The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew D. Gordon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Martín Abadi, Andrew D. Gordon
    A Calculus for Cryptographic Protocols: The Spi Calculus. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:36-47 [Conf]
  2. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    Verifying policy-based security for web services. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:268-277 [Conf]
  3. Martín Abadi, Andrew D. Gordon
    Reasoning about Cryptographic Protocols in the Spi Calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1997, pp:59-73 [Conf]
  4. Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
    Secrecy and Group Creation. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2000, pp:365-379 [Conf]
  5. Andrew D. Gordon
    Types for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2002, pp:99-100 [Conf]
  6. Andrew D. Gordon, Alan Jeffrey
    Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2005, pp:186-201 [Conf]
  7. Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon
    From Stack Inspection to Access Control: A Security Analysis for Libraries. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:61-0 [Conf]
  8. Andrew D. Gordon, Alan Jeffrey
    Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:145-159 [Conf]
  9. Andrew D. Gordon, Alan Jeffrey
    Types and Effects for Asymmetric Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:77-91 [Conf]
  10. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse
    Verified Interoperable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:139-152 [Conf]
  11. Roy L. Crole, Andrew D. Gordon
    A Sound Metalogical Semantics for Input/Output Effects. [Citation Graph (0, 0)][DBLP]
    CSL, 1994, pp:339-353 [Conf]
  12. Martín Abadi, Andrew D. Gordon
    A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ESOP, 1998, pp:12-26 [Conf]
  13. Witold Charatonik, Andrew D. Gordon, Jean-Marc Talbot
    Finite-Control Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    ESOP, 2002, pp:295-313 [Conf]
  14. Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
    A Type Discipline for Authorization Policies. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:141-156 [Conf]
  15. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
    TulaFale: A Security Tool for Web Services. [Citation Graph (0, 0)][DBLP]
    FMCO, 2003, pp:197-222 [Conf]
  16. Andrew D. Gordon
    Notes on Nominal Calculi for Security and Mobility. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2000, pp:262-330 [Conf]
  17. Luca Cardelli, Andrew D. Gordon
    Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 1998, pp:140-155 [Conf]
  18. Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot
    The Complexity of Model Checking Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2001, pp:152-167 [Conf]
  19. Andrew D. Gordon, Luca Cardelli
    Equational Properties of Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 1999, pp:212-226 [Conf]
  20. Andrew D. Gordon
    An Operational Semantics for I/O in a Lazy Functional Language. [Citation Graph (0, 0)][DBLP]
    FPCA, 1993, pp:136-145 [Conf]
  21. Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen
    Compilation and Equivalence of Imperative Objects. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1997, pp:74-87 [Conf]
  22. Luca Cardelli, Andrew D. Gordon, Giorgio Ghelli
    Mobility Types for Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    ICALP, 1999, pp:230-239 [Conf]
  23. Andrew D. Gordon
    The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic. [Citation Graph (0, 0)][DBLP]
    ICCD, 1992, pp:531-534 [Conf]
  24. Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
    Ambient Groups and Mobility Types. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2000, pp:333-347 [Conf]
  25. Andrew D. Gordon
    XML Web Services: The Global Computer? [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2002, pp:355- [Conf]
  26. Andrew D. Gordon, Alan Jeffrey
    Typing One-to-One and One-to-Many Correspondences in Security Protocols. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:263-282 [Conf]
  27. Andrew D. Gordon
    Provable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP]
    LICS, 2006, pp:345-346 [Conf]
  28. Don Syme, Andrew D. Gordon
    Automating Type Soundness Proofs via Decision Procedures and Guided Reductions. [Citation Graph (0, 0)][DBLP]
    LPAR, 2002, pp:418-434 [Conf]
  29. Silvano Dal-Zilio, Andrew D. Gordon
    Region Analysis and a pi-Calculus wiht Groups. [Citation Graph (0, 0)][DBLP]
    MFCS, 2000, pp:1-20 [Conf]
  30. Luca Cardelli, Andrew D. Gordon
    Anytime, Anywhere: Modal Logics for Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:365-377 [Conf]
  31. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    A semantics for web services authentication. [Citation Graph (0, 0)][DBLP]
    POPL, 2004, pp:198-209 [Conf]
  32. Luca Cardelli, Andrew D. Gordon
    Types for Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:79-92 [Conf]
  33. Cédric Fournet, Andrew D. Gordon
    Stack inspection: theory and variants. [Citation Graph (0, 0)][DBLP]
    POPL, 2002, pp:307-318 [Conf]
  34. Andrew D. Gordon, Gareth D. Rees
    Bisimilarity for a First-Order Calculus of Objects with Subtyping. [Citation Graph (0, 0)][DBLP]
    POPL, 1996, pp:386-395 [Conf]
  35. Andrew D. Gordon, Don Syme
    Typing a multi-language intermediate code. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:248-260 [Conf]
  36. Andrew D. Gordon
    Types for Cyphers: Thwarting Mischief and Malice with Type Theory. [Citation Graph (0, 0)][DBLP]
    PPDP, 2001, pp:136- [Conf]
  37. Andrew D. Gordon
    From Typed Process Calculi to Source-Based Security. [Citation Graph (0, 0)][DBLP]
    SAS, 2005, pp:2- [Conf]
  38. Andrew D. Gordon, Alan Jeffrey
    A Type and Effect Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:432-432 [Conf]
  39. Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon
    Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP]
    TLDI, 2003, pp:62-73 [Conf]
  40. Luca Cardelli, Andrew D. Gordon
    Logical Properties of Name Restriction. [Citation Graph (0, 0)][DBLP]
    TLCA, 2001, pp:46-60 [Conf]
  41. Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon
    Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP]
    TLDI, 2003, pp:62-73 [Conf]
  42. Andrew D. Gordon
    A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion. [Citation Graph (0, 0)][DBLP]
    HUG, 1993, pp:413-425 [Conf]
  43. Andrew D. Gordon, Thomas F. Melham
    Five Axioms of Alpha-Conversion. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1996, pp:173-190 [Conf]
  44. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    Verified Reference Implementations of WS-Security Protocols. [Citation Graph (0, 0)][DBLP]
    WS-FM, 2006, pp:88-106 [Conf]
  45. Luca Cardelli, Andrew D. Gordon
    Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal]
  46. Andrew D. Gordon
    Bisimilarity as a theory of functional programming. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1995, v:1, n:, pp:- [Journal]
  47. Andrew D. Gordon, Paul D. Hankin
    A Concurrent Object Calculus: Reduction and Typing. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1998, v:16, n:3, pp:- [Journal]
  48. Andrew D. Gordon, Alan Jeffrey
    Typing Correspondence Assertions for Communication Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal]
  49. Luca Aceto, Andrew D. Gordon
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:1-2 [Journal]
  50. Andrew D. Gordon
    V for Virtual. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:177-181 [Journal]
  51. Andrew D. Gordon, Riccardo Pucella
    Validating a web service security abstraction by typing. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:3, pp:277-318 [Journal]
  52. Martín Abadi, Andrew D. Gordon
    A Calculus for Cryptographic Protocols: The spi Calculus. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1999, v:148, n:1, pp:1-70 [Journal]
  53. Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
    Types for the Ambient Calculus. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2002, v:177, n:2, pp:160-194 [Journal]
  54. Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
    Secrecy and group creation. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2005, v:196, n:2, pp:127-155 [Journal]
  55. Andrew D. Gordon, Alan Jeffrey
    Types and effects for asymmetric cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:435-483 [Journal]
  56. Andrew D. Gordon, Alan Jeffrey
    Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:4, pp:451-520 [Journal]
  57. Silvano Dal-Zilio, Andrew D. Gordon
    Region analysis and a pi-calculus with groups. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2002, v:12, n:3, pp:229-292 [Journal]
  58. Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen
    Compilation and Equivalence of Imperative Objects. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1999, v:9, n:4, pp:373-426 [Journal]
  59. Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon
    Deciding validity in a spatial logic for trees. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2005, v:15, n:4, pp:543-572 [Journal]
  60. Roy L. Crole, Andrew D. Gordon
    Relating operational and denotational semantics for input/output effects. [Citation Graph (0, 0)][DBLP]
    Mathematical Structures in Computer Science, 1999, v:9, n:2, pp:125-158 [Journal]
  61. Andrew D. Gordon, Luca Cardelli
    Equational Properties Of Mobile Ambients. [Citation Graph (0, 0)][DBLP]
    Mathematical Structures in Computer Science, 2003, v:13, n:3, pp:371-408 [Journal]
  62. Martín Abadi, Andrew D. Gordon
    A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1998, v:5, n:4, pp:267-0 [Journal]
  63. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    A semantics for web services authentication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:340, n:1, pp:102-153 [Journal]
  64. Luca Cardelli, Andrew D. Gordon
    Mobile ambients. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:240, n:1, pp:177-213 [Journal]
  65. Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot
    Model checking mobile ambients. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:308, n:1-3, pp:277-331 [Journal]
  66. Andrew D. Gordon
    Preface for the Special Issue: Foundations of Software Science and Computation Structures. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:333, n:1-2, pp:1- [Journal]
  67. Andrew D. Gordon
    Bisimilarity as a Theory of Functional Programming. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:228, n:1-2, pp:5-47 [Journal]
  68. Andrew D. Gordon, Alan Jeffrey
    Typing correspondence assertions for communication protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:300, n:1-3, pp:379-409 [Journal]
  69. Cédric Fournet, Andrew D. Gordon
    Stack inspection: Theory and variants. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2003, v:25, n:3, pp:360-399 [Journal]
  70. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella
    TulaFale: A Security Tool for Web Services [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  71. Andrew D. Gordon, Riccardo Pucella
    Validating a Web Service Security Abstraction by Typing [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  72. Luca Aceto, Mario Bravetti, Wan Fokkink, Andrew D. Gordon
    Guest Editors' Foreword. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2007, v:70, n:2, pp:119-120 [Journal]
  73. Luca Aceto, Mario Bravetti, Wan Fokkink, Andrew D. Gordon
    Guest Editors' Foreword. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2007, v:72, n:1, pp:1-2 [Journal]
  74. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon
    Secure sessions for Web services. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
  75. Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
    A type discipline for authorization policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal]

  76. Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]


  77. Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP]


  78. Refinement Types for Secure Implementations. [Citation Graph (, )][DBLP]


  79. Design and Semantics of a Decentralized Authorization Language. [Citation Graph (, )][DBLP]


  80. Code-Carrying Authorization. [Citation Graph (, )][DBLP]


  81. Modular verification of security protocol code by typing. [Citation Graph (, )][DBLP]


  82. Service Combinators for Farming Virtual Machines. [Citation Graph (, )][DBLP]


  83. Secure compilation of a multi-tier web language. [Citation Graph (, )][DBLP]


  84. A compositional theory for STM Haskell. [Citation Graph (, )][DBLP]


  85. Validating a Web service security abstraction by typing. [Citation Graph (, )][DBLP]


  86. An advisor for web services security policies. [Citation Graph (, )][DBLP]


  87. Secure sessions for web services. [Citation Graph (, )][DBLP]


  88. A Chart Semantics for the Pi-Calculus. [Citation Graph (, )][DBLP]


  89. Type Inference for Correspondence Types. [Citation Graph (, )][DBLP]


Search in 0.034secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002