Martin Abadi - Publications

Affiliations: 
University of California, Santa Cruz, Santa Cruz, CA, United States 
Area:
Computer Science

57 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Abadi M, Blanchet B, Fournet C. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication Journal of the Acm. 65: 1-103. DOI: 10.1145/3127586  0.461
2016 Murray DG, McSherry F, Isard M, Isaacs R, Barham P, Abadi M. Incremental, iterative data processing with timely dataflow Communications of the Acm. 59: 75-83. DOI: 10.1145/2983551  0.306
2013 Abadi M, Planul J, Plotkin G. Layout randomization and nondeterminism Electronic Notes in Theoretical Computer Science. 298: 29-50. DOI: 10.1016/J.Entcs.2013.09.006  0.378
2011 Abadi M, Birrell A, Harris T, Isard M. Semantics of transactional memory and automatic mutual exclusion Acm Transactions On Programming Languages and Systems. 33: 2. DOI: 10.1145/1889997.1889999  0.42
2010 Baudet M, Warinschi B, Abadi M. Guessing attacks and the computational soundness of static equivalence Journal of Computer Security. 18: 909-968. DOI: 10.3233/Jcs-2009-0386  0.323
2010 Abadi M, Plotkin G. On protection by layout randomization Proceedings - Ieee Computer Security Foundations Symposium. 337-351. DOI: 10.1145/2240276.2240279  0.418
2010 Abadi M, Harris T, Moore KF. A model of dynamic separation for transactional memory Information & Computation. 208: 1093-1117. DOI: 10.1016/J.Ic.2009.09.004  0.306
2009 Abadi M, Plotkin G. A model of cooperative threads Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 29-40. DOI: 10.2168/Lmcs-6(4:2)2010  0.407
2009 Abadi M. Logic in access control (tutorial notes) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5705: 145-165. DOI: 10.1007/978-3-642-03829-7_5  0.317
2008 Abadi M. Variations in access control logic Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5076: 96-109. DOI: 10.1007/978-3-540-70525-3_9  0.331
2007 Abadi M, Blanchet B, Fournet C. Just fast keying in the pi calculus Acm Transactions On Information and System Security. 10: 9. DOI: 10.1145/1266977.1266978  0.405
2007 Abadi M, Rogaway P. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Journal of Cryptology. 20: 395-395. DOI: 10.1007/S00145-007-0203-0  0.327
2006 Abadi M, Flanagan C, Freund SN. Types for safe locking: Static race detection for Java Acm Transactions On Programming Languages and Systems. 28: 207-255. DOI: 10.1145/1119479.1119480  0.368
2006 Abadi M. Access control in a core calculus of dependency Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 2006: 263-273. DOI: 10.1016/J.Entcs.2007.02.002  0.384
2006 Abadi M, Corin R, Fournet C. Computational secrecy by typing for the Pi calculus Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4279: 253-269.  0.318
2005 Abadi M, Budiu M, Erlingsson U, Ligatti J. Control-flow integrity: Principles, implementations, and applications Proceedings of the Acm Conference On Computer and Communications Security. 340-353. DOI: 10.1145/1609956.1609960  0.377
2005 Abadi M, Warinschi B. Security analysis of cryptographically controlled access to XML documents Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 108-117. DOI: 10.1145/1346330.1346331  0.388
2005 Abadi M, Morrisett G, Sabelfeld A. Language-Based Security Journal of Functional Programming. 15: 129. DOI: 10.1017/S0956796804005428  0.44
2005 Abadi M, Blanchet B. Computer-assisted verification of a protocol for certified email Science of Computer Programming. 58: 3-27. DOI: 10.1016/J.Scico.2005.02.002  0.384
2005 Blanchet B, Abadi M, Fournet C. Automated verification of selected equivalences for security protocols Proceedings - Symposium On Logic in Computer Science. 331-340. DOI: 10.1016/J.Jlap.2007.06.002  0.328
2005 Abadi M, Warinschi B. Password-based encryption analyzed Lecture Notes in Computer Science. 3580: 664-676.  0.323
2005 Whitehead N, Abadi M. BCiC: A system for code authentication and verification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3452: 110-124.  0.571
2004 Abadi M, Cortier V. Deciding knowledge in security protocols under equational theories Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3142: 46-58. DOI: 10.1016/J.Tcs.2006.08.032  0.362
2004 Abadi M, Wobber T. A logical account of NGSCB Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3235: 1-12.  0.302
2003 Kakkar P, Gunter CA, Abadi M. Reasoning about secrecy for active networks Journal of Computer Security. 11: 245-287. DOI: 10.3233/Jcs-2003-11205  0.352
2003 Abadi M, Blanchet B. Secrecy types for asymmetric communication Theoretical Computer Science. 298: 387-415. DOI: 10.1016/S0304-3975(02)00863-0  0.342
2003 Abadi M. Private authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2482: 27-40. DOI: 10.1016/J.Tcs.2003.12.023  0.371
2002 Abadi M, Blanchet B. Analyzing security protocols with secrecy types and logic programs Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 33-44. DOI: 10.1145/1044731.1044735  0.441
2002 Abadi M, Fournet C, Gonthier G. Secure implementation of channel abstractions Information & Computation. 174: 37-83. DOI: 10.1006/Inco.2002.3086  0.415
2001 Abadi M, Jürjens J. Formal eavesdropping and its computational interpretation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2215: 82-94.  0.339
2000 Abadi M. closed relations and admissibility Mathematical Structures in Computer Science. 10: 313-320. DOI: 10.1017/S0960129500003054  0.33
1999 Stata R, Abadi M. A type system for Java bytecode subroutines Acm Transactions On Programming Languages and Systems. 21: 90-137. DOI: 10.1145/314602.314606  0.386
1999 Abadi M. Secrecy in programming-language semantics Electronic Notes in Theoretical Computer Science. 20: 80-94. DOI: 10.1016/S1571-0661(04)80068-9  0.396
1999 Abadi M, Fournet C, Gonthier G. A top-down look at a secure message Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1738: 122-141. DOI: 10.1007/3-540-46691-6_10  0.314
1999 Abadi M, Gordon AD. A calculus for cryptographic protocols Information & Computation. 148: 1-70. DOI: 10.1006/Inco.1998.2740  0.378
1999 Abadi M. Protection in programming-language translations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1603: 19-34.  0.326
1998 Abadi M, Fournet C, Gonthier G. Secure Implementation of Channel Abstractions (Abstract) Electronic Notes in Theoretical Computer Science. 10: 202-203. DOI: 10.1016/S1571-0661(05)82514-9  0.319
1998 Abadi M. Protection in programming-language translations: Mobile object systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1543: 291.  0.334
1998 Abadi M. Protection in programming-langiiage translations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1443: 868-883.  0.303
1997 Abadi M. Secrecy by typing in security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1281: 611-638. DOI: 10.1145/324133.324266  0.434
1997 Abadi M. Explicit communication revisited: Two new attacks on authentication protocols Ieee Transactions On Software Engineering. 23: 185-186. DOI: 10.1109/32.585505  0.383
1995 Abadi M, Cardelli L. On subtyping and matching Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 952: 145-167. DOI: 10.1145/233561.233563  0.348
1995 Abadi M, Cardelli L, Pierce B, RéMY D. Dynamic typing in polymorphic languages Journal of Functional Programming. 5: 111-130. DOI: 10.1017/S095679680000126X  0.333
1994 Abadi M, Lamport L. An Old-Fashioned Recipe for Real Time Acm Transactions On Programming Languages and Systems (Toplas). 16: 1543-1571. DOI: 10.1145/186025.186058  0.333
1994 Abadi M. Baby Modula-3 and a theory of objects Journal of Functional Programming. 4: 249-283. DOI: 10.1017/S0956796800001052  0.357
1994 Abadi M, Halpern JY. Decidability and Expressiveness for First-Order Logics of Probability Information and Computation. 112: 1-36. DOI: 10.1006/Inco.1994.1049  0.363
1993 Abadi M, Burrows M, Lampson B, Plotkin G. A calculus for access control in distributed systems Acm Transactions On Programming Languages and Systems. 15: 706-734. DOI: 10.1145/155183.155225  0.359
1993 Abadi M, Lamport L. Composing Specifications Acm Transactions On Programming Languages and Systems (Toplas). 15: 73-132. DOI: 10.1145/151646.151649  0.302
1993 Abadi M, Plotkin GD. A logical view of composition Theoretical Computer Science. 114: 3-30. DOI: 10.1016/0304-3975(93)90151-I  0.32
1992 Lampson B, Abadi M, Burrows M, Wobber E. Authentication in distributed systems: theory and practice Acm Transactions On Computer Systems. 10: 265-310. DOI: 10.1145/138873.138874  0.353
1991 Abadi M, Alpern B, Apt KR, Francez N, Katz S, Lamport L, Schneider FB. Preserving liveness: Comments on "safety and liveness from a methodological point of view", Information Processing Letters. 40: 141-142. DOI: 10.1016/0020-0190(91)90168-H  0.344
1990 Abadi M, Manna Z. Nonclausal Deduction in First-Order Temporal Logic Journal of the Acm (Jacm). 37: 279-317. DOI: 10.1145/77600.77617  0.349
1990 Burrows M, Abadi M, Needham R. A logic of Authentication Acm Transactions On Computer Systems (Tocs). 8: 18-36. DOI: 10.1098/Rspa.1989.0125  0.404
1989 Abadi M, Cardelli L, Pierce B, Plotkin G. Dynamic typing in a statically-typed language . 213-227. DOI: 10.1145/103135.103138  0.386
1989 Abadi M, Pierce B, Plotkin G. Faithful ideal models for recursive polymorphic types . 216-225. DOI: 10.1142/S0129054191000029  0.345
1989 Abadi M, Manna Z. Temporal logic programming Journal of Symbolic Computation. 8: 277-295. DOI: 10.1016/S0747-7171(89)80070-7  0.372
1989 Abadi M. The power of temporal proofs Theoretical Computer Science. 65: 35-83. DOI: 10.1016/0304-3975(89)90138-2  0.339
Show low-probability matches.