Martín Abadi

Co-Authors
-
Ananth Raghunathan
-
Andrei Z. Broder
-
Andrew Harp
-
Andy Davis
-
Ankur Taly
-
Arnar Birgisson
-
Arvind Neelakantan
-
Aurko Roy
-
Benoit Steiner
-
Christopher Olah
-
Craig Citro
-
Derek G. Murray
-
Eugene Brevdo
-
Fernanda Viegas
-
Frank Dabek
-
Geoffrey Irving
-
Greg Corrado
-
H. Brendan McMahan
-
Ian Goodfellow
-
Ilya Mironov
-
Jeffrey Dean
-
Jianmin Chen
-
Jonathon Shlens
-
Josh Levenberg
-
Kunal Talwar
-
Li Zhang
-
Lukasz Kaiser
-
Manjunath Kudlur
-
Martin Wattenberg
-
Martin Wicke
-
Matthieu Devin
-
Michael Burrows
-
Michael Isard
-
Michael Vrable
-
Mike Schuster
-
Nevin Heintze
-
Oriol Vinyals
-
Paul A. Tucker
-
Paul Barham
-
Pete Warden
-
Quoc V. Le
-
Rajat Monga
-
Rebecca Isaacs
-
Ross McIlroy
-
Sanjay Ghemawat
-
Sherry Moore
-
Vijay Vasudevan
-
Vincent Vanhoucke
-
Xiaoqiang Zheng
-
Yangqing Jia
-
Yuan Yu
-
Zhifeng Chen
-
Úlfar Erlingsson
Google Publications
-
A Computational Model for TensorFlow (An Introduction)
Martin Abadi, Michael Isard, Derek G. Murray
1st ACM SIGPLAN Workshop on Machine Learning and Programming Languages (MAPL 2017) (2017)
-
Tom Brown, Dandelion Mane, Aurko Roy, Martin Abadi, Justin Gilmer
NIPS Workshop (2017)
-
Learning a Natural Language Interface with Neural Programmer
Arvind Neelakantan, Quoc V. Le, Martin Abadi, Andrew McCallum, Dario Amodei
ICLR (2017)
-
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches
Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Nicolas Papernot, Ilya Mironov, Kunal Talwar, Li Zhang
IEEE 30th Computer Security Foundations Symposium (CSF), IEEE (2017), pp. 1-6
-
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data
Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar
Proceedings of the International Conference on Learning Representations (2017)
-
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
Martin Abadi, Bruno Blanchet, Cedric Fournet
JACM (2017) (to appear)
-
Deep Learning with Differential Privacy
Martin Abadi, Andy Chu, Ian Goodfellow, Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang
23rd ACM Conference on Computer and Communications Security (ACM CCS) (2016), pp. 308-318
-
Incremental, iterative data processing with timely dataflow
Derek G. Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martin Abadi
Communications of the ACM, vol. 59 (2016), pp. 75-83
-
Learning to Protect Communications with Adversarial Neural Cryptography
Martín Abadi, David G. Andersen
arXiv (2016)
-
TensorFlow: A system for large-scale machine learning
Martin Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), USENIX Association (2016), pp. 265-283
-
TensorFlow: Learning Functions at Scale
ICFP (2016)
-
Distributed Authorization With Distributed Grammars
Martin Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly
Programming Languages with Applications to Biology and Security, Springer International Publishing Switzerland, Gewerbestrasse 11 CH-6330 Cham (ZG) Switzerland (2015), pp. 10-26
-
TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems
Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, Xiaoqiang Zheng
tensorflow.org (2015)
-
Timely Dataflow: A Model
FORTE (2015), pp. 131-145
Previous Publications
-
Foundations of Differential Dataflow
Martín Abadi, Frank McSherry, Gordon D. Plotkin
FoSSaCS (2015), pp. 71-83
-
On the Flow of Data, Information, and Time
POST (2015), pp. 73-92
-
The Prophecy of Undo
FASE (2015), pp. 347-361
-
Timely Rollback: Specification and Verification
NFM (2015), pp. 19-34
-
Understanding Typescript
Gavin M. Bierman, Martín Abadi, Mads Torgersen
ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, pp. 257-281
-
Web PKI: Closing the Gap between Guidelines and Practices
Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie, Microsoft Research
NDSS (2014)
-
Early security classification of skype users via machine learning
Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi
AISec (2013), pp. 35-44
-
Formal Analysis of a Distributed Algorithm for Tracking Progress
Martín Abadi, Frank McSherry, Derek Gordon Murray, Thomas L. Rodeheffer
FMOODS/FORTE (2013), pp. 5-19
-
Global Authentication in an Untrustworthy World
Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie
HotOS (2013)
-
Layout Randomization and Nondeterminism
Martín Abadi, Jérémy Planul, Gordon D. Plotkin
Electr. Notes Theor. Comput. Sci., vol. 298 (2013), pp. 29-50
-
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
CRYPTO (1) (2013), pp. 374-391
-
Naiad: a timely dataflow system
Derek Gordon Murray, Frank McSherry, Rebecca Isaacs, Michael Isard, Paul Barham, Martín Abadi
SOSP (2013), pp. 439-455
-
On Layout Randomization for Arrays and Functions
Martín Abadi, Jérémy Planul
POST (2013), pp. 167-185
-
SocialWatch: detection of online service abuse via large-scale social graphs
Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao
ASIACCS (2013), pp. 143-148
-
A Functional View of Imperative Information Flow
Thomas H. Austin, Cormac Flanagan, Martín Abadi
APLAS (2012), pp. 34-49
-
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications
Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi
NDSS (2012)
-
Innocent by association: early recognition of legitimate users
Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao
ACM Conference on Computer and Communications Security (2012), pp. 353-364
-
On Protection by Layout Randomization
Martín Abadi, Gordon D. Plotkin
ACM Trans. Inf. Syst. Secur., vol. 15 (2012), pp. 8
-
Software Security: A Formal Perspective - (Notes for a Talk)
FM (2012), pp. 1-5
-
AC: composable asynchronous IO for native languages
Tim Harris 0001, Martín Abadi, Rebecca Isaacs, Ross McIlroy
OOPSLA (2011), pp. 903-920
-
Differential privacy with information flow control
Arnar Birgisson, Frank McSherry, Martín Abadi
PLAS (2011), pp. 2
-
Heat-seeking honeypots: design and experience
John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi
WWW (2011), pp. 207-216
-
Semantics of transactional memory and automatic mutual exclusion
Martín Abadi, Andrew Birrell, Tim Harris 0001, Michael Isard
ACM Trans. Program. Lang. Syst., vol. 33 (2011), pp. 2
-
deSEO: Combating Search-Result Poisoning
John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi
USENIX Security Symposium (2011)
-
A Model of Cooperative Threads
Martín Abadi, Gordon D. Plotkin
Logical Methods in Computer Science, vol. 6 (2010)
-
A model of dynamic separation for transactional memory
Martín Abadi, Tim Harris 0001, Katherine F. Moore
Inf. Comput., vol. 208 (2010), pp. 1093-1117
-
Guessing attacks and the computational soundness of static equivalence
Mathieu Baudet, Bogdan Warinschi, Martín Abadi
Journal of Computer Security, vol. 18 (2010), pp. 909-968
-
How to tell an airport from a home: techniques and applications
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage
HotNets (2010), pp. 13
-
On Protection by Layout Randomization
Martín Abadi, Gordon D. Plotkin
CSF (2010), pp. 337-351
-
Searching the Searchers with SearchAudit
John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy
USENIX Security Symposium (2010), pp. 127-142
-
The Fine Print of Security
LICS (2010), pp. 110
-
A model of cooperative threads
Martín Abadi, Gordon D. Plotkin
POPL (2009), pp. 29-40
-
Control-flow integrity principles, implementations, and applications
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
ACM Trans. Inf. Syst. Secur., vol. 13 (2009)
-
De-anonymizing the internet using unreliable IDs
Yinglian Xie, Fang Yu, Martín Abadi
SIGCOMM (2009), pp. 75-86
-
Implementation and Use of Transactional Memory with Dynamic Separation
Martín Abadi, Andrew Birrell, Tim Harris 0001, Johnson Hsieh, Michael Isard
CC (2009), pp. 63-77
-
Logic in Access Control (Tutorial Notes)
FOSAD (2009), pp. 145-165
-
Models and Proofs of Protocol Security: A Progress Report
Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh
CAV (2009), pp. 35-49
-
Perspectives on Transactional Memory
Martín Abadi, Tim Harris 0001
CONCUR (2009), pp. 1-14
-
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
Martín Abadi, Tim Harris 0001, Mojtaba Mehrara
PPOPP (2009), pp. 185-196
-
Unified Declarative Platform for Secure Netwoked Information Systems
Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi
ICDE (2009), pp. 150-161
-
A Modal Deconstruction of Access Control Logics
Deepak Garg 0001, Martín Abadi
FoSSaCS (2008), pp. 216-230
-
A Model of Dynamic Separation for Transactional Memory
Martín Abadi, Tim Harris 0001, Katherine F. Moore
CONCUR (2008), pp. 6-20
-
Automated verification of selected equivalences for security protocols
Bruno Blanchet, Martín Abadi, Cédric Fournet
J. Log. Algebr. Program., vol. 75 (2008), pp. 3-51
-
Automatic Mutual Exclusion and Atomicity Checks
Concurrency, Graphs and Models (2008), pp. 510-526
-
Code-Carrying Authorization
Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon
ESORICS (2008), pp. 563-579
-
Security analysis of cryptographically controlled access to XML documents
Martín Abadi, Bogdan Warinschi
J. ACM, vol. 55 (2008)
-
Semantics of transactional memory and automatic mutual exclusion
Martín Abadi, Andrew Birrell, Tim Harris 0001, Michael Isard
POPL (2008), pp. 63-74
-
The good, the bad, and the provable
ACM Conference on Computer and Communications Security (2008), pp. 1
-
Variations in Access Control Logic
DEON (2008), pp. 96-109
-
Access Control in a Core Calculus of Dependency
Electr. Notes Theor. Comput. Sci., vol. 172 (2007), pp. 5-31
-
Authorizing applications in singularity
Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon
EuroSys (2007), pp. 355-368
-
Editorial
Martín Abadi, Jens Palsberg
ACM Trans. Program. Lang. Syst., vol. 29 (2007)
-
Just fast keying in the pi calculus
Martín Abadi, Bruno Blanchet, Cédric Fournet
ACM Trans. Inf. Syst. Secur., vol. 10 (2007)
-
Policies and Proofs for Code Auditing
Nathan Whitehead, Jordan Johnson, Martín Abadi
ATVA (2007), pp. 1-14
-
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
Martín Abadi, Phillip Rogaway
J. Cryptology, vol. 20 (2007), pp. 395
-
Security Protocols: Principles and Calculi
FOSAD (2007), pp. 1-23
-
Towards a Declarative Language and System for Secure Networking
Martín Abadi, Boon Thau Loo
NetDB (2007)
-
Access control in a core calculus of dependency
ICFP (2006), pp. 263-273
-
Architectural support for software-based protection
Mihai Budiu, Úlfar Erlingsson, Martín Abadi
ASID (2006), pp. 42-51
-
Computational Secrecy by Typing for the Pi Calculus
Martín Abadi, Ricardo Corin, Cédric Fournet
APLAS (2006), pp. 253-269
-
Deciding knowledge in security protocols under equational theories
Martín Abadi, Véronique Cortier
Theor. Comput. Sci., vol. 367 (2006), pp. 2-32
-
Formal Analysis of Dynamic, Distributed File-System Access Controls
Avik Chaudhuri, Martín Abadi
FORTE (2006), pp. 99-114
-
Guessing Attacks and the Computational Soundness of Static Equivalence
Martín Abadi, Mathieu Baudet, Bogdan Warinschi
FoSSaCS (2006), pp. 398-412
-
Secrecy by Typing and File-Access Control
Avik Chaudhuri, Martín Abadi
CSFW (2006), pp. 112-123
-
Types for safe locking: Static race detection for Java
Martín Abadi, Cormac Flanagan, Stephen N. Freund
ACM Trans. Program. Lang. Syst., vol. 28 (2006), pp. 207-255
-
XFI: Software Guards for System Address Spaces
Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula
OSDI (2006), pp. 75-88
-
"Language-Based Security"
Martín Abadi, Greg Morrisett, Andrei Sabelfeld
J. Funct. Program., vol. 15 (2005), pp. 129
-
A Theory of Secure Control Flow
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
ICFEM (2005), pp. 111-124
-
Access Control in a World of Software Diversity
Martín Abadi, Andrew Birrell, Ted Wobber
HotOS (2005)
-
Analyzing security protocols with secrecy types and logic programs
Martín Abadi, Bruno Blanchet
J. ACM, vol. 52 (2005), pp. 102-146
-
Automated Verification of Selected Equivalences for Security Protocols
Bruno Blanchet, Martín Abadi, Cédric Fournet
LICS (2005), pp. 331-340
-
Computer-assisted verification of a protocol for certified email
Martín Abadi, Bruno Blanchet
Sci. Comput. Program., vol. 58 (2005), pp. 3-27
-
Control-flow integrity
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
ACM Conference on Computer and Communications Security (2005), pp. 340-353
-
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
Martín Abadi, Véronique Cortier
CSFW (2005), pp. 62-76
-
Formal security analysis of basic network-attached storage
Avik Chaudhuri, Martín Abadi
FMSE (2005), pp. 43-52
-
Moderately hard, memory-bound functions
Martín Abadi, Michael M. Burrows, Mark Manasse, Ted Wobber
ACM Transactions on Internet Technology, vol. 5 (2005), pp. 299-327
-
Password-Based Encryption Analyzed
Martín Abadi, Bogdan Warinschi
ICALP (2005), pp. 664-676
-
Security analysis of cryptographically controlled access to XML documents
Martín Abadi, Bogdan Warinschi
PODS (2005), pp. 108-117
-
A Logical Account of NGSCB
Martín Abadi, Ted Wobber
FORTE (2004), pp. 1-12
-
BCiC: A System for Code Authentication and Verification
Nathan Whitehead, Martín Abadi
LPAR (2004), pp. 110-124
-
By Reason and Authority: A System for Authorization of Proof-Carrying Code
Nathan Whitehead, Martín Abadi, George C. Necula
CSFW (2004), pp. 236-250
-
Choice in Dynamic Linking
Martín Abadi, Georges Gonthier, Benjamin Werner
FoSSaCS (2004), pp. 12-26
-
Deciding Knowledge in Security Protocols Under Equational Theories
Martín Abadi, Véronique Cortier
ICALP (2004), pp. 46-58
-
Just Fast Keying in the Pi Calculus
Martín Abadi, Bruno Blanchet, Cédric Fournet
ESOP (2004), pp. 340-354
-
Language-Based Enforcement of Privacy Policies
Katia Hayati, Martín Abadi
Privacy Enhancing Technologies (2004), pp. 302-313
-
Private authentication
Martín Abadi, Cédric Fournet
Theor. Comput. Sci., vol. 322 (2004), pp. 427-476
-
Trusted Computing, Trusted Third Parties, and Verified Communications
SEC (2004), pp. 291-308
-
A Logic of Object-Oriented Programs
Martín Abadi, K. Rustan M. Leino
Verification: Theory and Practice (2003), pp. 11-41
-
Access Control Based on Execution History
Martín Abadi, Cédric Fournet
NDSS (2003)
-
Bankable Postage for Network Services
Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber
ASIAN (2003), pp. 72-90
-
Built-in Object Security
ECOOP (2003), pp. 1
-
Computer-Assisted Verification of a Protocol for Certified Email
Martín Abadi, Bruno Blanchet
SAS (2003), pp. 316-335
-
Logic in Access Control
LICS (2003), pp. 228-
-
Reasoning About Secrecy for Active Networks
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
Journal of Computer Security, vol. 11 (2003), pp. 245-287
-
Secrecy types for asymmetric communication
Martín Abadi, Bruno Blanchet
Theor. Comput. Sci., vol. 3 (2003), pp. 387-415
-
Analyzing security protocols with secrecy types and logic programs
Martín Abadi, Bruno Blanchet
POPL (2002), pp. 33-44
-
Certified email with a light on-line trusted third party: design and implementation
Martín Abadi, Neal Glew
WWW (2002), pp. 387-395
-
Editorial
Martín Abadi, Leonid Libkin, Frank Pfenning
ACM Trans. Comput. Log., vol. 3 (2002), pp. 335-335
-
Hiding Names: Private Authentication in the Applied Pi Calculus
Cédric Fournet, Martín Abadi
ISSS (2002), pp. 317-338
-
Private Authentication
Privacy Enhancing Technologies (2002), pp. 27-40
-
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
Martín Abadi, Phillip Rogaway
J. Cryptology, vol. 15 (2002), pp. 103-127
-
Secure Implementation of Channel Abstractions
Martín Abadi, Cédric Fournet, Georges Gonthier
Inf. Comput., vol. 174 (2002), pp. 37-83
-
Computing Symbolic Models for Verifying Cryptographic Protocols
Marcelo P. Fiore, Martín Abadi
CSFW (2001), pp. 160-173
-
Formal Eavesdropping and Its Computational Interpretation
Martín Abadi, Jan Jürjens
TACS (2001), pp. 82-94
-
Leslie Lamport's properties and actions
PODC (2001), pp. 15
-
Mobile values, new names, and secure communication
Martín Abadi, Cédric Fournet
POPL (2001), pp. 104-115
-
Secrecy Types for Asymmetric Communication
Martín Abadi, Bruno Blanchet
FoSSaCS (2001), pp. 25-41
-
Authentication Primitives and Their Compilation
Martín Abadi, Cédric Fournet, Georges Gonthier
POPL (2000), pp. 302-315
-
Reasoning about Secrecy for Active Networks
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
CSFW (2000), pp. 118-129
-
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
Martín Abadi, Phillip Rogaway
IFIP TCS (2000), pp. 3-22
-
Taming the Adversary
CRYPTO (2000), pp. 353-358
-
top-top-closed relations and admissibility
Mathematical Structures in Computer Science, vol. 10 (2000), pp. 313-320
-
A Calculus for Cryptographic Protocols: The spi Calculus
Martín Abadi, Andrew D. Gordon
Inf. Comput., vol. 148 (1999), pp. 1-70
-
A Core Calculus of Dependency
Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke
POPL (1999), pp. 147-160
-
A Top-Down Look at a Secure Message
Martín Abadi, Cédric Fournet, Georges Gonthier
FSTTCS (1999), pp. 122-141
-
A Type System for Java Bytecode Subroutines
Raymie Stata, Martín Abadi
ACM Trans. Program. Lang. Syst., vol. 21 (1999), pp. 90-137
-
Object Types against Races
Cormac Flanagan, Martín Abadi
CONCUR (1999), pp. 288-303
-
Protection in Programming-Language Translations
Secure Internet Programming (1999), pp. 19-34
-
Secrecy in Programming-Language Semantics
Electr. Notes Theor. Comput. Sci., vol. 20 (1999), pp. 80-94
-
Secure Communications Processing for Distributed Languages
Martín Abadi, Cédric Fournet, Georges Gonthier
IEEE Symposium on Security and Privacy (1999), pp. 74-88
-
Secure Network Objects
Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
Secure Internet Programming (1999), pp. 395-412
-
Security Protocols and Specifications
FoSSaCS (1999), pp. 1-13
-
Types for Safe Locking
Cormac Flanagan, Martín Abadi
ESOP (1999), pp. 91-108
-
A Bisimulation Method for Cryptographic Protocols
Martín Abadi, Andrew D. Gordon
Nord. J. Comput., vol. 5 (1998), pp. 267-
-
A Bisimulation Method for Cryptographic Protocols
Martín Abadi, Andrew D. Gordon
ESOP (1998), pp. 12-26
-
A Type System for Java Bytecode Subroutines
Raymie Stata, Martín Abadi
POPL (1998), pp. 149-160
-
On SDSI's Linked Local Name Spaces
Journal of Computer Security, vol. 6 (1998), pp. 3-22
-
Panel Introduction: Varieties of Authentication
Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
CSFW (1998), pp. 79-82
-
Protection in Programming-Language Translations
ICALP (1998), pp. 868-883
-
Protection in Programming-Language Translations: Mobile Object Systems (Abstract)
ECOOP Workshops (1998), pp. 291
-
Secure Implementation of Channel Abstractions
Martín Abadi, Cédric Fournet, Georges Gonthier
LICS (1998), pp. 105-116
-
Secure Web Tunneling
Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber
Computer Networks, vol. 30 (1998), pp. 531-539
-
Two Facets of Authentication
CSFW (1998), pp. 27-32
-
A Calculus for Cryptographic Protocols: The Spi Calculus
Martín Abadi, Andrew D. Gordon
ACM Conference on Computer and Communications Security (1997), pp. 36-47
-
A Logic of Object-Oriented Programs
Martín Abadi, K. Rustan M. Leino
TAPSOFT (1997), pp. 682-696
-
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Trans. Software Eng., vol. 23 (1997), pp. 185-186
-
On SDSI's Linked Local Name Spaces
CSFW (1997), pp. 98-108
-
Reasoning about Cryptographic Protocols in the Spi Calculus
Martín Abadi, Andrew D. Gordon
CONCUR (1997), pp. 59-73
-
Secrecy by Typing inSecurity Protocols
TACS (1997), pp. 611-638
-
Secure Implementation of Channel Abstractions
Martín Abadi, Cédric Fournet, Georges Gonthier
Electr. Notes Theor. Comput. Sci., vol. 10 (1997), pp. 202-203
-
A Theory of Objects
Martín Abadi, Luca Cardelli
Springer (1996), I-XIII, 1-396
-
A Theory of Primitive Objects: Untyped and First-Order Systems
Martín Abadi, Luca Cardelli
Inf. Comput., vol. 125 (1996), pp. 78-102
-
An Interpretation of Objects and Object Types
Martín Abadi, Luca Cardelli, Ramesh Viswanathan
POPL (1996), pp. 396-409
-
Analysis and Caching of Dependencies
Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy
ICFP (1996), pp. 83-91
-
On Subtyping and Matching
Martín Abadi, Luca Cardelli
ACM Trans. Program. Lang. Syst., vol. 18 (1996), pp. 401-423
-
On TLA as a logic
Martín Abadi, Stephan Merz
NATO ASI DPD (1996), pp. 235-271
-
Prudent Engineering Practice for Cryptographic Protocols
Martín Abadi, Roger M. Needham
IEEE Trans. Software Eng., vol. 22 (1996), pp. 6-15
-
Secure Network Objects
Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
IEEE Symposium on Security and Privacy (1996), pp. 211-221
-
Syntactic Considerations on Recursive Types
Martín Abadi, Marcelo P. Fiore
LICS (1996), pp. 242-252
-
A Model for Formal Parametric Polymorphism: A PER Interpretation for System R
Roberto Bellucci, Martín Abadi, Pierre-Louis Curien
TLCA (1995), pp. 32-46
-
A Theory of Primitive Objects: Second-Order Systems
Martín Abadi, Luca Cardelli
Sci. Comput. Program., vol. 25 (1995), pp. 81-116
-
An Abstract Account of Composition
Martín Abadi, Stephan Merz
MFCS (1995), pp. 499-508
-
An Imperative Object Calculus
Martín Abadi, Luca Cardelli
TAPSOFT (1995), pp. 471-485
-
An Imperative Object Calculus (Invited Paper)
Martín Abadi, Luca Cardelli
TAPOS, vol. 1 (1995), pp. 151-166
-
Conjoining Specifications
Martín Abadi, Leslie Lamport
ACM Trans. Program. Lang. Syst., vol. 17 (1995), pp. 507-534
-
Dynamic Typing in Polymorphic Languages
Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy
J. Funct. Program., vol. 5 (1995), pp. 111-130
-
Methods as Assertions
John Lamping, Martín Abadi
TAPOS, vol. 1 (1995), pp. 5-18
-
On Subtyping and Matching
Martín Abadi, Luca Cardelli
ECOOP (1995), pp. 145-167
-
A Semantics for Static Type Inference in a Nondeterministic Language
Inf. Comput., vol. 109 (1994), pp. 300-306
-
A Semantics of Object Types
Martín Abadi, Luca Cardelli
LICS (1994), pp. 332-341
-
A TLA Solution to the RPC-Memory Specification Problem
Martín Abadi, Leslie Lamport, Stephan Merz
Formal Systems Specification (1994), pp. 21-66
-
A Theory of Primitive Objects - Scond-Order Systems
Martín Abadi, Luca Cardelli
ESOP (1994), pp. 1-25
-
A Theory of Primitive Objects - Untyped and First-Order Systems
Martín Abadi, Luca Cardelli
TACS (1994), pp. 296-320
-
An Old-Fashined Recipe for Real-Time
Martín Abadi, Leslie Lamport
ACM Trans. Program. Lang. Syst., vol. 16 (1994), pp. 1543-1571
-
Authentication in the Taos Operating System
Edward Wobber, Martín Abadi, Michael Burrows
ACM Trans. Comput. Syst., vol. 12 (1994), pp. 3-32
-
Baby Modula-3 and a Theory of Objects
J. Funct. Program., vol. 4 (1994), pp. 249-283
-
Decidability and Expressiveness for First-Order Logics of Probability
Martín Abadi, Joseph Y. Halpern
Inf. Comput., vol. 112 (1994), pp. 1-36
-
Decomposing Specifications of Concurrent Systems
Martín Abadi, Leslie Lamport
PROCOMET (1994), pp. 327-340
-
Methods as Assertions
John Lamping, Martín Abadi
ECOOP (1994), pp. 60-80
-
Open Systems in TLA
Martín Abadi, Leslie Lamport
PODC (1994), pp. 81-90
-
Prudent engineering practice for cryptographic protocols
Martín Abadi, Roger M. Needham
IEEE Symposium on Security and Privacy (1994), pp. 122-136
-
Subtyping and Parametricity
Gordon D. Plotkin, Martín Abadi, Luca Cardelli
LICS (1994), pp. 310-319
-
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 706-734
-
A Logic for Parametric Polymorphism
Gordon D. Plotkin, Martín Abadi
TLCA (1993), pp. 361-375
-
A Logical View of Composition
Martín Abadi, Gordon D. Plotkin
Theor. Comput. Sci., vol. 114 (1993), pp. 3-30
-
Authentication in the Taos Operating System
Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
SOSP (1993), pp. 256-269
-
Authentification and Delegation with Smart-Cards
Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
Sci. Comput. Program., vol. 21 (1993), pp. 93-113
-
Composing Specifications
Martín Abadi, Leslie Lamport
ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 73-132
-
Extensible Grammars for Language Specialization
Luca Cardelli, Florian Matthes, Martín Abadi
DBPL (1993), pp. 11-31
-
Formal Parametric Polymorphism
Martín Abadi, Luca Cardelli, Pierre-Louis Curien
Theor. Comput. Sci., vol. 121 (1993), pp. 9-58
-
Formal Parametric Polymorphism
Martín Abadi, Luca Cardelli, Pierre-Louis Curien
POPL (1993), pp. 157-170
-
Authentication in Distributed Systems: Theory and Practice
Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
ACM Trans. Comput. Syst., vol. 10 (1992), pp. 265-310
-
Linear Logic Without Boxes
Georges Gonthier, Martín Abadi, Jean-Jacques Lévy
LICS (1992), pp. 223-234
-
The Geometry of Optimal Lambda Reduction
Georges Gonthier, Martín Abadi, Jean-Jacques Lévy
POPL (1992), pp. 15-26
-
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
CRYPTO (1991), pp. 1-23
-
A Logical View of Composition and Refinement
Martín Abadi, Gordon D. Plotkin
POPL (1991), pp. 323-332
-
A Semantics for a Logic of Authentication (Extended Abstract)
Martín Abadi, Mark R. Tuttle
PODC (1991), pp. 201-216
-
An Old-Fashioned Recipe for Real Time
Martín Abadi, Leslie Lamport
REX Workshop (1991), pp. 1-27
-
Authentication and Delegation with Smart-cards
Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
TACS (1991), pp. 326-345
-
Authentication in Distributed Systems: Theory and Practice
Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
SOSP (1991), pp. 165-182
-
Dynamic Typing in a Statically Typed Language
Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin
ACM Trans. Program. Lang. Syst., vol. 13 (1991), pp. 237-268
-
Explicit Substitutions
Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy
J. Funct. Program., vol. 1 (1991), pp. 375-416
-
Faithful Ideal Models for Recursive Polymorphic Types
Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin
Int. J. Found. Comput. Sci., vol. 2 (1991), pp. 1-21
-
Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''
Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider
Inf. Process. Lett., vol. 40 (1991), pp. 141-142
-
The Existence of Refinement Mappings
Martín Abadi, Leslie Lamport
Theor. Comput. Sci., vol. 82 (1991), pp. 253-284
-
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Needham
ACM Trans. Comput. Syst., vol. 8 (1990), pp. 18-36
-
A Per Model of Polymorphism and Recursive Types
Martín Abadi, Gordon D. Plotkin
LICS (1990), pp. 355-365
-
An Axiomatization of Lamport's Temporal Logic of Actions
CONCUR (1990), pp. 57-69
-
Corrigendum: The Power of Temporal Proofs
Theor. Comput. Sci., vol. 70 (1990), pp. 275
-
Explicit Substitutions
Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy
POPL (1990), pp. 31-46
-
Nonclausal Deduction in First-Order Temporal Logic
Martín Abadi, Zohar Manna
J. ACM, vol. 37 (1990), pp. 279-317
-
Rejoinder to Nessett
Michael Burrows, Martín Abadi, Roger M. Needham
Operating Systems Review, vol. 24 (1990), pp. 39-40
-
Secure Circuit Evaluation
Martín Abadi, Joan Feigenbaum
J. Cryptology, vol. 2 (1990), pp. 1-12
-
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Needham
SOSP (1989), pp. 1-13
-
Composing Specifications
Martín Abadi, Leslie Lamport
REX Workshop (1989), pp. 1-41
-
Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)
Martín Abadi, Joseph Y. Halpern
FOCS (1989), pp. 148-153
-
Dynamic Typing in a Statically-Typed Language
Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin
POPL (1989), pp. 213-227
-
Faithful Ideal Models for Recursive Polymorphic Types
Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin
LICS (1989), pp. 216-225
-
On Hiding Information from an Oracle
Martín Abadi, Joan Feigenbaum, Joe Kilian
J. Comput. Syst. Sci., vol. 39 (1989), pp. 21-50
-
Realizable and Unrealizable Specifications of Reactive Systems
Martín Abadi, Leslie Lamport, Pierre Wolper
ICALP (1989), pp. 1-17
-
Temporal Logic Programming
Martín Abadi, Zohar Manna
J. Symb. Comput., vol. 8 (1989), pp. 277-295
-
The Power of Temporal Proofs
Theor. Comput. Sci., vol. 65 (1989), pp. 35-83
-
A Simple Protocol for Secure Circuit Evaluation
Martín Abadi, Joan Feigenbaum
STACS (1988), pp. 264-272
-
Authentication: A Practical Study in Belief and Action
Michael Burrows, Martín Abadi, Roger M. Needham
TARK (1988), pp. 325-342
-
On Generating Solved Instances of Computational Problems
Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra
CRYPTO (1988), pp. 297-310
-
The Existence of Refinement Mappings
Martín Abadi, Leslie Lamport
LICS (1988), pp. 165-175
-
On Hiding Information from an Oracle (Extended Abstract)
Martín Abadi, Joan Feigenbaum, Joe Kilian
STOC (1987), pp. 195-203
-
On hiding information from an oracle
Martín Abadi, Joan Feigenbaum, Joe Kilian
Structure in Complexity Theory Conference (1987)
-
Temporal Logic Programming
Martín Abadi, Zohar Manna
SLP (1987), pp. 4-16
-
The Power of Temporal Proofs
LICS (1987), pp. 123-130
-
A Timely Resolution
Martín Abadi, Zohar Manna
LICS (1986), pp. 176-186
-
Modal Theorem Proving
Martín Abadi, Zohar Manna
CADE (1986), pp. 172-189
-
Nonclausal Temporal Deduction
Martín Abadi, Zohar Manna
Logic of Programs (1985), pp. 1-15