Search the dblp DataBase
Andrew D. Gordon :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Martín Abadi , Andrew D. Gordon A Calculus for Cryptographic Protocols: The Spi Calculus. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:36-47 [Conf ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon Verifying policy-based security for web services. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:268-277 [Conf ] Martín Abadi , Andrew D. Gordon Reasoning about Cryptographic Protocols in the Spi Calculus. [Citation Graph (0, 0)][DBLP ] CONCUR, 1997, pp:59-73 [Conf ] Luca Cardelli , Giorgio Ghelli , Andrew D. Gordon Secrecy and Group Creation. [Citation Graph (0, 0)][DBLP ] CONCUR, 2000, pp:365-379 [Conf ] Andrew D. Gordon Types for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CONCUR, 2002, pp:99-100 [Conf ] Andrew D. Gordon , Alan Jeffrey Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. [Citation Graph (0, 0)][DBLP ] CONCUR, 2005, pp:186-201 [Conf ] Frédéric Besson , Tomasz Blanc , Cédric Fournet , Andrew D. Gordon From Stack Inspection to Access Control: A Security Analysis for Libraries. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:61-0 [Conf ] Andrew D. Gordon , Alan Jeffrey Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:145-159 [Conf ] Andrew D. Gordon , Alan Jeffrey Types and Effects for Asymmetric Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:77-91 [Conf ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon , Stephen Tse Verified Interoperable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:139-152 [Conf ] Roy L. Crole , Andrew D. Gordon A Sound Metalogical Semantics for Input/Output Effects. [Citation Graph (0, 0)][DBLP ] CSL, 1994, pp:339-353 [Conf ] Martín Abadi , Andrew D. Gordon A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] ESOP, 1998, pp:12-26 [Conf ] Witold Charatonik , Andrew D. Gordon , Jean-Marc Talbot Finite-Control Mobile Ambients. [Citation Graph (0, 0)][DBLP ] ESOP, 2002, pp:295-313 [Conf ] Cédric Fournet , Andrew D. Gordon , Sergio Maffeis A Type Discipline for Authorization Policies. [Citation Graph (0, 0)][DBLP ] ESOP, 2005, pp:141-156 [Conf ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon , Riccardo Pucella TulaFale: A Security Tool for Web Services. [Citation Graph (0, 0)][DBLP ] FMCO, 2003, pp:197-222 [Conf ] Andrew D. Gordon Notes on Nominal Calculi for Security and Mobility. [Citation Graph (0, 0)][DBLP ] FOSAD, 2000, pp:262-330 [Conf ] Luca Cardelli , Andrew D. Gordon Mobile Ambients. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 1998, pp:140-155 [Conf ] Witold Charatonik , Silvano Dal-Zilio , Andrew D. Gordon , Supratik Mukhopadhyay , Jean-Marc Talbot The Complexity of Model Checking Mobile Ambients. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2001, pp:152-167 [Conf ] Andrew D. Gordon , Luca Cardelli Equational Properties of Mobile Ambients. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 1999, pp:212-226 [Conf ] Andrew D. Gordon An Operational Semantics for I/O in a Lazy Functional Language. [Citation Graph (0, 0)][DBLP ] FPCA, 1993, pp:136-145 [Conf ] Andrew D. Gordon , Paul D. Hankin , Søren B. Lassen Compilation and Equivalence of Imperative Objects. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1997, pp:74-87 [Conf ] Luca Cardelli , Andrew D. Gordon , Giorgio Ghelli Mobility Types for Mobile Ambients. [Citation Graph (0, 0)][DBLP ] ICALP, 1999, pp:230-239 [Conf ] Andrew D. Gordon The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic. [Citation Graph (0, 0)][DBLP ] ICCD, 1992, pp:531-534 [Conf ] Luca Cardelli , Giorgio Ghelli , Andrew D. Gordon Ambient Groups and Mobility Types. [Citation Graph (0, 0)][DBLP ] IFIP TCS, 2000, pp:333-347 [Conf ] Andrew D. Gordon XML Web Services: The Global Computer? [Citation Graph (0, 0)][DBLP ] IFIP TCS, 2002, pp:355- [Conf ] Andrew D. Gordon , Alan Jeffrey Typing One-to-One and One-to-Many Correspondences in Security Protocols. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:263-282 [Conf ] Andrew D. Gordon Provable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP ] LICS, 2006, pp:345-346 [Conf ] Don Syme , Andrew D. Gordon Automating Type Soundness Proofs via Decision Procedures and Guided Reductions. [Citation Graph (0, 0)][DBLP ] LPAR, 2002, pp:418-434 [Conf ] Silvano Dal-Zilio , Andrew D. Gordon Region Analysis and a pi-Calculus wiht Groups. [Citation Graph (0, 0)][DBLP ] MFCS, 2000, pp:1-20 [Conf ] Luca Cardelli , Andrew D. Gordon Anytime, Anywhere: Modal Logics for Mobile Ambients. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:365-377 [Conf ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon A semantics for web services authentication. [Citation Graph (0, 0)][DBLP ] POPL, 2004, pp:198-209 [Conf ] Luca Cardelli , Andrew D. Gordon Types for Mobile Ambients. [Citation Graph (0, 0)][DBLP ] POPL, 1999, pp:79-92 [Conf ] Cédric Fournet , Andrew D. Gordon Stack inspection: theory and variants. [Citation Graph (0, 0)][DBLP ] POPL, 2002, pp:307-318 [Conf ] Andrew D. Gordon , Gareth D. Rees Bisimilarity for a First-Order Calculus of Objects with Subtyping. [Citation Graph (0, 0)][DBLP ] POPL, 1996, pp:386-395 [Conf ] Andrew D. Gordon , Don Syme Typing a multi-language intermediate code. [Citation Graph (0, 0)][DBLP ] POPL, 2001, pp:248-260 [Conf ] Andrew D. Gordon Types for Cyphers: Thwarting Mischief and Malice with Type Theory. [Citation Graph (0, 0)][DBLP ] PPDP, 2001, pp:136- [Conf ] Andrew D. Gordon From Typed Process Calculi to Source-Based Security. [Citation Graph (0, 0)][DBLP ] SAS, 2005, pp:2- [Conf ] Andrew D. Gordon , Alan Jeffrey A Type and Effect Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] SAS, 2001, pp:432-432 [Conf ] Cristiano Calcagno , Luca Cardelli , Andrew D. Gordon Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP ] TLDI, 2003, pp:62-73 [Conf ] Luca Cardelli , Andrew D. Gordon Logical Properties of Name Restriction. [Citation Graph (0, 0)][DBLP ] TLCA, 2001, pp:46-60 [Conf ] Cristiano Calcagno , Luca Cardelli , Andrew D. Gordon Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP ] TLDI, 2003, pp:62-73 [Conf ] Andrew D. Gordon A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:413-425 [Conf ] Andrew D. Gordon , Thomas F. Melham Five Axioms of Alpha-Conversion. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1996, pp:173-190 [Conf ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon Verified Reference Implementations of WS-Security Protocols. [Citation Graph (0, 0)][DBLP ] WS-FM, 2006, pp:88-106 [Conf ] Luca Cardelli , Andrew D. Gordon Mobile Ambients. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal ] Andrew D. Gordon Bisimilarity as a theory of functional programming. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1995, v:1, n:, pp:- [Journal ] Andrew D. Gordon , Paul D. Hankin A Concurrent Object Calculus: Reduction and Typing. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1998, v:16, n:3, pp:- [Journal ] Andrew D. Gordon , Alan Jeffrey Typing Correspondence Assertions for Communication Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal ] Luca Aceto , Andrew D. Gordon Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:1-2 [Journal ] Andrew D. Gordon V for Virtual. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:177-181 [Journal ] Andrew D. Gordon , Riccardo Pucella Validating a web service security abstraction by typing. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2005, v:17, n:3, pp:277-318 [Journal ] Martín Abadi , Andrew D. Gordon A Calculus for Cryptographic Protocols: The spi Calculus. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:148, n:1, pp:1-70 [Journal ] Luca Cardelli , Giorgio Ghelli , Andrew D. Gordon Types for the Ambient Calculus. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2002, v:177, n:2, pp:160-194 [Journal ] Luca Cardelli , Giorgio Ghelli , Andrew D. Gordon Secrecy and group creation. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2005, v:196, n:2, pp:127-155 [Journal ] Andrew D. Gordon , Alan Jeffrey Types and effects for asymmetric cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:435-483 [Journal ] Andrew D. Gordon , Alan Jeffrey Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:4, pp:451-520 [Journal ] Silvano Dal-Zilio , Andrew D. Gordon Region analysis and a pi-calculus with groups. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 2002, v:12, n:3, pp:229-292 [Journal ] Andrew D. Gordon , Paul D. Hankin , Søren B. Lassen Compilation and Equivalence of Imperative Objects. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1999, v:9, n:4, pp:373-426 [Journal ] Cristiano Calcagno , Luca Cardelli , Andrew D. Gordon Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 2005, v:15, n:4, pp:543-572 [Journal ] Roy L. Crole , Andrew D. Gordon Relating operational and denotational semantics for input/output effects. [Citation Graph (0, 0)][DBLP ] Mathematical Structures in Computer Science, 1999, v:9, n:2, pp:125-158 [Journal ] Andrew D. Gordon , Luca Cardelli Equational Properties Of Mobile Ambients. [Citation Graph (0, 0)][DBLP ] Mathematical Structures in Computer Science, 2003, v:13, n:3, pp:371-408 [Journal ] Martín Abadi , Andrew D. Gordon A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1998, v:5, n:4, pp:267-0 [Journal ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon A semantics for web services authentication. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:340, n:1, pp:102-153 [Journal ] Luca Cardelli , Andrew D. Gordon Mobile ambients. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:240, n:1, pp:177-213 [Journal ] Witold Charatonik , Silvano Dal-Zilio , Andrew D. Gordon , Supratik Mukhopadhyay , Jean-Marc Talbot Model checking mobile ambients. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:308, n:1-3, pp:277-331 [Journal ] Andrew D. Gordon Preface for the Special Issue: Foundations of Software Science and Computation Structures. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:333, n:1-2, pp:1- [Journal ] Andrew D. Gordon Bisimilarity as a Theory of Functional Programming. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:228, n:1-2, pp:5-47 [Journal ] Andrew D. Gordon , Alan Jeffrey Typing correspondence assertions for communication protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:300, n:1-3, pp:379-409 [Journal ] Cédric Fournet , Andrew D. Gordon Stack inspection: Theory and variants. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2003, v:25, n:3, pp:360-399 [Journal ] Karthikeyan Bhargavan , Cédric Fournet , Andrew D. Gordon , Riccardo Pucella TulaFale: A Security Tool for Web Services [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Andrew D. Gordon , Riccardo Pucella Validating a Web Service Security Abstraction by Typing [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Luca Aceto , Mario Bravetti , Wan Fokkink , Andrew D. Gordon Guest Editors' Foreword. [Citation Graph (0, 0)][DBLP ] J. Log. Algebr. Program., 2007, v:70, n:2, pp:119-120 [Journal ] Luca Aceto , Mario Bravetti , Wan Fokkink , Andrew D. Gordon Guest Editors' Foreword. [Citation Graph (0, 0)][DBLP ] J. Log. Algebr. Program., 2007, v:72, n:1, pp:1-2 [Journal ] Karthikeyan Bhargavan , Ricardo Corin , Cédric Fournet , Andrew D. Gordon Secure sessions for Web services. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal ] Cédric Fournet , Andrew D. Gordon , Sergio Maffeis A type discipline for authorization policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal ] Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP ] Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP ] Refinement Types for Secure Implementations. [Citation Graph (, )][DBLP ] Design and Semantics of a Decentralized Authorization Language. [Citation Graph (, )][DBLP ] Code-Carrying Authorization. [Citation Graph (, )][DBLP ] Modular verification of security protocol code by typing. [Citation Graph (, )][DBLP ] Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP ] Secure compilation of a multi-tier web language. [Citation Graph (, )][DBLP ] A compositional theory for STM Haskell. [Citation Graph (, )][DBLP ] Validating a Web service security abstraction by typing. [Citation Graph (, )][DBLP ] An advisor for web services security policies. [Citation Graph (, )][DBLP ] Secure sessions for web services. [Citation Graph (, )][DBLP ] A Chart Semantics for the Pi-Calculus. [Citation Graph (, )][DBLP ] Type Inference for Correspondence Types. [Citation Graph (, )][DBLP ] Search in 0.034secs, Finished in 0.037secs