2009 | ||
---|---|---|
190 | Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh: Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49 | |
189 | Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard: Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77 | |
188 | Martín Abadi, Tim Harris: Perspectives on Transactional Memory. CONCUR 2009: 1-14 | |
187 | Martín Abadi: Logic in Access Control (Tutorial Notes). FOSAD 2009: 145-165 | |
186 | Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi: Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 | |
185 | Martín Abadi, Gordon D. Plotkin: A model of cooperative threads. POPL 2009: 29-40 | |
184 | Martín Abadi, Tim Harris, Mojtaba Mehrara: Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPOPP 2009: 185-196 | |
183 | Yinglian Xie, Fang Yu, Martín Abadi: De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 | |
2008 | ||
182 | Martín Abadi: The good, the bad, and the provable. ACM Conference on Computer and Communications Security 2008: 1 | |
181 | Martín Abadi, Tim Harris, Katherine F. Moore: A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20 | |
180 | Martín Abadi: Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526 | |
179 | Martín Abadi: Variations in Access Control Logic. DEON 2008: 96-109 | |
178 | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon: Code-Carrying Authorization. ESORICS 2008: 563-579 | |
177 | Deepak Garg, Martín Abadi: A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 | |
176 | Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard: Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74 | |
175 | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): (2008) | |
174 | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1): 3-51 (2008) | |
2007 | ||
173 | Nathan Whitehead, Jordan Johnson, Martín Abadi: Policies and Proofs for Code Auditing. ATVA 2007: 1-14 | |
172 | Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon: Authorizing applications in singularity. EuroSys 2007: 355-368 | |
171 | Martín Abadi: Security Protocols: Principles and Calculi. FOSAD 2007: 1-23 | |
170 | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): (2007) | |
169 | Martín Abadi, Jens Palsberg: Editorial. ACM Trans. Program. Lang. Syst. 29(3): (2007) | |
168 | Martín Abadi: Access Control in a Core Calculus of Dependency. Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007) | |
167 | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3): 395 (2007) | |
2006 | ||
166 | Martín Abadi, Ricardo Corin, Cédric Fournet: Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 | |
165 | Mihai Budiu, Úlfar Erlingsson, Martín Abadi: Architectural support for software-based protection. ASID 2006: 42-51 | |
164 | Avik Chaudhuri, Martín Abadi: Secrecy by Typing and File-Access Control. CSFW 2006: 112-123 | |
163 | Avik Chaudhuri, Martín Abadi: Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114 | |
162 | Martín Abadi, Mathieu Baudet, Bogdan Warinschi: Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412 | |
161 | Martín Abadi: Access control in a core calculus of dependency. ICFP 2006: 263-273 | |
160 | Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula: XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 | |
159 | Martín Abadi, Cormac Flanagan, Stephen N. Freund: Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) | |
158 | Martín Abadi, Véronique Cortier: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006) | |
2005 | ||
157 | Jens Palsberg, Martín Abadi: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005 ACM 2005 | |
156 | Martín Abadi, Luca de Alfaro: CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings Springer 2005 | |
155 | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: Control-flow integrity. ACM Conference on Computer and Communications Security 2005: 340-353 | |
154 | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76 | |
153 | Avik Chaudhuri, Martín Abadi: Formal security analysis of basic network-attached storage. FMSE 2005: 43-52 | |
152 | Martín Abadi, Bogdan Warinschi: Password-Based Encryption Analyzed. ICALP 2005: 664-676 | |
151 | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: A Theory of Secure Control Flow. ICFEM 2005: 111-124 | |
150 | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 | |
149 | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117 | |
148 | Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber: Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) | |
147 | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005) | |
146 | Martín Abadi, Greg Morrisett, Andrei Sabelfeld: "Language-Based Security". J. Funct. Program. 15(2): 129 (2005) | |
145 | Martín Abadi, Bruno Blanchet: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005) | |
2004 | ||
144 | Nathan Whitehead, Martín Abadi, George C. Necula: By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250 | |
143 | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 | |
142 | Martín Abadi, Ted Wobber: A Logical Account of NGSCB. FORTE 2004: 1-12 | |
141 | Martín Abadi, Georges Gonthier, Benjamin Werner: Choice in Dynamic Linking. FoSSaCS 2004: 12-26 | |
140 | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58 | |
139 | Nathan Whitehead, Martín Abadi: BCiC: A System for Code Authentication and Verification. LPAR 2004: 110-124 | |
138 | Katia Hayati, Martín Abadi: Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 | |
137 | Martín Abadi: Trusted Computing, Trusted Third Parties, and Verified Communications. SEC 2004: 291-308 | |
136 | Martín Abadi, Cédric Fournet: Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) | |
2003 | ||
135 | Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber: Bankable Postage for Network Services. ASIAN 2003: 72-90 | |
134 | Martín Abadi: Built-in Object Security. ECOOP 2003: 1 | |
133 | Martín Abadi: Logic in Access Control. LICS 2003: 228- | |
132 | Martín Abadi, Cédric Fournet: Access Control Based on Execution History. NDSS 2003 | |
131 | Martín Abadi, Michael Burrows, Ted Wobber: Moderately Hard, Memory-Bound Functions. NDSS 2003 | |
130 | Martín Abadi, Bruno Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335 | |
129 | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. Verification: Theory and Practice 2003: 11-41 | |
128 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003) | |
127 | Martín Abadi, Bruno Blanchet: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298): 387-415 (2003) | |
2002 | ||
126 | Cédric Fournet, Martín Abadi: Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338 | |
125 | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44 | |
124 | Martín Abadi: Private Authentication. Privacy Enhancing Technologies 2002: 27-40 | |
123 | Martín Abadi, Neal Glew: Certified email with a light on-line trusted third party: design and implementation. WWW 2002: 387-395 | |
122 | Martín Abadi, Leonid Libkin, Frank Pfenning: Editorial. ACM Trans. Comput. Log. 3(3): 335-335 (2002) | |
121 | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002) | |
120 | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 15(2): 103-127 (2002) | |
2001 | ||
119 | Marcelo P. Fiore, Martín Abadi: Computing Symbolic Models for Verifying Cryptographic Protocols. CSFW 2001: 160-173 | |
118 | Martín Abadi, Bruno Blanchet: Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41 | |
117 | Martín Abadi: Leslie Lamport's properties and actions. PODC 2001: 15 | |
116 | Martín Abadi, Cédric Fournet: Mobile values, new names, and secure communication. POPL 2001: 104-115 | |
115 | Martín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 | |
2000 | ||
114 | Martín Abadi: Taming the Adversary. CRYPTO 2000: 353-358 | |
113 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 | |
112 | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22 | |
111 | Martín Abadi, Cédric Fournet, Georges Gonthier: Authentication Primitives and Their Compilation. POPL 2000: 302-315 | |
110 | Martín Abadi: top-top-closed relations and admissibility. Mathematical Structures in Computer Science 10(3): 313-320 (2000) | |
1999 | ||
109 | Cormac Flanagan, Martín Abadi: Object Types against Races. CONCUR 1999: 288-303 | |
108 | Cormac Flanagan, Martín Abadi: Types for Safe Locking. ESOP 1999: 91-108 | |
107 | Martín Abadi, Cédric Fournet, Georges Gonthier: A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141 | |
106 | Martín Abadi: Security Protocols and Specifications. FoSSaCS 1999: 1-13 | |
105 | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Communications Processing for Distributed Languages. IEEE Symposium on Security and Privacy 1999: 74-88 | |
104 | Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160 | |
103 | Martín Abadi: Protection in Programming-Language Translations. Secure Internet Programming 1999: 19-34 | |
102 | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. Secure Internet Programming 1999: 395-412 | |
101 | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) | |
100 | Martín Abadi: Secrecy in Programming-Language Semantics. Electr. Notes Theor. Comput. Sci. 20: (1999) | |
99 | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) | |
1998 | ||
98 | Martín Abadi: Two Facets of Authentication. CSFW 1998: 27-32 | |
97 | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 | |
96 | Martín Abadi: Protection in Programming-Language Translations: Mobile Object Systems (Abstract). ECOOP Workshops 1998: 291 | |
95 | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 | |
94 | Martín Abadi: Protection in Programming-Language Translations. ICALP 1998: 868-883 | |
93 | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. LICS 1998: 105-116 | |
92 | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. POPL 1998: 149-160 | |
91 | Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber: Secure Web Tunneling. Computer Networks 30(1-7): 531-539 (1998) | |
90 | Martín Abadi: On SDSI's Linked Local Name Spaces. Journal of Computer Security 6(1-2): 3-22 (1998) | |
89 | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) | |
1997 | ||
88 | Martín Abadi, Takayasu Ito: Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings Springer 1997 | |
87 | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. ACM Conference on Computer and Communications Security 1997: 36-47 | |
86 | Martín Abadi, Andrew D. Gordon: Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 | |
85 | Martín Abadi: On SDSI's Linked Local Name Spaces. CSFW 1997: 98-108 | |
84 | Martín Abadi: Secrecy by Typing inSecurity Protocols. TACS 1997: 611-638 | |
83 | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. TAPSOFT 1997: 682-696 | |
82 | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Electr. Notes Theor. Comput. Sci. 10: (1997) | |
81 | Martín Abadi: Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Trans. Software Eng. 23(3): 185-186 (1997) | |
1996 | ||
80 | Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy: Analysis and Caching of Dependencies. ICFP 1996: 83-91 | |
79 | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221 | |
78 | Martín Abadi, Marcelo P. Fiore: Syntactic Considerations on Recursive Types. LICS 1996: 242-252 | |
77 | Martín Abadi, Stephan Merz: On TLA as a logic. NATO ASI DPD 1996: 235-271 | |
76 | Martín Abadi, Luca Cardelli, Ramesh Viswanathan: An Interpretation of Objects and Object Types. POPL 1996: 396-409 | |
75 | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) | |
74 | Martín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996) | |
73 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Untyped and First-Order Systems. Inf. Comput. 125(2): 78-102 (1996) | |
1995 | ||
72 | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ECOOP 1995: 145-167 | |
71 | Martín Abadi, Stephan Merz: An Abstract Account of Composition. MFCS 1995: 499-508 | |
70 | Martín Abadi, Luca Cardelli: An Imperative Object Calculus. TAPSOFT 1995: 471-485 | |
69 | Roberto Bellucci, Martín Abadi, Pierre-Louis Curien: A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. TLCA 1995: 32-46 | |
68 | Martín Abadi, Leslie Lamport: Conjoining Specifications. ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) | |
67 | Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy: Dynamic Typing in Polymorphic Languages. J. Funct. Program. 5(1): 111-130 (1995) | |
66 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Second-Order Systems. Sci. Comput. Program. 25(2-3): 81-116 (1995) | |
65 | John Lamping, Martín Abadi: Methods as Assertions. TAPOS 1(1): 5-18 (1995) | |
64 | Martín Abadi, Luca Cardelli: An Imperative Object Calculus (Invited Paper). TAPOS 1(3): 151-166 (1995) | |
1994 | ||
63 | John Lamping, Martín Abadi: Methods as Assertions. ECOOP 1994: 60-80 | |
62 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Scond-Order Systems. ESOP 1994: 1-25 | |
61 | Martín Abadi, Leslie Lamport, Stephan Merz: A TLA Solution to the RPC-Memory Specification Problem. Formal Systems Specification 1994: 21-66 | |
60 | Gordon D. Plotkin, Martín Abadi, Luca Cardelli: Subtyping and Parametricity LICS 1994: 310-319 | |
59 | Martín Abadi, Luca Cardelli: A Semantics of Object Types LICS 1994: 332-341 | |
58 | Martín Abadi, Leslie Lamport: Open Systems in TLA. PODC 1994: 81-90 | |
57 | Martín Abadi, Leslie Lamport: Decomposing Specifications of Concurrent Systems. PROCOMET 1994: 327-340 | |
56 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Untyped and First-Order Systems. TACS 1994: 296-320 | |
55 | Edward Wobber, Martín Abadi, Michael Burrows: Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) | |
54 | Martín Abadi, Leslie Lamport: An Old-Fashined Recipe for Real-Time. ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) | |
53 | Martín Abadi: A Semantics for Static Type Inference in a Nondeterministic Language Inf. Comput. 109(1/2): 300-306 (1994) | |
52 | Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability Inf. Comput. 112(1): 1-36 (1994) | |
51 | Martín Abadi: Baby Modula-3 and a Theory of Objects. J. Funct. Program. 4(2): 249-283 (1994) | |
1993 | ||
50 | Luca Cardelli, Florian Matthes, Martín Abadi: Extensible Grammars for Language Specialization. DBPL 1993: 11-31 | |
49 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. POPL 1993: 157-170 | |
48 | Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269 | |
47 | Gordon D. Plotkin, Martín Abadi: A Logic for Parametric Polymorphism. TLCA 1993: 361-375 | |
46 | Martín Abadi, Leslie Lamport: Composing Specifications. ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) | |
45 | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) | |
44 | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) | |
43 | Martín Abadi, Gordon D. Plotkin: A Logical View of Composition. Theor. Comput. Sci. 114(1): 3-30 (1993) | |
42 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. Theor. Comput. Sci. 121(1&2): 9-58 (1993) | |
1992 | ||
41 | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: Linear Logic Without Boxes LICS 1992: 223-234 | |
40 | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: The Geometry of Optimal Lambda Reduction. POPL 1992: 15-26 | |
39 |