Travelled to:
1 × Austria
1 × Canada
1 × Finland
1 × Hungary
1 × Sweden
2 × Denmark
2 × Germany
2 × Portugal
2 × Spain
3 × France
3 × Italy
3 × The Netherlands
33 × USA
8 × United Kingdom
Collaborated with:
∅ L.Cardelli G.D.Plotkin B.Blanchet C.Fournet G.Gonthier Z.Manna B.Warinschi J.Lévy T.Harris P.Curien B.W.Lampson M.Burrows L.Lamport M.Isard B.C.Pierce F.McSherry D.Garg V.Cortier C.Flanagan A.D.Gordon R.Stata M.P.Fiore J.Lamping E.Wobber K.R.M.Leino A.Birrell R.Isaacs G.M.Bierman M.Torgersen H.Comon-Lundh M.Mehrara M.Baudet B.Werner R.Viswanathan R.Bellucci P.Wolper R.M.Needham J.Feigenbaum J.Kilian R.McIlroy A.Banerjee N.Heintze J.G.Riecke J.Hsieh Ú.Erlingsson M.Vrable M.Budiu G.C.Necula D.G.Murray P.Barham
Talks about:
type (12) secur (11) system (9) logic (9) object (8) protocol (7) polymorph (5) program (5) model (5) parametr (4)
Person: Martín Abadi
DBLP: Abadi:Mart=iacute=n
Facilitated 1 volumes:
Contributed to:
Wrote 69 papers:
- CSL-2015-Abadi
- The Prophecy of Timely Rollback (MA), p. 1.
- FASE-2015-Abadi #undo
- The Prophecy of Undo (MA), pp. 347–361.
- FoSSaCS-2015-AbadiMP #data flow #difference
- Foundations of Differential Dataflow (MA, FM, GDP), pp. 71–83.
- ECOOP-2014-BiermanAT #comprehension #typescript
- Understanding TypeScript (GMB, MA, MT), pp. 257–281.
- SOSP-2013-MurrayMIIBA #data flow #named
- Naiad: a timely dataflow system (DGM, FM, RI, MI, PB, MA), pp. 439–455.
- FM-2012-Abadi #formal method #security
- Software Security: A Formal Perspective — (Notes for a Talk) (MA), pp. 1–5.
- OOPSLA-2011-HarrisAIM #composition #named
- AC: composable asynchronous IO for native languages (TH, MA, RI, RM), pp. 903–920.
- LICS-2010-Abadi #security
- The Fine Print of Security (MA), p. 110.
- CAV-2009-AbadiBC #modelling #protocol #proving #security
- Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
- CC-2009-AbadiBHHI #implementation #memory management #transaction #using
- Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
- POPL-2009-AbadiP #thread
- A model of cooperative threads (MA, GDP), pp. 29–40.
- PPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction #using
- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
- FoSSaCS-2008-GargA #data access #logic
- A Modal Deconstruction of Access Control Logics (DG, MA), pp. 216–230.
- POPL-2008-AbadiBHI #automation #memory management #semantics #transaction
- Semantics of transactional memory and automatic mutual exclusion (MA, AB, TH, MI), pp. 63–74.
- FoSSaCS-2006-AbadiBW #equivalence
- Guessing Attacks and the Computational Soundness of Static Equivalence (MA, MB, BW), pp. 398–412.
- ICFP-2006-Abadi #calculus #data access #dependence
- Access control in a core calculus of dependency (MA), pp. 263–273.
- OSDI-2006-ErlingssonAVBN #named
- XFI: Software Guards for System Address Spaces (ÚE, MA, MV, MB, GCN), pp. 75–88.
- ICALP-2005-AbadiW #encryption
- Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
- LICS-2005-BlanchetAF #automation #protocol #security #verification
- Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
- PODS-2005-AbadiW #analysis #documentation #encryption #security #xml
- Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
- ESOP-2004-AbadiBF #performance #π-calculus
- Just Fast Keying in the π Calculus (MA, BB, CF), pp. 340–354.
- FoSSaCS-2004-AbadiGW
- Choice in Dynamic Linking (MA, GG, BW), pp. 12–26.
- ICALP-2004-AbadiC #equation #protocol #security
- Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
- ECOOP-2003-Abadi #security
- Built-in Object Security (MA), p. 1.
- LICS-2003-Abadi #data access #logic
- Logic in Access Control (MA), p. 228–?.
- SAS-2003-AbadiB #email #protocol #verification
- Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
- POPL-2002-AbadiB #logic programming #protocol #security #source code
- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
- FoSSaCS-2001-AbadiB #communication #symmetry
- Secrecy Types for Asymmetric Communication (MA, BB), pp. 25–41.
- POPL-2001-AbadiF #communication #mobile
- Mobile values, new names, and secure communication (MA, CF), pp. 104–115.
- POPL-2000-AbadiFG #authentication #compilation
- Authentication Primitives and Their Compilation (MA, CF, GG), pp. 302–315.
- ESOP-1999-FlanaganA
- Types for Safe Locking (CF, MA), pp. 91–108.
- FoSSaCS-1999-Abadi #protocol #security #specification
- Security Protocols and Specifications (MA), pp. 1–13.
- POPL-1999-AbadiBHR #calculus #dependence
- A Core Calculus of Dependency (MA, AB, NH, JGR), pp. 147–160.
- ESOP-1998-AbadiG #bisimulation #encryption #protocol
- A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
- ICALP-1998-Abadi
- Protection in Programming-Language Translations (MA), pp. 868–883.
- LICS-1998-AbadiFG #abstraction #implementation
- Secure Implementation of Channel Abstractions (MA, CF, GG), pp. 105–116.
- POPL-1998-StataA #bytecode #java #type system
- A Type System for Java Bytecode Subroutines (RS, MA), pp. 149–160.
- ICFP-1996-AbadiLL #analysis #dependence
- Analysis and Caching of Dependencies (MA, BWL, JJL), pp. 83–91.
- LICS-1996-AbadiF #recursion
- Syntactic Considerations on Recursive Types (MA, MPF), pp. 242–252.
- POPL-1996-AbadiCV
- An Interpretation of Objects and Object Types (MA, LC, RV), pp. 396–409.
- ECOOP-1995-AbadiC #on the #type system
- On Subtyping and Matching (MA, LC), pp. 145–167.
- TLCA-1995-BellucciAC #morphism #parametricity #polymorphism
- A Model for Formal Parametric Polymorphism: A PER Interpretation for System R (RB, MA, PLC), pp. 32–46.
- ECOOP-1994-LampingA
- Methods as Assertions (JL, MA), pp. 60–80.
- ESOP-1994-AbadiC #formal method
- A Theory of Primitive Objects — Scond-Order Systems (MA, LC), pp. 1–25.
- ESOP-J-1994-AbadiC95 #formal method #higher-order
- A Theory of Primitive Objects: Second-Order Systems (MA, LC), pp. 81–116.
- LICS-1994-AbadiC #semantics
- A Semantics of Object Types (MA, LC), pp. 332–341.
- LICS-1994-PlotkinAC #parametricity #type system
- Subtyping and Parametricity (GDP, MA, LC), pp. 310–319.
- POPL-1993-AbadiCC #morphism #parametricity #polymorphism
- Formal Parametric Polymorphism (MA, LC, PLC), pp. 157–170.
- SOSP-1993-WobberABL #authentication #operating system
- Authentication in the Taos Operating System (EW, MA, MB, BWL), pp. 256–269.
- TLCA-1993-PlotkinA #logic #morphism #parametricity #polymorphism
- A Logic for Parametric Polymorphism (GDP, MA), pp. 361–375.
- LICS-1992-GonthierAL #linear #logic
- Linear Logic Without Boxes (GG, MA, JJL), pp. 223–234.
- POPL-1992-GonthierAL #geometry #reduction
- The Geometry of Optimal λ Reduction (GG, MA, JJL), pp. 15–26.
- POPL-1991-AbadiP #composition #logic #refinement
- A Logical View of Composition and Refinement (MA, GDP), pp. 323–332.
- SOSP-1991-LampsonABW #authentication #distributed #theory and practice
- Authentication in Distributed Systems: Theory and Practice (BWL, MA, MB, EW), pp. 165–182.
- LICS-1990-AbadiP #morphism #polymorphism #recursion
- A Per Model of Polymorphism and Recursive Types (MA, GDP), pp. 355–365.
- POPL-1990-AbadiCCL
- Explicit Substitutions (MA, LC, PLC, JJL), pp. 31–46.
- ICALP-1989-AbadiLW #specification
- Realizable and Unrealizable Specifications of Reactive Systems (MA, LL, PW), pp. 1–17.
- LICS-1989-AbadiPP #modelling #polymorphism #recursion
- Faithful Ideal Models for Recursive Polymorphic Types (MA, BCP, GDP), pp. 216–225.
- POPL-1989-AbadiCPP #dynamic typing #static typing #type system
- Dynamic Typing in a Statically-Typed Language (MA, LC, BCP, GDP), pp. 213–227.
- SOSP-1989-BurrowsAN #authentication #logic
- A Logic of Authentication (MB, MA, RMN), pp. 1–13.
- LICS-1988-AbadiL #refinement
- The Existence of Refinement Mappings (MA, LL), pp. 165–175.
- LICS-1987-Abadi #power of #proving
- The Power of Temporal Proofs (MA), pp. 123–130.
- SLP-1987-AbadiM87 #logic programming
- Temporal Logic Programming (MA, ZM), pp. 4–16.
- STOC-1987-AbadiFK #on the
- On Hiding Information from an Oracle (MA, JF, JK), pp. 195–203.
- CADE-1986-AbadiM #proving #theorem proving
- Modal Theorem Proving (MA, ZM), pp. 172–189.
- LICS-1986-AbadiM
- A Timely Resolution (MA, ZM), pp. 176–186.
- TAPSOFT-1995-AbadiC #calculus #imperative
- An Imperative Object Calculus (MA, LC), pp. 471–485.
- TAPSOFT-1997-AbadiL #logic #object-oriented #source code
- A Logic of Object-Oriented Programs (MA, KRML), pp. 682–696.
- POPL-2020-AbadiP #programming language
- A simple differentiable programming language (MA, GDP), p. 28.