Martín Abadi

Martín Abadi has been at Google since November 2014. A list of publications (going back to 1985) and other information is in web pages at UC Santa Cruz (where he is now Emeritus).

Google Publications

Previous Publications

  •  

    Foundations of Differential Dataflow

    Martín Abadi, Frank McSherry, Gordon D. Plotkin

    FoSSaCS (2015), pp. 71-83

  •  

    On the Flow of Data, Information, and Time

    Martín Abadi, Michael Isard

    POST (2015), pp. 73-92

  •  

    The Prophecy of Undo

    Martín Abadi

    FASE (2015), pp. 347-361

  •  

    Timely Rollback: Specification and Verification

    Martín Abadi, Michael Isard

    NFM (2015), pp. 19-34

  •   

    Understanding Typescript

    Gavin M. Bierman, Martín Abadi, Mads Torgersen

    ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, pp. 257-281

  •  

    Web PKI: Closing the Gap between Guidelines and Practices

    Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie, Microsoft Research

    NDSS (2014)

  •  

    Early security classification of skype users via machine learning

    Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi

    AISec (2013), pp. 35-44

  •  

    Formal Analysis of a Distributed Algorithm for Tracking Progress

    Martín Abadi, Frank McSherry, Derek Gordon Murray, Thomas L. Rodeheffer

    FMOODS/FORTE (2013), pp. 5-19

  •  

    Global Authentication in an Untrustworthy World

    Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie

    HotOS (2013)

  •  

    Layout Randomization and Nondeterminism

    Martín Abadi, Jérémy Planul, Gordon D. Plotkin

    Electr. Notes Theor. Comput. Sci., vol. 298 (2013), pp. 29-50

  •  

    Message-Locked Encryption for Lock-Dependent Messages

    Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev

    CRYPTO (1) (2013), pp. 374-391

  •  

    Naiad: a timely dataflow system

    Derek Gordon Murray, Frank McSherry, Rebecca Isaacs, Michael Isard, Paul Barham, Martín Abadi

    SOSP (2013), pp. 439-455

  •  

    On Layout Randomization for Arrays and Functions

    Martín Abadi, Jérémy Planul

    POST (2013), pp. 167-185

  •  

    SocialWatch: detection of online service abuse via large-scale social graphs

    Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao

    ASIACCS (2013), pp. 143-148

  •  

    A Functional View of Imperative Information Flow

    Thomas H. Austin, Cormac Flanagan, Martín Abadi

    APLAS (2012), pp. 34-49

  •  

    Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

    Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi

    NDSS (2012)

  •  

    Innocent by association: early recognition of legitimate users

    Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao

    ACM Conference on Computer and Communications Security (2012), pp. 353-364

  •  

    On Protection by Layout Randomization

    Martín Abadi, Gordon D. Plotkin

    ACM Trans. Inf. Syst. Secur., vol. 15 (2012), pp. 8

  •  

    Software Security: A Formal Perspective - (Notes for a Talk)

    Martín Abadi

    FM (2012), pp. 1-5

  •  

    AC: composable asynchronous IO for native languages

    Tim Harris 0001, Martín Abadi, Rebecca Isaacs, Ross McIlroy

    OOPSLA (2011), pp. 903-920

  •  

    Differential privacy with information flow control

    Arnar Birgisson, Frank McSherry, Martín Abadi

    PLAS (2011), pp. 2

  •  

    Heat-seeking honeypots: design and experience

    John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi

    WWW (2011), pp. 207-216

  •  

    Semantics of transactional memory and automatic mutual exclusion

    Martín Abadi, Andrew Birrell, Tim Harris 0001, Michael Isard

    ACM Trans. Program. Lang. Syst., vol. 33 (2011), pp. 2

  •  

    deSEO: Combating Search-Result Poisoning

    John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi

    USENIX Security Symposium (2011)

  •  

    A Model of Cooperative Threads

    Martín Abadi, Gordon D. Plotkin

    Logical Methods in Computer Science, vol. 6 (2010)

  •  

    A model of dynamic separation for transactional memory

    Martín Abadi, Tim Harris 0001, Katherine F. Moore

    Inf. Comput., vol. 208 (2010), pp. 1093-1117

  •  

    Guessing attacks and the computational soundness of static equivalence

    Mathieu Baudet, Bogdan Warinschi, Martín Abadi

    Journal of Computer Security, vol. 18 (2010), pp. 909-968

  •  

    How to tell an airport from a home: techniques and applications

    Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage

    HotNets (2010), pp. 13

  •  

    On Protection by Layout Randomization

    Martín Abadi, Gordon D. Plotkin

    CSF (2010), pp. 337-351

  •  

    Searching the Searchers with SearchAudit

    John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy

    USENIX Security Symposium (2010), pp. 127-142

  •  

    The Fine Print of Security

    Martín Abadi

    LICS (2010), pp. 110

  •  

    A model of cooperative threads

    Martín Abadi, Gordon D. Plotkin

    POPL (2009), pp. 29-40

  •  

    Control-flow integrity principles, implementations, and applications

    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti

    ACM Trans. Inf. Syst. Secur., vol. 13 (2009)

  •  

    De-anonymizing the internet using unreliable IDs

    Yinglian Xie, Fang Yu, Martín Abadi

    SIGCOMM (2009), pp. 75-86

  •  

    Implementation and Use of Transactional Memory with Dynamic Separation

    Martín Abadi, Andrew Birrell, Tim Harris 0001, Johnson Hsieh, Michael Isard

    CC (2009), pp. 63-77

  •  

    Logic in Access Control (Tutorial Notes)

    Martín Abadi

    FOSAD (2009), pp. 145-165

  •  

    Models and Proofs of Protocol Security: A Progress Report

    Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh

    CAV (2009), pp. 35-49

  •  

    Perspectives on Transactional Memory

    Martín Abadi, Tim Harris 0001

    CONCUR (2009), pp. 1-14

  •  

    Transactional memory with strong atomicity using off-the-shelf memory protection hardware

    Martín Abadi, Tim Harris 0001, Mojtaba Mehrara

    PPOPP (2009), pp. 185-196

  •  

    Unified Declarative Platform for Secure Netwoked Information Systems

    Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi

    ICDE (2009), pp. 150-161

  •  

    A Modal Deconstruction of Access Control Logics

    Deepak Garg 0001, Martín Abadi

    FoSSaCS (2008), pp. 216-230

  •  

    A Model of Dynamic Separation for Transactional Memory

    Martín Abadi, Tim Harris 0001, Katherine F. Moore

    CONCUR (2008), pp. 6-20

  •  

    Automated verification of selected equivalences for security protocols

    Bruno Blanchet, Martín Abadi, Cédric Fournet

    J. Log. Algebr. Program., vol. 75 (2008), pp. 3-51

  •  

    Automatic Mutual Exclusion and Atomicity Checks

    Martín Abadi

    Concurrency, Graphs and Models (2008), pp. 510-526

  •  

    Code-Carrying Authorization

    Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon

    ESORICS (2008), pp. 563-579

  •  

    Security analysis of cryptographically controlled access to XML documents

    Martín Abadi, Bogdan Warinschi

    J. ACM, vol. 55 (2008)

  •  

    Semantics of transactional memory and automatic mutual exclusion

    Martín Abadi, Andrew Birrell, Tim Harris 0001, Michael Isard

    POPL (2008), pp. 63-74

  •  

    The good, the bad, and the provable

    Martín Abadi

    ACM Conference on Computer and Communications Security (2008), pp. 1

  •  

    Variations in Access Control Logic

    Martín Abadi

    DEON (2008), pp. 96-109

  •  

    Access Control in a Core Calculus of Dependency

    Martín Abadi

    Electr. Notes Theor. Comput. Sci., vol. 172 (2007), pp. 5-31

  •  

    Authorizing applications in singularity

    Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon

    EuroSys (2007), pp. 355-368

  •  

    Editorial

    Martín Abadi, Jens Palsberg

    ACM Trans. Program. Lang. Syst., vol. 29 (2007)

  •  

    Just fast keying in the pi calculus

    Martín Abadi, Bruno Blanchet, Cédric Fournet

    ACM Trans. Inf. Syst. Secur., vol. 10 (2007)

  •  

    Policies and Proofs for Code Auditing

    Nathan Whitehead, Jordan Johnson, Martín Abadi

    ATVA (2007), pp. 1-14

  •  

    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)

    Martín Abadi, Phillip Rogaway

    J. Cryptology, vol. 20 (2007), pp. 395

  •  

    Security Protocols: Principles and Calculi

    Martín Abadi

    FOSAD (2007), pp. 1-23

  •  

    Towards a Declarative Language and System for Secure Networking

    Martín Abadi, Boon Thau Loo

    NetDB (2007)

  •  

    Access control in a core calculus of dependency

    Martín Abadi

    ICFP (2006), pp. 263-273

  •  

    Architectural support for software-based protection

    Mihai Budiu, Úlfar Erlingsson, Martín Abadi

    ASID (2006), pp. 42-51

  •  

    Computational Secrecy by Typing for the Pi Calculus

    Martín Abadi, Ricardo Corin, Cédric Fournet

    APLAS (2006), pp. 253-269

  •  

    Deciding knowledge in security protocols under equational theories

    Martín Abadi, Véronique Cortier

    Theor. Comput. Sci., vol. 367 (2006), pp. 2-32

  •  

    Formal Analysis of Dynamic, Distributed File-System Access Controls

    Avik Chaudhuri, Martín Abadi

    FORTE (2006), pp. 99-114

  •  

    Guessing Attacks and the Computational Soundness of Static Equivalence

    Martín Abadi, Mathieu Baudet, Bogdan Warinschi

    FoSSaCS (2006), pp. 398-412

  •  

    Secrecy by Typing and File-Access Control

    Avik Chaudhuri, Martín Abadi

    CSFW (2006), pp. 112-123

  •  

    Types for safe locking: Static race detection for Java

    Martín Abadi, Cormac Flanagan, Stephen N. Freund

    ACM Trans. Program. Lang. Syst., vol. 28 (2006), pp. 207-255

  •  

    XFI: Software Guards for System Address Spaces

    Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula

    OSDI (2006), pp. 75-88

  •  

    "Language-Based Security"

    Martín Abadi, Greg Morrisett, Andrei Sabelfeld

    J. Funct. Program., vol. 15 (2005), pp. 129

  •  

    A Theory of Secure Control Flow

    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti

    ICFEM (2005), pp. 111-124

  •  

    Access Control in a World of Software Diversity

    Martín Abadi, Andrew Birrell, Ted Wobber

    HotOS (2005)

  •  

    Analyzing security protocols with secrecy types and logic programs

    Martín Abadi, Bruno Blanchet

    J. ACM, vol. 52 (2005), pp. 102-146

  •  

    Automated Verification of Selected Equivalences for Security Protocols

    Bruno Blanchet, Martín Abadi, Cédric Fournet

    LICS (2005), pp. 331-340

  •  

    Computer-assisted verification of a protocol for certified email

    Martín Abadi, Bruno Blanchet

    Sci. Comput. Program., vol. 58 (2005), pp. 3-27

  •  

    Control-flow integrity

    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti

    ACM Conference on Computer and Communications Security (2005), pp. 340-353

  •  

    Deciding Knowledge in Security Protocols under (Many More) Equational Theories

    Martín Abadi, Véronique Cortier

    CSFW (2005), pp. 62-76

  •  

    Formal security analysis of basic network-attached storage

    Avik Chaudhuri, Martín Abadi

    FMSE (2005), pp. 43-52

  •   

    Moderately hard, memory-bound functions

    Martín Abadi, Michael M. Burrows, Mark Manasse, Ted Wobber

    ACM Transactions on Internet Technology, vol. 5 (2005), pp. 299-327

  •  

    Password-Based Encryption Analyzed

    Martín Abadi, Bogdan Warinschi

    ICALP (2005), pp. 664-676

  •  

    Security analysis of cryptographically controlled access to XML documents

    Martín Abadi, Bogdan Warinschi

    PODS (2005), pp. 108-117

  •  

    A Logical Account of NGSCB

    Martín Abadi, Ted Wobber

    FORTE (2004), pp. 1-12

  •  

    BCiC: A System for Code Authentication and Verification

    Nathan Whitehead, Martín Abadi

    LPAR (2004), pp. 110-124

  •  

    By Reason and Authority: A System for Authorization of Proof-Carrying Code

    Nathan Whitehead, Martín Abadi, George C. Necula

    CSFW (2004), pp. 236-250

  •  

    Choice in Dynamic Linking

    Martín Abadi, Georges Gonthier, Benjamin Werner

    FoSSaCS (2004), pp. 12-26

  •  

    Deciding Knowledge in Security Protocols Under Equational Theories

    Martín Abadi, Véronique Cortier

    ICALP (2004), pp. 46-58

  •  

    Just Fast Keying in the Pi Calculus

    Martín Abadi, Bruno Blanchet, Cédric Fournet

    ESOP (2004), pp. 340-354

  •  

    Language-Based Enforcement of Privacy Policies

    Katia Hayati, Martín Abadi

    Privacy Enhancing Technologies (2004), pp. 302-313

  •  

    Private authentication

    Martín Abadi, Cédric Fournet

    Theor. Comput. Sci., vol. 322 (2004), pp. 427-476

  •  

    Trusted Computing, Trusted Third Parties, and Verified Communications

    Martín Abadi

    SEC (2004), pp. 291-308

  •  

    A Logic of Object-Oriented Programs

    Martín Abadi, K. Rustan M. Leino

    Verification: Theory and Practice (2003), pp. 11-41

  •  

    Access Control Based on Execution History

    Martín Abadi, Cédric Fournet

    NDSS (2003)

  •  

    Bankable Postage for Network Services

    Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber

    ASIAN (2003), pp. 72-90

  •  

    Built-in Object Security

    Martín Abadi

    ECOOP (2003), pp. 1

  •  

    Computer-Assisted Verification of a Protocol for Certified Email

    Martín Abadi, Bruno Blanchet

    SAS (2003), pp. 316-335

  •  

    Logic in Access Control

    Martín Abadi

    LICS (2003), pp. 228-

  •  

    Reasoning About Secrecy for Active Networks

    Pankaj Kakkar, Carl A. Gunter, Martín Abadi

    Journal of Computer Security, vol. 11 (2003), pp. 245-287

  •  

    Secrecy types for asymmetric communication

    Martín Abadi, Bruno Blanchet

    Theor. Comput. Sci., vol. 3 (2003), pp. 387-415

  •  

    Analyzing security protocols with secrecy types and logic programs

    Martín Abadi, Bruno Blanchet

    POPL (2002), pp. 33-44

  •  

    Certified email with a light on-line trusted third party: design and implementation

    Martín Abadi, Neal Glew

    WWW (2002), pp. 387-395

  •  

    Editorial

    Martín Abadi, Leonid Libkin, Frank Pfenning

    ACM Trans. Comput. Log., vol. 3 (2002), pp. 335-335

  •  

    Hiding Names: Private Authentication in the Applied Pi Calculus

    Cédric Fournet, Martín Abadi

    ISSS (2002), pp. 317-338

  •  

    Private Authentication

    Martín Abadi

    Privacy Enhancing Technologies (2002), pp. 27-40

  •  

    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)

    Martín Abadi, Phillip Rogaway

    J. Cryptology, vol. 15 (2002), pp. 103-127

  •  

    Secure Implementation of Channel Abstractions

    Martín Abadi, Cédric Fournet, Georges Gonthier

    Inf. Comput., vol. 174 (2002), pp. 37-83

  •  

    Computing Symbolic Models for Verifying Cryptographic Protocols

    Marcelo P. Fiore, Martín Abadi

    CSFW (2001), pp. 160-173

  •  

    Formal Eavesdropping and Its Computational Interpretation

    Martín Abadi, Jan Jürjens

    TACS (2001), pp. 82-94

  •  

    Leslie Lamport's properties and actions

    Martín Abadi

    PODC (2001), pp. 15

  •  

    Mobile values, new names, and secure communication

    Martín Abadi, Cédric Fournet

    POPL (2001), pp. 104-115

  •  

    Secrecy Types for Asymmetric Communication

    Martín Abadi, Bruno Blanchet

    FoSSaCS (2001), pp. 25-41

  •  

    Authentication Primitives and Their Compilation

    Martín Abadi, Cédric Fournet, Georges Gonthier

    POPL (2000), pp. 302-315

  •  

    Reasoning about Secrecy for Active Networks

    Pankaj Kakkar, Carl A. Gunter, Martín Abadi

    CSFW (2000), pp. 118-129

  •  

    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)

    Martín Abadi, Phillip Rogaway

    IFIP TCS (2000), pp. 3-22

  •  

    Taming the Adversary

    Martín Abadi

    CRYPTO (2000), pp. 353-358

  •  

    top-top-closed relations and admissibility

    Martín Abadi

    Mathematical Structures in Computer Science, vol. 10 (2000), pp. 313-320

  •  

    A Calculus for Cryptographic Protocols: The spi Calculus

    Martín Abadi, Andrew D. Gordon

    Inf. Comput., vol. 148 (1999), pp. 1-70

  •  

    A Core Calculus of Dependency

    Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke

    POPL (1999), pp. 147-160

  •  

    A Top-Down Look at a Secure Message

    Martín Abadi, Cédric Fournet, Georges Gonthier

    FSTTCS (1999), pp. 122-141

  •  

    A Type System for Java Bytecode Subroutines

    Raymie Stata, Martín Abadi

    ACM Trans. Program. Lang. Syst., vol. 21 (1999), pp. 90-137

  •  

    Object Types against Races

    Cormac Flanagan, Martín Abadi

    CONCUR (1999), pp. 288-303

  •  

    Protection in Programming-Language Translations

    Martín Abadi

    Secure Internet Programming (1999), pp. 19-34

  •  

    Secrecy in Programming-Language Semantics

    Martín Abadi

    Electr. Notes Theor. Comput. Sci., vol. 20 (1999), pp. 80-94

  •  

    Secure Communications Processing for Distributed Languages

    Martín Abadi, Cédric Fournet, Georges Gonthier

    IEEE Symposium on Security and Privacy (1999), pp. 74-88

  •  

    Secure Network Objects

    Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber

    Secure Internet Programming (1999), pp. 395-412

  •  

    Security Protocols and Specifications

    Martín Abadi

    FoSSaCS (1999), pp. 1-13

  •  

    Types for Safe Locking

    Cormac Flanagan, Martín Abadi

    ESOP (1999), pp. 91-108

  •  

    A Bisimulation Method for Cryptographic Protocols

    Martín Abadi, Andrew D. Gordon

    Nord. J. Comput., vol. 5 (1998), pp. 267-

  •  

    A Bisimulation Method for Cryptographic Protocols

    Martín Abadi, Andrew D. Gordon

    ESOP (1998), pp. 12-26

  •  

    A Type System for Java Bytecode Subroutines

    Raymie Stata, Martín Abadi

    POPL (1998), pp. 149-160

  •  

    On SDSI's Linked Local Name Spaces

    Martín Abadi

    Journal of Computer Security, vol. 6 (1998), pp. 3-22

  •  

    Panel Introduction: Varieties of Authentication

    Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows

    CSFW (1998), pp. 79-82

  •  

    Protection in Programming-Language Translations

    Martín Abadi

    ICALP (1998), pp. 868-883

  •  

    Protection in Programming-Language Translations: Mobile Object Systems (Abstract)

    Martín Abadi

    ECOOP Workshops (1998), pp. 291

  •  

    Secure Implementation of Channel Abstractions

    Martín Abadi, Cédric Fournet, Georges Gonthier

    LICS (1998), pp. 105-116

  •  

    Secure Web Tunneling

    Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber

    Computer Networks, vol. 30 (1998), pp. 531-539

  •  

    Two Facets of Authentication

    Martín Abadi

    CSFW (1998), pp. 27-32

  •  

    A Calculus for Cryptographic Protocols: The Spi Calculus

    Martín Abadi, Andrew D. Gordon

    ACM Conference on Computer and Communications Security (1997), pp. 36-47

  •  

    A Logic of Object-Oriented Programs

    Martín Abadi, K. Rustan M. Leino

    TAPSOFT (1997), pp. 682-696

  •  

    Explicit Communication Revisited: Two New Attacks on Authentication Protocols

    Martín Abadi

    IEEE Trans. Software Eng., vol. 23 (1997), pp. 185-186

  •  

    On SDSI's Linked Local Name Spaces

    Martín Abadi

    CSFW (1997), pp. 98-108

  •  

    Reasoning about Cryptographic Protocols in the Spi Calculus

    Martín Abadi, Andrew D. Gordon

    CONCUR (1997), pp. 59-73

  •  

    Secrecy by Typing inSecurity Protocols

    Martín Abadi

    TACS (1997), pp. 611-638

  •  

    Secure Implementation of Channel Abstractions

    Martín Abadi, Cédric Fournet, Georges Gonthier

    Electr. Notes Theor. Comput. Sci., vol. 10 (1997), pp. 202-203

  •  

    A Theory of Objects

    Martín Abadi, Luca Cardelli

    Springer (1996), I-XIII, 1-396

  •  

    A Theory of Primitive Objects: Untyped and First-Order Systems

    Martín Abadi, Luca Cardelli

    Inf. Comput., vol. 125 (1996), pp. 78-102

  •  

    An Interpretation of Objects and Object Types

    Martín Abadi, Luca Cardelli, Ramesh Viswanathan

    POPL (1996), pp. 396-409

  •  

    Analysis and Caching of Dependencies

    Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy

    ICFP (1996), pp. 83-91

  •  

    On Subtyping and Matching

    Martín Abadi, Luca Cardelli

    ACM Trans. Program. Lang. Syst., vol. 18 (1996), pp. 401-423

  •  

    On TLA as a logic

    Martín Abadi, Stephan Merz

    NATO ASI DPD (1996), pp. 235-271

  •  

    Prudent Engineering Practice for Cryptographic Protocols

    Martín Abadi, Roger M. Needham

    IEEE Trans. Software Eng., vol. 22 (1996), pp. 6-15

  •  

    Secure Network Objects

    Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber

    IEEE Symposium on Security and Privacy (1996), pp. 211-221

  •  

    Syntactic Considerations on Recursive Types

    Martín Abadi, Marcelo P. Fiore

    LICS (1996), pp. 242-252

  •  

    A Model for Formal Parametric Polymorphism: A PER Interpretation for System R

    Roberto Bellucci, Martín Abadi, Pierre-Louis Curien

    TLCA (1995), pp. 32-46

  •  

    A Theory of Primitive Objects: Second-Order Systems

    Martín Abadi, Luca Cardelli

    Sci. Comput. Program., vol. 25 (1995), pp. 81-116

  •  

    An Abstract Account of Composition

    Martín Abadi, Stephan Merz

    MFCS (1995), pp. 499-508

  •  

    An Imperative Object Calculus

    Martín Abadi, Luca Cardelli

    TAPSOFT (1995), pp. 471-485

  •  

    An Imperative Object Calculus (Invited Paper)

    Martín Abadi, Luca Cardelli

    TAPOS, vol. 1 (1995), pp. 151-166

  •  

    Conjoining Specifications

    Martín Abadi, Leslie Lamport

    ACM Trans. Program. Lang. Syst., vol. 17 (1995), pp. 507-534

  •  

    Dynamic Typing in Polymorphic Languages

    Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy

    J. Funct. Program., vol. 5 (1995), pp. 111-130

  •  

    Methods as Assertions

    John Lamping, Martín Abadi

    TAPOS, vol. 1 (1995), pp. 5-18

  •  

    On Subtyping and Matching

    Martín Abadi, Luca Cardelli

    ECOOP (1995), pp. 145-167

  •  

    A Semantics for Static Type Inference in a Nondeterministic Language

    Martín Abadi

    Inf. Comput., vol. 109 (1994), pp. 300-306

  •  

    A Semantics of Object Types

    Martín Abadi, Luca Cardelli

    LICS (1994), pp. 332-341

  •  

    A TLA Solution to the RPC-Memory Specification Problem

    Martín Abadi, Leslie Lamport, Stephan Merz

    Formal Systems Specification (1994), pp. 21-66

  •  

    A Theory of Primitive Objects - Scond-Order Systems

    Martín Abadi, Luca Cardelli

    ESOP (1994), pp. 1-25

  •  

    A Theory of Primitive Objects - Untyped and First-Order Systems

    Martín Abadi, Luca Cardelli

    TACS (1994), pp. 296-320

  •  

    An Old-Fashined Recipe for Real-Time

    Martín Abadi, Leslie Lamport

    ACM Trans. Program. Lang. Syst., vol. 16 (1994), pp. 1543-1571

  •  

    Authentication in the Taos Operating System

    Edward Wobber, Martín Abadi, Michael Burrows

    ACM Trans. Comput. Syst., vol. 12 (1994), pp. 3-32

  •  

    Baby Modula-3 and a Theory of Objects

    Martín Abadi

    J. Funct. Program., vol. 4 (1994), pp. 249-283

  •  

    Decidability and Expressiveness for First-Order Logics of Probability

    Martín Abadi, Joseph Y. Halpern

    Inf. Comput., vol. 112 (1994), pp. 1-36

  •  

    Decomposing Specifications of Concurrent Systems

    Martín Abadi, Leslie Lamport

    PROCOMET (1994), pp. 327-340

  •  

    Methods as Assertions

    John Lamping, Martín Abadi

    ECOOP (1994), pp. 60-80

  •  

    Open Systems in TLA

    Martín Abadi, Leslie Lamport

    PODC (1994), pp. 81-90

  •  

    Prudent engineering practice for cryptographic protocols

    Martín Abadi, Roger M. Needham

    IEEE Symposium on Security and Privacy (1994), pp. 122-136

  •  

    Subtyping and Parametricity

    Gordon D. Plotkin, Martín Abadi, Luca Cardelli

    LICS (1994), pp. 310-319

  •  

    A Calculus for Access Control in Distributed Systems

    Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin

    ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 706-734

  •  

    A Logic for Parametric Polymorphism

    Gordon D. Plotkin, Martín Abadi

    TLCA (1993), pp. 361-375

  •  

    A Logical View of Composition

    Martín Abadi, Gordon D. Plotkin

    Theor. Comput. Sci., vol. 114 (1993), pp. 3-30

  •  

    Authentication in the Taos Operating System

    Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson

    SOSP (1993), pp. 256-269

  •  

    Authentification and Delegation with Smart-Cards

    Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson

    Sci. Comput. Program., vol. 21 (1993), pp. 93-113

  •  

    Composing Specifications

    Martín Abadi, Leslie Lamport

    ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 73-132

  •  

    Extensible Grammars for Language Specialization

    Luca Cardelli, Florian Matthes, Martín Abadi

    DBPL (1993), pp. 11-31

  •  

    Formal Parametric Polymorphism

    Martín Abadi, Luca Cardelli, Pierre-Louis Curien

    Theor. Comput. Sci., vol. 121 (1993), pp. 9-58

  •  

    Formal Parametric Polymorphism

    Martín Abadi, Luca Cardelli, Pierre-Louis Curien

    POPL (1993), pp. 157-170

  •  

    Authentication in Distributed Systems: Theory and Practice

    Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber

    ACM Trans. Comput. Syst., vol. 10 (1992), pp. 265-310

  •  

    Linear Logic Without Boxes

    Georges Gonthier, Martín Abadi, Jean-Jacques Lévy

    LICS (1992), pp. 223-234

  •  

    The Geometry of Optimal Lambda Reduction

    Georges Gonthier, Martín Abadi, Jean-Jacques Lévy

    POPL (1992), pp. 15-26

  •  

    A Calculus for Access Control in Distributed Systems

    Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin

    CRYPTO (1991), pp. 1-23

  •  

    A Logical View of Composition and Refinement

    Martín Abadi, Gordon D. Plotkin

    POPL (1991), pp. 323-332

  •  

    A Semantics for a Logic of Authentication (Extended Abstract)

    Martín Abadi, Mark R. Tuttle

    PODC (1991), pp. 201-216

  •  

    An Old-Fashioned Recipe for Real Time

    Martín Abadi, Leslie Lamport

    REX Workshop (1991), pp. 1-27

  •  

    Authentication and Delegation with Smart-cards

    Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson

    TACS (1991), pp. 326-345

  •  

    Authentication in Distributed Systems: Theory and Practice

    Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber

    SOSP (1991), pp. 165-182

  •  

    Dynamic Typing in a Statically Typed Language

    Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin

    ACM Trans. Program. Lang. Syst., vol. 13 (1991), pp. 237-268

  •  

    Explicit Substitutions

    Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy

    J. Funct. Program., vol. 1 (1991), pp. 375-416

  •  

    Faithful Ideal Models for Recursive Polymorphic Types

    Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin

    Int. J. Found. Comput. Sci., vol. 2 (1991), pp. 1-21

  •  

    Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''

    Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider

    Inf. Process. Lett., vol. 40 (1991), pp. 141-142

  •  

    The Existence of Refinement Mappings

    Martín Abadi, Leslie Lamport

    Theor. Comput. Sci., vol. 82 (1991), pp. 253-284

  •  

    A Logic of Authentication

    Michael Burrows, Martín Abadi, Roger M. Needham

    ACM Trans. Comput. Syst., vol. 8 (1990), pp. 18-36

  •  

    A Per Model of Polymorphism and Recursive Types

    Martín Abadi, Gordon D. Plotkin

    LICS (1990), pp. 355-365

  •  

    An Axiomatization of Lamport's Temporal Logic of Actions

    Martín Abadi

    CONCUR (1990), pp. 57-69

  •  

    Corrigendum: The Power of Temporal Proofs

    Martín Abadi

    Theor. Comput. Sci., vol. 70 (1990), pp. 275

  •  

    Explicit Substitutions

    Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy

    POPL (1990), pp. 31-46

  •  

    Nonclausal Deduction in First-Order Temporal Logic

    Martín Abadi, Zohar Manna

    J. ACM, vol. 37 (1990), pp. 279-317

  •  

    Rejoinder to Nessett

    Michael Burrows, Martín Abadi, Roger M. Needham

    Operating Systems Review, vol. 24 (1990), pp. 39-40

  •  

    Secure Circuit Evaluation

    Martín Abadi, Joan Feigenbaum

    J. Cryptology, vol. 2 (1990), pp. 1-12

  •  

    A Logic of Authentication

    Michael Burrows, Martín Abadi, Roger M. Needham

    SOSP (1989), pp. 1-13

  •  

    Composing Specifications

    Martín Abadi, Leslie Lamport

    REX Workshop (1989), pp. 1-41

  •  

    Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)

    Martín Abadi, Joseph Y. Halpern

    FOCS (1989), pp. 148-153

  •  

    Dynamic Typing in a Statically-Typed Language

    Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin

    POPL (1989), pp. 213-227

  •  

    Faithful Ideal Models for Recursive Polymorphic Types

    Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin

    LICS (1989), pp. 216-225

  •  

    On Hiding Information from an Oracle

    Martín Abadi, Joan Feigenbaum, Joe Kilian

    J. Comput. Syst. Sci., vol. 39 (1989), pp. 21-50

  •  

    Realizable and Unrealizable Specifications of Reactive Systems

    Martín Abadi, Leslie Lamport, Pierre Wolper

    ICALP (1989), pp. 1-17

  •  

    Temporal Logic Programming

    Martín Abadi, Zohar Manna

    J. Symb. Comput., vol. 8 (1989), pp. 277-295

  •  

    The Power of Temporal Proofs

    Martín Abadi

    Theor. Comput. Sci., vol. 65 (1989), pp. 35-83

  •  

    A Simple Protocol for Secure Circuit Evaluation

    Martín Abadi, Joan Feigenbaum

    STACS (1988), pp. 264-272

  •  

    Authentication: A Practical Study in Belief and Action

    Michael Burrows, Martín Abadi, Roger M. Needham

    TARK (1988), pp. 325-342

  •  

    On Generating Solved Instances of Computational Problems

    Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra

    CRYPTO (1988), pp. 297-310

  •  

    The Existence of Refinement Mappings

    Martín Abadi, Leslie Lamport

    LICS (1988), pp. 165-175

  •  

    On Hiding Information from an Oracle (Extended Abstract)

    Martín Abadi, Joan Feigenbaum, Joe Kilian

    STOC (1987), pp. 195-203

  •  

    On hiding information from an oracle

    Martín Abadi, Joan Feigenbaum, Joe Kilian

    Structure in Complexity Theory Conference (1987)

  •  

    Temporal Logic Programming

    Martín Abadi, Zohar Manna

    SLP (1987), pp. 4-16

  •  

    The Power of Temporal Proofs

    Martín Abadi

    LICS (1987), pp. 123-130

  •  

    A Timely Resolution

    Martín Abadi, Zohar Manna

    LICS (1986), pp. 176-186

  •  

    Modal Theorem Proving

    Martín Abadi, Zohar Manna

    CADE (1986), pp. 172-189

  •  

    Nonclausal Temporal Deduction

    Martín Abadi, Zohar Manna

    Logic of Programs (1985), pp. 1-15