Time filter

Source Type

We integrate input output and NAMEA tables for Spain and Italy in 1995, 2000 and 2005, in order to address the hot policy issue of sustainable consumption and production. A comparison of production and consumption perspectives may have relevant policy implications. We deal with the domestic technology assumption and primarily the aggregation bias that may result when calculating indirect emission using different sector aggregations in the analyses (e.g. 16, 30, 50). Extended Input Output Analysis provides analyses of the emissions embodied in domestic consumption and domestic production by considering the structure of intermediate inputs and environmental efficiency in each production sector. Our empirical findings show that different sectoral aggregation significantly biases the amount of emissions for the consumption perspective, though differently in the two countries. Italy surprisingly show consumption/production ratios around or lower than one, but in line with some major work at EU level. Our results thus suggest that special attention must be paid when interpreting the EE-IOA of country estimated amounts of embodied emissions, both in domestic final demand and those directly associated with the production sectors when the sectoral aggregation level has a low definition as considered in some recent similar studies. © 2011 Elsevier B.V.


Masi M.,Tiani Spirit GmbH | Masi M.,University of Florence | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Journal of Medical Systems | Year: 2012

The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them. © 2012 Springer Science+Business Media, LLC.


Margheri A.,University of Florence | Margheri A.,University of Pisa | Masi M.,Tiani Spirit GmbH | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

Policy-based software architectures are nowadays widely exploited to regulate different aspects of systems' behavior, such as access control, resource usage, and adaptation. Several languages and technologies have been proposed as, e.g., the standard XACML. However, developing real-world systems using such approaches is still a tricky task, being them complex and error-prone. To overcome such difficulties, we advocate the use of FACPL, a formal policy language inspired to but simpler than XACML. FACPL has an intuitive syntax, a mathematical semantics and easy-to-use software tools supporting policy development and enforcement. We illustrate potentialities and effectiveness of our approach through a case study from the Cloud computing domain. © 2014 Science and Engineering Faculty.


Loreti M.,University of Florence | Margheri A.,University of Florence | Margheri A.,University of Pisa | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

To tackle the complexity of autonomic computing systems it is crucial to provide methods supporting their systematic and principled development. Using the PSCEL language, autonomic systems can be described in terms of the constituent components and their reciprocal interactions. The computational behaviour of components is defined in a procedural style, by the programming constructs, while the adaptation logic is defined in a declarative style, by the policing constructs. In this paper we introduce a suite of practical software tools for programming and policing autonomic computing systems in PSCEL. Specifically, we integrate a Java-based runtime environment, supporting the execution of programming constructs, with the code corresponding to the policing ones. The integrated, semantic-driven framework also permits simulating and analysing PSCEL programs. Usability and potentialities of the approach are illustrated by means of a robot swarm case study. © Springer-Verlag Berlin Heidelberg 2014.


Margheri A.,University of Florence | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Proceedings - IEEE 10th International Conference on Ubiquitous Intelligence and Computing, UIC 2013 and IEEE 10th International Conference on Autonomic and Trusted Computing, ATC 2013 | Year: 2013

We introduce PSCEL, a new language for developing autonomic software components capable of adapting their behaviour to react to external stimuli and environment changes. The application logic generating the computational behaviour of systems components is defined in a procedural style, by the programming constructs, while the adaptation logic is defined in a declarative style, by the policing constructs. The interplay between these two kinds of constructs permits to dynamically produce and enforce adaptation actions. To show PSCEL practical applicability and effectiveness, we employ it in a Cloud Computing case study. © 2013 IEEE.


Masi M.,Tiani Spirit GmbH | Masi M.,University of Florence | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control model for the specification and enforcement of access control policies. To clarify all ambiguous and intricate aspects of XACML, we provide it with a more manageable alternative syntax and with a solid semantic ground. This lays the basis for developing tools and methodologies which allow software engineers to easily and precisely regulate access to resources using policies. To demonstrate feasibility and effectiveness of our approach, we provide a software tool, supporting the specification and evaluation of policies and access requests, whose implementation fully relies on our formal development. © 2012 Springer-Verlag.


Gjondrekaj E.,University of Florence | Loreti M.,University of Florence | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
Proceedings of the ACM Symposium on Applied Computing | Year: 2012

In recent years, it has been argued that systems and applications, in order to deal with their increasing complexity, should be able to adapt their behavior according to new requirements or environment conditions. In this paper, we present a preliminary investigation aiming at studying how coordination languages and formal methods can contribute to a better understanding, implementation and usage of the mechanisms and techniques for adaptation currently proposed in the literature. Our study relies on the formal coordination language Klaim as a common framework for modeling some adaptation techniques, namely the MAPE-K loop, aspect- and context-oriented programming. © 2012 ACM.


Margheri A.,University of Florence | Masi M.,Tiani Spirit GmbH | Pugliese R.,University of Florence | Tiezzi F.,IMT Advanced Studies Lucca
HEALTHINF 2013 - Proceedings of the International Conference on Health Informatics | Year: 2013

The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate. This exchange process is of course under the control of the patient, who decides who has the rights to access her personal healthcare data and who has not, by giving her personal privacy consent. Patients' privacy consent is regulated by local legislations, which can vary frequently from region to region. The technology implementing such privacy aspects must be highly adaptable, often resulting in complex security scenarios that cannot be easily managed by patients and software designers. To overcome such security problems, we advocate the use of a linguistic approach that relies on languages for expressing policies with solid mathematical foundations. Our approach bases on FACPL, a policy language we have intentionally designed by taking inspiration from OASIS XACML, the de-facto standard used in all projects covering secure EHRs transmission protected by patients' privacy consent. FACPL can express policies similar to those expressible by XACML but, differently from XACML, it has an intuitive syntax, a formal semantics and easy to use software tools supporting policy development and enforcement. In this paper, we present the potentialities of our approach and outline ongoing work.


Amoretti M.,University of Parma | Grazioli A.,University of Parma | Zanichelli F.,University of Parma | Senni V.,IMT Advanced Studies Lucca | Tiezzi F.,IMT Advanced Studies Lucca
Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014 | Year: 2014

Mobile cloud computing (MCC) is an emerging paradigm to transparently provide support for demanding tasks on resource-constrained mobile devices by relying on the integration with remote cloud services. Research in this field is tackling the multiple conceptual and technical challenges (e.g., how and when to offload) that are hindering the full realization of MCC. The NAM framework is a general tool to describe networks of hardware and software autonomic entities, providing or consuming services or resources, that can be applied to MCC scenarios. In this paper, we focus on NAM's features related to the key aspects of MCC, in particular those concerning code mobility capabilities and autonomic offloading strategies. Our first contribution is the definition of a restricted set of mobility actions supporting MCC. The second contribution is a formal semantics for those actions, which allows us to better understand the behavior of MCC systems and paves the way for the application of formal reasoning techniques. As an outcome, we also derive a more precise formalization of the core NAM features, which may contribute to further development of that framework and the related middleware. © 2014 IEEE.


Celestini A.,IMT Advanced Studies Lucca | De Nicola R.,IMT Advanced Studies Lucca | Tiezzi F.,IMT Advanced Studies Lucca
Proceedings of the ACM Symposium on Applied Computing | Year: 2013

Reputation systems are nowadays widely used to supp cision making in networked systems. Parties in such sy rate each other and use shared ratings to compute r tion scores that drive their interactions. The existe reputation systems with remarkable differences calls f mal approaches to their analysis. We present a verifi methodology for reputation systems that is based o use of the coordination language KLAIM and related ysis tools. First, we define a parametric KLAIM spe tion of a reputation system that can be instantiate different reputation models. Then, we consider stoc specification obtained by considering actions with ra (exponentially distributed) duration. The resulting ification enables quantitative analysis of properties considered system. Feasibility and effectiveness of ou posal is demonstrated by reporting on the analysis reputation models. Copyright 2013 ACM.

Loading IMT Advanced Studies Lucca collaborators
Loading IMT Advanced Studies Lucca collaborators