1. Bravetti, M., Gorrieri, R., and Lucchi, R. (2003). A formal approach for checking security properties in SecSpaces. In 1st International Workshop on on Security Issues in Coordination Models, Languages and Systems, volume 85.3 of ENTCS.
2. Busi, N., Gorrieri, R., Lucchi, R., and Zavattaro, G. (2002). Secspaces: a data-driven coordination model for environments open to untrusted entities. In 1st International Workshop on Foundations of Coordination Languages and Software Architectures, volume 68.3 of ENTCS.
3. Busi, N., Manfredini, C., Montresor, A., and Zavattaro, G. (2003). PeerSpaces: Data-driven Coordination in Peer-to-Peer Networks. In Proc. of ACM Symposium on Applied Computing (SAC'03), pages 380–386. ACM Press.
4. Computing Associates, S. (1995). Linda: User's guide and reference manual. Scientific Computing Associates.
5. De Nicola, R., Ferrari, G., and Pugliese, R. (1998). KLAIM: A Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315–330. Special Issue: Mobility and Network Aware Computing.