Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Svetlana Jakšić is active.

Publication


Featured researches published by Svetlana Jakšić.


workshop on functional and constraint logic programming | 2010

Types for role-based access control of dynamic web data

Mariangiola Dezani-Ciancaglini; Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic

We introduce a role-based access control calculus for modelling dynamic web data and a corresponding type system. It is an extension of the Xdp calculus proposed by Gardner and Maffeis. In our framework, a network is a parallel composition of locations, where each location contains processes with roles and a data tree whose edges are associated with roles. Processes can communicate, migrate from a location to another, use the data, change the data and the roles in the local tree. In this way, we obtain a model that controls process access to data. We propose a type system which ensures that a specified network policy is respected during computations. Finally, we show that our calculus obeys the following security properties: (1) all data trees and processes with roles in a location agree with the location policy; (2) a process can migrate only to a location with whose policy it agrees; (3) a process with roles can read and modify only data which are accessible to it; (4) a process with roles can enable and disable roles in agreement with the location policy.


PLACES | 2015

Precise subtyping for synchronous multiparty sessions

Mariangiola Dezani-Ciancaglini; Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Nobuko Yoshida

The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with respect to type safety, i.e. the safe replacement of a term of a smaller type when a term of a bigger type is expected. The latter preciseness is based on the denotation of a type which is a mathematical object that describes the meaning of the type in accordance with the denotations of other expressions from the language. The result of this paper is the operational and denotational preciseness of the subtyping for a synchronous multiparty session calculus. The novelty of this paper is the introduction of characteristic global types to prove the operational completeness.


Formal Aspects of Computing | 2016

Dynamic role authorization in multiparty conversations

Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Jorge A. Pérez; Hugo Torres Vieira

Protocols in distributed settings usually rely on the interaction of several parties and often identify the roles involved in communications. Roles may have a behavioral interpretation, as they do not necessarily correspond to sites or physical devices. Notions of role authorization thus become necessary to consider settings in which, e.g., different sites may be authorized to act on behalf of a single role, or in which one site may be authorized to act on behalf of different roles. This flexibility must be equipped with ways of controlling the roles that the different parties are authorized to represent, including the challenging case in which role authorizations are determined only at runtime. We present a typed framework for the analysis of multiparty interaction with dynamic role authorization and delegation. Building on previous work on conversation types with role assignment, our formal model is based on an extension of the


Science of Computer Programming | 2014

Exception handling for copyless messaging

Svetlana Jakšić; Luca Padovani


BEAT 2014, September 1st 2014, Rome, Italy | 2014

Dynamic Role Authorization in Multiparty Conversations

Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Jorge A. Pérez; Hugo Torres Vieira

{\pi}


Mathematical Structures in Computer Science | 2017

Linked data privacy

Svetlana Jakšić; Jovanka Pantovic; Silvia Ghilezan


formal methods | 2016

Denotational and Operational Preciseness of Subtyping: A Roadmap

Mariangiola Dezani-Ciancaglini; Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Nobuko Yoshida

π-calculus in which the basic resources are pairs channel-role, which denote the access right of interacting along a given channel representing the given role. To specify dynamic authorization control, our process model includes (1) a novel scoping construct for authorization domains, and (2) communication primitives for authorizations, which allow to pass around authorizations to act on a given channel. An authorization error then corresponds to an action involving a channel and a role not enclosed by an appropriate authorization scope. We introduce a typing discipline that ensures that processes never reduce to authorization errors, including when parties dynamically acquire authorizations.


PLACES | 2015

A Typed Model for Dynamic Authorizations

Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Jorge A. Pérez; Hugo Torres Vieira

Copyless messaging is a communication paradigm in which only pointers to messages are exchanged between sender and receiver processes. Because of its intrinsically low overhead, copyless messaging is suitable for the efficient implementation of communication-intensive software systems where processes have access to a shared address space. Unfortunately, the very nature of the paradigm fosters the proliferation of programming errors due to the explicit use of pointers and to the sharing of data. In this paper we study a type discipline for copyless messaging that, together with some minimal support from the runtime system, is able to guarantee the absence of communication errors, memory faults, and memory leaks in the presence of exceptions. To formalize the semantics of processes we draw inspiration from software transactional memories: in our case a transaction is a process that is meant to accomplish some exchange of messages and that should either be executed completely, or should have no observable effect if aborted by an exception.


international conference on concurrency theory | 2010

Efficient bisimilarities from second-order reaction semantics for π-calculus

Pietro Di Gianantonio; Svetlana Jakšić; Marina Lenisa

Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at runtime. Building on previous work on conversation types with flexible role assignment, here we report initial results on a typed framework for the analysis of multiparty communications with dynamic role authorization and delegation. In the underlying process model, communication prefixes are annotated with role authorizations and authorizations can be passed around. We extend the conversation type system so as to statically distinguish processes that never incur in authorization errors. The proposed static discipline guarantees that processes are always authorized to communicate on behalf of an intended role, also covering the case in which authorizations are dynamically passed around in messages.Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at runtime. Building on previous work on conversation types with flexible role assignment, here we report initial results on a typed framework for the analysis of multiparty communications with dynamic role authorization and delegation. In the underlying process model, communication prefixes are annotated with role authorizations and authorizations can be passed around. We extend the conversation type system so as to statically distinguish processes that never incur in authorization errors. The proposed static discipline guarantees that processes are always authorized to communicate on behalf of an intended role, also covering the case in which authorizations are dynamically passed around in messages.


formal methods | 2016

Denotational and Operational Preciseness of Subtyping: A Roadmap - Dedicated to Frank de Boer on the Occasion of His 60th Birthday.

Mariangiola Dezani-Ciancaglini; Silvia Ghilezan; Svetlana Jakšić; Jovanka Pantovic; Nobuko Yoshida

Web of Linked Data introduces common format and principles for publishing and linking data on the Web. Such a network of linked data is publicly available and easily consumable. This paper introduces a calculus for modelling networks of linked data with encoded privacy preferences. In that calculus, a network is a parallel composition of users, where each user is named and consists of data, representing the users profile, and a process. Data is a parallel composition of triples with names (resources) as components. Associated with each name and each triple of names are their privacy protection policies, that are represented by queries. A data triple is accessible to a user if the users data satisfies the query assigned to that triple. The main contribution of this model lies in the type system which together with the introduced query order ensures that static type-checking prevents privacy violations. We say that a network is well behaved if — access to a triple is more restrictive than access to its components and less restrictive than access to the user name it is enclosed with, — each user can completely access their own profile, — each user can update or partly delete profiles that they own (can access the whole profiles), and — each user can update the privacy preference policy of data of another profile that they own or write data to another profile only if the newly obtained profile stays fully accessible to their owner. We prove that any well-typed network is well behaved.

Collaboration


Dive into the Svetlana Jakšić's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hugo Torres Vieira

Universidade Nova de Lisboa

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge