 784-797.

PDF Sofiene Boulares, Kamel Adi, Luigi Logrippo. Information flow-based security levels assessment for access control systems. LNBIP 209 105-121. Proc. of the 6th International MCETECH Conference on eTechnologies. Montreal, May 2015. Springer Copyright. Refer to Springer LNBIP site for the official copy.

PDF Luigi Logrippo. Logical Method for Reasoning about Access Control and Data Flow Control Models. Proc. of the 7th International Symposium on Foundations and Practice of Security, Montréal, Nov. 2014. F. Cuppens et al. (Eds.): FPS 2014, LNCS 8930, 205–220, 2015. Springer Copyright. Refer to Springer LNCS volume for the official copy (this is an extended version). (See also PRESENTATION). This paper is my first in this research direction, My view of this topic has changed considerably.

PDF Omar Abahmane, Luigi Logrippo. Granularity Based Flow Control. Proc. 12th Annual International Conference on Privacy, Security and Trust (PST), Toronto, July 2014, 239-248. (see also PRESENTATION).

PDF Salim Khamadja, Kamel Adi, Luigi Logrippo. Designing Flexible Access Control Models for the Cloud. Proc. of the 6th International Conference on Security of Information and Networks (SIN 2013), Aksaray, Turkey, Nov. 2013, 225-232. ACM Copyright. Refer to ACM site for official copy.

PDF Waël Hassan, Luigi Logrippo. Towards a Process for Legally Compliant Software. Proc. 6th International IEEE Workshop on Requirements Engineering and Law, (RELAW 2013) Rio de Janeiro, 44-52. IEEE copyright: Refer to IEEE site for official copy.

PDF Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo. A Framework for Risk Assessment in Access Control Systems. Computers & Security (Elsevier), 39, Part A, 2013, 86-103.

PDF Muyiwa Olurin, Carlisle Adams, Luigi Logrippo. Platform for Privacy Preferences (P3P): Current Status and Future Directions. In: N. Cuppens-Boulahia, P.Fong, J. García-Alfaro, S. Marsh, J.-P. Steghöfer (Eds.): Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012, 217-220.

PDF Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. Dynamic Risk-based Decision Methods for Access Control Systems. Computers and Security (Elsevier), 31(4): 447-464, 2012.

PDF Bernard Stepien, Hemanth Khambhammettu,  Kamel Adi, Luigi Logrippo. CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models. Proc. of SFCS 2012, the First IEEE International Workshop on Security and Forensics in Communication Systems, Ottawa, June 10-15, 6721-6726.

This paper continues the work presented in the paper by Slimani et al. (see below) by presenting an access control language that extends the graphical UML notation proposed in this second paper.

PDF Yacine Bouzida, Luigi Logrippo, Sergei Mankovski. Concrete and Abstract Based Access Control. Intern.J. of Inform. Security, 10 (4) Aug. 2011, 223-238.  Copyright by Springer www.springerlink.com.

PDF Logrippo, L. From e-business to e-laws and e-judgments: 4,000 years of experience. CYBERLAWS 2011, Proc. of the Second International Conference on Technical and Legal Aspects of the e-Society, Guadeloupe, Feb 2011, 22-28.

Several Google searches in year 2011 on keyword ‘e-judgment’ or ‘electronic judgment’ have consistently ranked this document among the top five. The other documents listed used the term in a different meaning (as databases of judgments). So it appears that I am the inventor of this term. We’ll see how useful it will be. In 1961, fresh from law school, I was hired to study the uses that computers could have in legal establishments. It then occurred to me that computers could help decide simple legal cases. It took me fifty years to come up with a paper on this topic! People interested in this subject may be interested also in the following: HTML

PDF Slimani, N., Khambhammettu, H., Adi, K., Logrippo, L. UACML: Unified Access Control Modeling Language. In: New Technologies, Mobility and Security (NTMS), 2011 4th IFIP Intern. Conf. on,  2011, 1-8. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5721143

PDF Ma, J., Logrippo, L., Adi, K., Mankovski, S. Risk Analysis in Access Control Systems Based on Trust Theories. The 3rd Workshop on Logics for Intelligent Agents and Multi-Agent Systems (WLIAMas 2010). Toronto, Aug. 2010, 415-418.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5614467

Shaikh, R.A., Adi, K., Logrippo, L., Mankovski, S. Inconsistency Detection Method for Access Control Policies. IEEE sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, Aug. 2010, 204-209. This paper has been superseded by our 2017 paper: PDF

PDF Ma, J., Adi, K., Mejri, M., Logrippo, L. Risk Analysis in Access Control Systems. Eight Intern. Conf. on Privacy, Security, and Trust (PST 2010). Ottawa, Aug. 2010, 160-166.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5593248

Shaikh, R.A., Adi,K., Logrippo, L., Mankovski, S. Detecting Incompleteness in Access Control Policies Using Data Classification Schemes, In Proc. of the 5th International Conference on Digital Information Management (ICDIM 2010), Thunder Bay, Canada, July 2010, IEEE Press, 417-422.  This paper has been superseded by our 2017 paper: PDF

PDF Ma, J., Adi, K., Logrippo, L., Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International Conference on Digital Information Management (ICDIM 2010), Thunder Bay, Canada, July 2010, IEEE Press, 423-430.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5664658

PDF Plesa, R., Logrippo, L. An Agent-Based Architecture for Providing Enhanced Communication Services. Chapter 15 in: Laurence T. Yang (Ed.) Research in Mobile Intelligence – Wiley series on Parallel and Distributed Computing, 2010. 320-342.

PDF Hassan, W., Slimani, N., Adi, K., Logrippo, L., Secrecy UML method for model transformations. 2nd International Conference ABZ Short Papers, 2010, 16-21.

PDF Hassan, W., Logrippo, L. A Governance Requirements Extraction Model for Legal Compliance Validation. In Proc. IEEE 17th International Requirements Engineering Conference (RE'09): RELAW Workshop. Atlanta, GA.  Sep. 2009, 7-12.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5459844

PDF Adi, K., Bouzida, Y.,  Hattak, I., Logrippo, L., Mankovskii, S. Typing for Conflict Detection in Access Control Policies. In: G. Babin, P. Kropf, M. Weiss (Eds.): E-Technologies: Innovation in an Open World. Proc. of the 4th Intern. Conf. MCETECH 2009 (Ottawa, May 2009), Lecture Notes in Business Information Processing (LNBIP 26), Springer, 2009, 212-226.

PDF Hassan, W., Logrippo, L. Detecting inconsistencies of mixed secrecy models and business policies. University of Ottawa Technical Report, 2009.

PDF Hassan, W. and Logrippo, L. Requirements and Compliance in Legal Systems: a Logic Approach. In Proc. IEEE 16th International Requirements Engineering Conference (RE'08): RELAW Workshop. Barcelona, Spain.  Sep. 2008, 40-44.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4797473

PDF Logrippo, L. Normative Systems: the Meeting Point between Jurisprudence and Information Technology? In: H. Fujita, D. Pisanelli (Eds.): New Trends in Software Methodologies, Tools and Techniques – Proc. of the 6th SoMeT_07. IOS Press, 2007,  343-354.

PDF Layouni, A., Logrippo, L., Turner, K.J. Conflict Detection in Call Control Using First-Order Logic Model Checking. In: L. DuBousquet, Jean-Luc Richier (Eds): 9th International Conference on Feature Interactions in Software and Communication Systems, IOS Press, 2008 (Proc. of ICFI ’07, Grenoble, France, Sept. 2007), 77-92.

PDF Plesa, R., Logrippo, L. An Agent-Based Architecture for Contex-Aware Communications. Proc. of the 21st International Conference on Advanced Information Networking and Applications Workshops (PCAC-07 Niagara Falls, May 2007), IEEE Press, Vol.2, 133-138.

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4224094

PDF Xu, Y., Logrippo, L., Sincennes, J. Detecting Feature Interactions in CPL. Journal of Network and Computer Applications 30 (2) (2007), 775-799.

Keywords: Call Processing Language, consistency

PDF Crespo, R.G., Carvalho, M., Logrippo, L. Distributed Resolution of Feature Interactions for Internet Applications. Computer Networks 51 (2)  (2007)  382-397.

PDF Jiang, D., Liscano, R., Logrippo, L. Personalization of Internet Telephony Services for Presence with SIP and Extended CPL. Computer Communications 29 (18)  (Nov. 2006)  3766-3779.

PDF Gorse, N., Logrippo, L., Sincennes, J. Formal Detection of Feature Interactions with Logic Programming and LOTOS.  Journal on Software and System Modelling, 5 (2),  2006, 121-134.

Note 1: This paper was mistakenly published under the title: Detecting Feature Interactions in CPL. Note 2: Although the title of this paper is rather specific with its reference to Logic Programming and LOTOS, the principles presented in the first part are generic and have been used in other papers.

PDF de Castro Andrade, R. M., Logrippo, L. MoRaR: A Pattern Language for Mobility and Radio Resource Management. Appeared in reedited form in: D.Manolescu, J.Noble, M. Voelter - Pattern Languages of Program Design 5, Chapter 10. Addison-Wesley, 2006, 213-255

This paper is a rather extensive study of patterns occurring in mobile telephony systems software, almost unique in its kind.

PDF Amyot, D., Gray, T., Liscano, R., Logrippo, L., Sincennes, J. Interactive Conflict Detection and Resolution for Personalized Features. Journal of Communications and Networks, 7 (3), 2005, 353-366.

PDF Plesa, R., Logrippo, L. Enhanced Communications Servers through Context Integration. In T. Magedanz, A. Karmouch, S. Pierre, I. Venieris (Eds) - Mobility Aware Technologies and Applications – (MATA, Montreal Oct. 2005)  Short papers volume, 1-5.

PDF Mankai, M., Logrippo, L. Access Control Policies: Modeling and Validation. Proceedings of NOTERE 2005 (Gatineau, August) 85-91. Keywords: XACML, consistency checking, Alloy

This was one of the very first papers published on the subject of consistency checking for XACML policies but it doesn’t get cited. Oh, well …

PDF Hassan, W., Logrippo, L. Governance Policies for Privacy Access Control and their Interactions. In: S.Reiff-Marganiec, M.D. Ryan (Eds) Feature Interactions in Telecommunications and Software Systems. (Proc. of the VIII International Conference on Feature Interaction, ICFI 2005), Leicester, UK, IOS Press, 2005, 114-130.

PDF Amyot, L., Logrippo, L., Weiss, M. Generation of test purposes from Use Case Maps. Computer Networks 49 (5), 2005, 643-660.

PDF Dini, P., Clemm, A., Gray, T., Lin, F.J., Logrippo, L., Reiff-Marganiec, S. Policy-enabled Mechanisms for Feature Interactions: Reality, Expectations, Challenges. Computer Networks, 45 (5), 2004, 585 - 603.

 

 

Old papers that are still cited occasionally …

This is a repository where I put papers that are still being cited or for which I have received requests.

PDF Haj-Hussein, M., Logrippo, L., Sincennes, J.  Goal-oriented Execution of LOTOS Specifications.  In: M. Diaz and R. Groz (Eds.) Formal Description Techniques, V. North- Holland, 1993  (Proc. of the 4rth FORmal TEchniques International Conference, Perros- Guirec, France, 1992. Sponsored by IFIP WG 6.1) 311-327.

The concept of goal-oriented execution for LOTOS was discovered almost simultaneously by our group and a Dutch group (Ed Brinksma and Henk Eertink). It is applicable to CCS and CSP, as well as to other process-algebraic languages. However strangely, many years later, this extension has not been done, for what I know. It is a useful technique for state exploration in infinite-state systems. The PhD thesis of Mazen Haj-Hussein, that explained the concept in detail, is available in the web.

PDF Logrippo, L., Faci, M., and Haj-Hussein, M. An Introduction to LOTOS: Learning by Examples.  Computer Networks and ISDN Systems 23(5) (1992) 325-342. Errata in 25(1) (1992) 99-100.

PDF Guillemot, R., Haj-Hussein, M., Logrippo, L. Executing large LOTOS specifications. In: S. Aggarwal, K. Sabnani (Eds): Protocol Specification, Testing and Verification VIII (Proc. of the PSTV VIII Symposium). Elsevier-IFIP 1988, 399-410.

PDF Logrippo, L., Obaid, A., Briand, J.P., Fehri, M.C. An Interpreter for LOTOS, a Specification Language for Distributed Systems. Software-Practice and Experience Vol 18(4), 365-385 (April 1988).

Note: This paper was written in 1986. It presents the first LOTOS interpreter realized in the world. However the language discussed is different from the one that eventually became a standard.

PDF Vissers, C.A., Logrippo, L. The Importance of the Service Concept in the Design of Data Communications Protocols.

This paper appeared, in slightly different form, in M. Diaz (Ed.) Protocol Specification, Testing, and Verification, V. (Proc. of the IFIP WG 6.1 Fifth International Workshop on Protocol Specification, Testing and Verification) Elsevier-North-Holland, 1986, 3-17. 

PDF Logrippo, L., Stepien, B. Cluster Analysis for the Computer-Assisted Statistical Analysis of Melodies. Computers and the Humanities, Vol. 20, No. 1, 19-33 (Jan.-March 1986).

Keywords: Inuit music; Canadian Eskimo music; a-ja-jai songs; ajajai songs; statistical methods in ethno-musicology; transcriptions; music score.

A chapter by the same authors, including further documentation on this work, can be found in the following book: Pelinski, R. La musique des inuit du caribou. Presses de l’Université de Montréal, 1981. Because this book is out of print, I have put on line the following excerpts (PDF) which include: 1) transcriptions of the songs collected by Pelinski; 2) information on the CD realized by Pelinsky, which I believe can still be purchased.

PDF Pelinski, R., Logrippo, L., Hickey, P.J., Strong, E. A comparative computer analysis of Inuit songs. University of Ottawa, Computer Science Department, Technical Report TR80.08 (1980).

Keywords: Inuit music; Canadian Eskimo music; a-ja-jai songs; ajajai songs; statistical methods in ethno-musicology. See also previous title.

 

Open Distributed Processing (ODP) Tutorials

 

The Open Distributed Processing (ODP) concept was much ahead of its time and is still of current interest.

Although this is not often recognized, the Service Oriented Architecture (SOA) is based on ODP concepts.

Here are some tutorial papers and research reports that we wrote quite a while ago (1993-1996), with my student Kazi Farooqui.

I think that they are still useful.

PDF Farooqui, K., Logrippo, L., DeMeer, J. The ISO Reference Model for Open Distributed Processing:

an introduction.  Computer Networks and ISDN Systems 27 (1995) 1215-1229.

PDF Farooqui, K., Logrippo, L. Architecture for Open Distributed Software Systems. Technical Report, University of Ottawa, 1994. A shorter version of this tutorial was published in: Zomaya, A.Y.S. (Ed.). Parallel and Distributed Computing Handbook. McGraw-Hill, 1996, 303-329.

PDF Farooqui, K., Logrippo, L. Introduction to the ODP Computational Model. Technical Report, University of Ottawa, 1994.

PDF Farooqui, K., Logrippo, L. Introduction to the ODP Engineering Model. Technical Report, University of Ottawa, 1994.

 

Very old papers that haven’t been cited at all…

 

Some of my best papers are those that resulted from my PhD thesis, years of work… with the help of my supervisors, John Brzozowski and Ed Ashcroft, as well as the inspiration of my external examiner, Ray Miller. They have received extremely few citations, probably because the topic has not been fashionable. But I know that they are a lot better than some papers of mine that have been cited dozens of times. So much for citation counts.

 

PDF Logrippo, L. Renamings and Economy of Memory in Program Schemata. J. ACM 25(1), (Jan. 1978), 10-22

It is possible to change the name of the variables in programs in such a way that the results computed are unchanged. This equivalence-preserving transformation is at the basis of program optimizations such as efficient register allocation or efficient memory allocation, used in optimizing compilers. This paper justifies theoretically this transformation and explains how it works.

PDF Logrippo, L. Renamings, Maximal Parallelism, and Space-Time Tradeoff in Program Schemata. J. ACM 26(4), (Oct. 1979), 819 - 833 

This paper continues the work presented in the previous paper. It shows formally that by allocating more memory space, more variables, or more registers, the parallelism of a program can be increased. For example, the parallelism of a producer-consumer system can be increased by increasing the length of the queue between the producer and consumer. Pipelined processors with instruction look-ahead use the same principle. This equivalence-preserving transformation can be applied automatically in order to take advantage of computational resources as they become available, at execution time or at compilation time.

It is useful to review the results of this paper in the light of Amdahl’s famous law. One of several ways of interpreting this law states that the speedup that can be obtained in the execution of a program P by using increasingly larger numbers of processors in parallel computing arrangements is limited by the time needed for executing the sequential parts of P. Amdahl’s law assumes that the sequential and parallelizable parts of P are known in advance and cannot be changed (unless the program is redesigned). This paper shows that: 1) it may be possible to execute a program at different levels of parallelisms at different points of execution 2) it may possible to increase the parallelism of a program by spreading its working space in memory, essentially by using queue or queue-like mechanisms. This paper also characterizes the program structures where this can or cannot be done. Intuitively, these concepts are well recognized in Computer Science however here they are formally analyzed.

 

 

Some non-technical papers

HTML From Sumerian Codes to Computer Code: A Formal Logic Perspective on Legal Theory and Information Technology in a Historical Context.

This is a sort of evolving notebook that I keep on this subject. I make it available in case others are interested and I am always interested in readers’ opinions.

HTML Pierre Stanislas Bédard : a precursor of symbolic logic. October 2013

PDF Mario Bolognani, Luigi Logrippo. Le origini del software industriale in Italia (The origins of Software Industry in Italy, in Italian). Sviluppo e Organizzazione, Marzo-Aprile 2009, 52-63.

HTML My first two computers: Elea 9003 and Elea 6001. Winter 2007.

PDF Review of two books on early electronic music in Italy. MusicWorks. Winter 2006

PDF A capsule history of the Department of Computer Science, University of Ottawa

HTML Memorial: Otto G. Wadsted

 

 

Neither papers, nor technical, nor mine!

 

PDF L’église de Saint Joachim. Sculptures par François Baillargé et autres, photos par Licia Paolucci

 

PDF  (1 MB); JPEG (6 MB); TIFF (97 MB); IMAGO URBIS ROMAE ANNO MDCCCLXX – Pianta Map Carte Roma Rome 1870