Michael Burrows

Google Publications

Previous Publications

  •   

    Moderately hard, memory-bound functions

    Martín Abadi, Michael M. Burrows, Mark Manasse, Ted Wobber

    ACM Transactions on Internet Technology, vol. 5 (2005), pp. 299-327

  •  

    Finding stale-value errors in concurrent programs

    Michael Burrows, K. Rustan M. Leino

    Concurrency and Computation: Practice and Experience, vol. 16 (2004), pp. 1161 - 1172

  •   

    Bankable Postage for Network Services

    Martin Aba, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber

    ASIAN (2003), pp. 72-90

  •  

    Bankable Postage for Network Services

    Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber

    ASIAN (2003), pp. 72-90

  •   

    Efficient and Flexible Value Sampling

    Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl

    ASPLOSProceedings of the 9th International Conference on Architectural Support Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), ACM, Cambridge, MA (2000), pp. 160-167

  •  

    Secure Network Objects

    Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber

    Secure Internet Programming (1999), pp. 395-412

  •  

    Secure Network Objects

    Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber

    IEEE Symposium on Security and Privacy (1996), pp. 211-221

  •  

    Authentication in the Taos Operating System

    Edward Wobber, Martín Abadi, Michael Burrows

    ACM Trans. Comput. Syst., vol. 12 (1994), pp. 3-32

  •  

    A Calculus for Access Control in Distributed Systems

    Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin

    ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 706-734

  •  

    Authentication in the Taos Operating System

    Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson

    SOSP (1993), pp. 256-269

  •  

    Authentification and Delegation with Smart-Cards

    Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson

    Sci. Comput. Program., vol. 21 (1993), pp. 93-113

  •  

    Authentication in Distributed Systems: Theory and Practice

    Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber

    ACM Trans. Comput. Syst., vol. 10 (1992), pp. 265-310

  •  

    A Calculus for Access Control in Distributed Systems

    Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin

    CRYPTO (1991), pp. 1-23

  •  

    Authentication and Delegation with Smart-cards

    Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson

    TACS (1991), pp. 326-345

  •  

    Authentication in Distributed Systems: Theory and Practice

    Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber

    SOSP (1991), pp. 165-182

  •  

    A Logic of Authentication

    Michael Burrows, Martín Abadi, Roger M. Needham

    ACM Trans. Comput. Syst., vol. 8 (1990), pp. 18-36

  •  

    Rejoinder to Nessett

    Michael Burrows, Martín Abadi, Roger M. Needham

    Operating Systems Review, vol. 24 (1990), pp. 39-40

  •  

    A Logic of Authentication

    Michael Burrows, Martín Abadi, Roger M. Needham

    SOSP (1989), pp. 1-13

  •  

    Authentication: A Practical Study in Belief and Action

    Michael Burrows, Martín Abadi, Roger M. Needham

    TARK (1988), pp. 325-342