Andy Gordon
List of publications from the DBLP Bibliography Server - FAQ
2010 | ||
---|---|---|
96 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: Modular verification of security protocol code by typing. POPL 2010: 445-456 | |
2009 | ||
95 | Johannes Borgström, Karthikeyan Bhargavan, Andrew D. Gordon: A compositional theory for STM Haskell. Haskell 2009: 69-80 | |
94 | Ioannis G. Baltopoulos, Andrew D. Gordon: Secure compilation of a multi-tier web language. TLDI 2009: 27-38 | |
93 | Andrew D. Gordon, Hans Hüttel, René Rydhof Hansen: Type Inference for Correspondence Types. Electr. Notes Theor. Comput. Sci. 242(3): 21-36 (2009) | |
2008 | ||
92 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy: Verified implementations of the information card federated identity-management protocol. ASIACCS 2008: 123-135 | |
91 | Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya: Service Combinators for Farming Virtual Machines. COORDINATION 2008: 33-49 | |
90 | Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis: Refinement Types for Secure Implementations. CSF 2008: 17-32 | |
89 | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon: Code-Carrying Authorization. ESORICS 2008: 563-579 | |
88 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: Verifying policy-based web services security. ACM Trans. Program. Lang. Syst. 30(6): (2008) | |
87 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse: Verified interoperable implementations of security protocols. ACM Trans. Program. Lang. Syst. 31(1): (2008) | |
86 | Johannes Borgström, Andrew D. Gordon, Andrew Phillips: A Chart Semantics for the Pi-Calculus. Electr. Notes Theor. Comput. Sci. 194(2): 3-29 (2008) | |
85 | Luca Aceto, Mario Bravetti, Wan Fokkink, Andrew D. Gordon: Guest Editors' Foreword. J. Log. Algebr. Program. 75(1): 1-2 (2008) | |
2007 | ||
84 | Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon: Design and Semantics of a Decentralized Authorization Language. CSF 2007: 3-15 | |
83 | Cédric Fournet, Andy Gordon, Sergio Maffeis: A Type Discipline for Authorization in Distributed Systems. CSF 2007: 31-48 | |
82 | Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya: Service Combinators for Farming Virtual Machines. TGC 2007: 22 | |
81 | Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon: Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2): (2007) | |
80 | Cédric Fournet, Andrew D. Gordon, Sergio Maffeis: A type discipline for authorization policies. ACM Trans. Program. Lang. Syst. 29(5): (2007) | |
79 | Luca Aceto, Mario Bravetti, Wan Fokkink, Andrew D. Gordon: Guest Editors' Foreword. J. Log. Algebr. Program. 70(2): 119-120 (2007) | |
78 | Luca Aceto, Mario Bravetti, Wan Fokkink, Andrew D. Gordon: Guest Editors' Foreword. J. Log. Algebr. Program. 72(1): 1-2 (2007) | |
2006 | ||
77 | Marianne Winslett, Andrew D. Gordon, David Sands: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
76 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse: Verified Interoperable Implementations of Security Protocols. CSFW 2006: 139-152 | |
75 | Andrew D. Gordon: Provable Implementations of Security Protocols. LICS 2006: 345-346 | |
74 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: Verified Reference Implementations of WS-Security Protocols. WS-FM 2006: 88-106 | |
73 | Luca Aceto, Andrew D. Gordon: Preface. Electr. Notes Theor. Comput. Sci. 162: 1-2 (2006) | |
72 | Andrew D. Gordon: V for Virtual. Electr. Notes Theor. Comput. Sci. 162: 177-181 (2006) | |
2005 | ||
71 | Andrew D. Gordon, Alan Jeffrey: Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. CONCUR 2005: 186-201 | |
70 | Cédric Fournet, Andrew D. Gordon, Sergio Maffeis: A Type Discipline for Authorization Policies. ESOP 2005: 141-156 | |
69 | Andrew D. Gordon: From Typed Process Calculi to Source-Based Security. SAS 2005: 2 | |
68 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Greg O'Shea: An advisor for web services security policies. SWS 2005: 1-9 | |
67 | Andrew D. Gordon, Riccardo Pucella: Validating a web service security abstraction by typing. Formal Asp. Comput. 17(3): 277-318 (2005) | |
66 | Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon: Secrecy and group creation. Inf. Comput. 196(2): 127-155 (2005) | |
65 | Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon: Deciding validity in a spatial logic for trees. J. Funct. Program. 15(4): 543-572 (2005) | |
64 | Andrew D. Gordon: Preface for the Special Issue: Foundations of Software Science and Computation Structures. Theor. Comput. Sci. 333(1-2): 1 (2005) | |
63 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: A semantics for web services authentication. Theor. Comput. Sci. 340(1): 102-153 (2005) | |
2004 | ||
62 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: Verifying policy-based security for web services. ACM Conference on Computer and Communications Security 2004: 268-277 | |
61 | Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon: From Stack Inspection to Access Control: A Security Analysis for Libraries. CSFW 2004: 61- | |
60 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon: A semantics for web services authentication. POPL 2004: 198-209 | |
59 | Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon: Secure sessions for web services. SWS 2004: 56-66 | |
58 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella: TulaFale: A Security Tool for Web Services CoRR abs/cs/0412044: (2004) | |
57 | Andrew D. Gordon, Riccardo Pucella: Validating a Web Service Security Abstraction by Typing CoRR abs/cs/0412045: (2004) | |
56 | Andrew D. Gordon, Alan Jeffrey: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security 12(3-4): 435-483 (2004) | |
2003 | ||
55 | Andrew D. Gordon: Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings Springer 2003 | |
54 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella: TulaFale: A Security Tool for Web Services. FMCO 2003: 197-222 | |
53 | Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon: Deciding validity in a spatial logic for trees. TLDI 2003: 62-73 | |
52 | Cédric Fournet, Andrew D. Gordon: Stack inspection: Theory and variants. ACM Trans. Program. Lang. Syst. 25(3): 360-399 (2003) | |
51 | Andrew D. Gordon, Alan Jeffrey: Authenticity by Typing for Security Protocols. Journal of Computer Security 11(4): 451-520 (2003) | |
50 | Andrew D. Gordon, Luca Cardelli: Equational Properties Of Mobile Ambients. Mathematical Structures in Computer Science 13(3): 371-408 (2003) | |
49 | Andrew D. Gordon, Alan Jeffrey: Typing correspondence assertions for communication protocols. Theor. Comput. Sci. 300(1-3): 379-409 (2003) | |
48 | Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot: Model checking mobile ambients. Theor. Comput. Sci. 308(1-3): 277-331 (2003) | |
2002 | ||
47 | Andrew D. Gordon: Types for Cryptographic Protocols. CONCUR 2002: 99-100 | |
46 | Andrew D. Gordon, Alan Jeffrey: Types and Effects for Asymmetric Cryptographic Protocols. CSFW 2002: 77-91 | |
45 | Witold Charatonik, Andrew D. Gordon, Jean-Marc Talbot: Finite-Control Mobile Ambients. ESOP 2002: 295-313 | |
44 | Andy Gordon: Authenticity Types for Cryptographic Protocols. FASec 2002: 3 | |
43 | Andrew D. Gordon: XML Web Services: The Global Computer? IFIP TCS 2002: 355 | |
42 | Andrew D. Gordon, Alan Jeffrey: Typing One-to-One and One-to-Many Correspondences in Security Protocols. ISSS 2002: 263-282 | |
41 | Don Syme, Andrew D. Gordon: Automating Type Soundness Proofs via Decision Procedures and Guided Reductions. LPAR 2002: 418-434 | |
40 | Cédric Fournet, Andrew D. Gordon: Stack inspection: theory and variants. POPL 2002: 307-318 | |
39 | Andrew D. Gordon, Riccardo Pucella: Validating a Web service security abstraction by typing. XML Security 2002: 18-29 | |
38 | Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon: Types for the Ambient Calculus. Inf. Comput. 177(2): 160-194 (2002) | |
37 | Silvano Dal-Zilio, Andrew D. Gordon: Region analysis and a pi-calculus with groups. J. Funct. Program. 12(3): 229-292 (2002) | |
2001 | ||
36 | Andrew D. Gordon, Alan Jeffrey: Authenticity by Typing for Security Protocols. CSFW 2001: 145-159 | |
35 | Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot: The Complexity of Model Checking Mobile Ambients. FoSSaCS 2001: 152-167 | |
34 | Andrew D. Gordon, Don Syme: Typing a multi-language intermediate code. POPL 2001: 248-260 | |
33 | Andrew D. Gordon: Types for Cyphers: Thwarting Mischief and Malice with Type Theory. PPDP 2001: 136 | |
32 | Andrew D. Gordon, Alan Jeffrey: A Type and Effect Analysis of Security Protocols. SAS 2001: 432-432 | |
31 | Luca Cardelli, Andrew D. Gordon: Logical Properties of Name Restriction. TLCA 2001: 46-60 | |
30 | Andrew D. Gordon, Alan Jeffrey: Typing Correspondence Assertions for Communication Protocols. Electr. Notes Theor. Comput. Sci. 45: (2001) | |
2000 | ||
29 | Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon: Secrecy and Group Creation. CONCUR 2000: 365-379 | |
28 | Andrew D. Gordon: Notes on Nominal Calculi for Security and Mobility. FOSAD 2000: 262-330 | |
27 | Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon: Ambient Groups and Mobility Types. IFIP TCS 2000: 333-347 | |
26 | Silvano Dal-Zilio, Andrew D. Gordon: Region Analysis and a pi-Calculus wiht Groups. MFCS 2000: 1-20 | |
25 | Luca Cardelli, Andrew D. Gordon: Anytime, Anywhere: Modal Logics for Mobile Ambients. POPL 2000: 365-377 | |
24 | Luca Cardelli, Andy Gordon, Giorgio Ghelli: Secrecy, Group Creation. Electr. Notes Theor. Comput. Sci. 40: (2000) | |
23 | Luca Cardelli, Andrew D. Gordon: Mobile ambients. Theor. Comput. Sci. 240(1): 177-213 (2000) | |
1999 | ||
22 | Andrew D. Gordon, Luca Cardelli: Equational Properties of Mobile Ambients. FoSSaCS 1999: 212-226 | |
21 | Luca Cardelli, Andrew D. Gordon, Giorgio Ghelli: Mobility Types for Mobile Ambients. ICALP 1999: 230-239 | |
20 | Luca Cardelli, Andrew D. Gordon: Types for Mobile Ambients. POPL 1999: 79-92 | |
19 | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) | |
18 | Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen: Compilation and Equivalence of Imperative Objects. J. Funct. Program. 9(4): 373-426 (1999) | |
17 | Roy L. Crole, Andrew D. Gordon: Relating operational and denotational semantics for input/output effects. Mathematical Structures in Computer Science 9(2): 125-158 (1999) | |
16 | Andrew D. Gordon: Bisimilarity as a Theory of Functional Programming. Theor. Comput. Sci. 228(1-2): 5-47 (1999) | |
1998 | ||
15 | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 | |
14 | Luca Cardelli, Andrew D. Gordon: Mobile Ambients. FoSSaCS 1998: 140-155 | |
13 | Andrew D. Gordon, Paul D. Hankin: A Concurrent Object Calculus: Reduction and Typing. Electr. Notes Theor. Comput. Sci. 16(3): (1998) | |
12 | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) | |
1997 | ||
11 | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. ACM Conference on Computer and Communications Security 1997: 36-47 | |
10 | Martín Abadi, Andrew D. Gordon: Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 | |
9 | Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen: Compilation and Equivalence of Imperative Objects. FSTTCS 1997: 74-87 | |
8 | Luca Cardelli, Andrew D. Gordon: Mobile Ambients. Electr. Notes Theor. Comput. Sci. 10: (1997) | |
1996 | ||
7 | Andrew D. Gordon, Gareth D. Rees: Bisimilarity for a First-Order Calculus of Objects with Subtyping. POPL 1996: 386-395 | |
6 | Andrew D. Gordon, Thomas F. Melham: Five Axioms of Alpha-Conversion. TPHOLs 1996: 173-190 | |
1995 | ||
5 | Andrew D. Gordon: Bisimilarity as a theory of functional programming. Electr. Notes Theor. Comput. Sci. 1: (1995) | |
1994 | ||
4 | Roy L. Crole, Andrew D. Gordon: A Sound Metalogical Semantics for Input/Output Effects. CSL 1994: 339-353 | |
1993 | ||
3 | Andrew D. Gordon: An Operational Semantics for I/O in a Lazy Functional Language. FPCA 1993: 136-145 | |
2 | Andrew D. Gordon: A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion. HUG 1993: 413-425 | |
1992 | ||
1 | Andrew D. Gordon: The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic. ICCD 1992: 531-534 |