A logic of authentication
- M. Burrows, M. Abadi, R. Needham
- Computer ScienceProceedings of the Royal Society of London. A…
- 1 November 1989
This paper shows how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs, and explains the formalism used, and gives examples of its application to protocols from the literature.
A Theory of Objects
This book takes a novel approach to the understanding of object-oriented languages by introducing object calculi and developing a theory of objects around them, which covers both the semantics of objects and their typing rules.
Control-flow integrity principles, implementations, and applications
Control-flow integrity provides a useful foundation for enforcing further security policies, as it is demonstrated with efficient software implementations of a protected shadow call stack and of access control for memory regions.
A logic of authentication
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
- M. Abadi, M. Budiu, Ú. Erlingsson, Jay Ligatti
- Computer ScienceConference on Computer and Communications…
- 7 November 2005
Control-Flow Integrity provides a useful foundation for enforcing further security policies, as it is demonstrated with efficient software implementations of a protected shadow call stack and of access control for memory regions.
A calculus for cryptographic protocols: the spi calculus
- M. Abadi, A. Gordon
- Computer Science, MathematicsConference on Computer and Communications…
- 1 April 1997
The spi calculus is introduced, an extension of the pi calculus designed for describing and analyzing cryptographic protocols and state their security properties in terms of coarse-grained notions of protocol equivalence.
Mobile values, new names, and secure communication
A simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms is introduced, and semantics and proof techniques for this extended language are developed and applied in reasoning about some security protocols.
The existence of refinement mappings
Naiad: a timely dataflow system
- D. Murray, Frank McSherry, R. Isaacs, M. Isard, P. Barham, M. Abadi
- Computer ScienceSymposium on Operating Systems Principles
- 3 November 2013
It is shown that many powerful high-level programming models can be built on Naiad's low-level primitives, enabling such diverse tasks as streaming data analysis, iterative machine learning, and interactive graph mining.
Prudent engineering practice for cryptographic protocols
- M. Abadi, R. Needham
- Computer Science, MathematicsProceedings of IEEE Computer Society Symposium…
- 16 May 1994
The principles are informal guidelines that complement formal methods, but do not assume them, and are however helpful, in that adherence to them would have avoided a considerable number of published errors.