The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Burrows: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (2, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1993, v:15, n:4, pp:706-734 [Journal]
  2. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:18-36 [Journal]
  3. Michael D. Schroeder, Michael Burrows
    Performance of Firefly RPC. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:1-17 [Journal]
  4. Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber
    Bankable Postage for Network Services. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2003, pp:72-90 [Conf]
  5. Michael Burrows, Ulfar Erlingson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl
    Efficient and Flexible Value Sampling. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:160-167 [Conf]
  6. Michael Burrows, Charles Jerian, Butler W. Lampson, Timothy Mann
    On-Line Data Compression in a Log-Structured File System. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1992, pp:2-9 [Conf]
  7. Michael Burrows, Stephen N. Freund, Janet L. Wiener
    Run-Time Type Checking for Binary Programs. [Citation Graph (0, 0)][DBLP]
    CC, 2003, pp:90-105 [Conf]
  8. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:1-23 [Conf]
  9. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:395-412 [Conf]
  10. Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibridge, John MacCormick, Erwin Oertli, David G. Andersen, Michael Burrows, Timothy Mann, Chandramohan A. Thekkath
    Block-Level Security for Network-Attached Disks. [Citation Graph (0, 0)][DBLP]
    FAST, 2003, pp:- [Conf]
  11. Matthias Hausner, Michael Burrows, Chandramohan A. Thekkath
    Efficient implementation of PVM on the AN2 ATM network. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1995, pp:562-569 [Conf]
  12. Daniel J. Scales, Michael Burrows, Chandramohan A. Thekkath
    Experience with Parallel Computing on the AN2 Network. [Citation Graph (0, 0)][DBLP]
    IPPS, 1996, pp:94-103 [Conf]
  13. Martín Abadi, Michael Burrows, Ted Wobber
    Moderately Hard, Memory-Bound Functions. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  14. Michael Burrows
    The Chubby Lock Service for Loosely-Coupled Distributed Systems. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:335-350 [Conf]
  15. Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert Gruber
    Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:205-218 [Conf]
  16. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:1-13 [Conf]
  17. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    SOSP, 1991, pp:165-182 [Conf]
  18. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson
    Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:27-37 [Conf]
  19. Michael D. Schroeder, Michael Burrows
    Performance of Firefly RPC. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:83-90 [Conf]
  20. Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
    Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1993, pp:256-269 [Conf]
  21. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:211-221 [Conf]
  22. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentication and Delegation with Smart-cards. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:326-345 [Conf]
  23. Michael Burrows, Martín Abadi, Roger M. Needham
    Authentication: A Practical Study in Belief and Action. [Citation Graph (0, 0)][DBLP]
    TARK, 1988, pp:325-342 [Conf]
  24. Mark Lillibridge, Sameh Elnikety, Andrew Birrell, Michael Burrows, Michael Isard
    A Cooperative Internet Backup Scheme. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:29-41 [Conf]
  25. Michael Burrows, K. Rustan M. Leino
    Finding stale-value errors in concurrent programs. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:12, pp:1161-1172 [Journal]
  26. Michael D. Schroeder, Andrew Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, Charles P. Thacker
    Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1991, v:9, n:8, pp:1318-1335 [Journal]
  27. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentification and Delegation with Smart-Cards. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1993, v:21, n:2, pp:93-113 [Journal]
  28. Michael Burrows, Martín Abadi, Roger M. Needham
    Rejoinder to Nessett. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1990, v:24, n:2, pp:39-40 [Journal]
  29. Roger M. Needham, Michael Burrows
    Locks in Distributed Systems - Observations. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:44- [Journal]
  30. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal]
  31. Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas E. Anderson
    Eraser: A Dynamic Data Race Detector for Multithreaded Programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1997, v:15, n:4, pp:391-411 [Journal]
  32. Edward Wobber, Martín Abadi, Michael Burrows
    Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:3-32 [Journal]
  33. Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber
    Moderately hard, memory-bound functions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2005, v:5, n:2, pp:299-327 [Journal]

Search in 0.033secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002