@article{BhargavanFGT08, title = {Verified interoperable implementations of security protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Stephen Tse}, year = {2008}, doi = {10.1145/1452044.1452049}, url = {http://doi.acm.org/10.1145/1452044.1452049}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFGT08}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {31}, number = {1}, } @inproceedings{BhargavanFGP03, title = {TulaFale: A Security Tool for Web Services}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Riccardo Pucella}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3188&spage=197}, tags = {web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFGP03}, cites = {0}, citedby = {0}, pages = {197-222}, booktitle = {Formal Methods for Components and Objects, Second International Symposium, FMCO 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, volume = {3188}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-22942-6}, } @inproceedings{BhargavanFGT06, title = {Verified Interoperable Implementations of Security Protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Stephen Tse}, year = {2006}, doi = {10.1109/CSFW.2006.32}, url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.32}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFGT06}, cites = {0}, citedby = {0}, pages = {139-152}, booktitle = {19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy}, publisher = {IEEE Computer Society}, isbn = {0-7695-2615-2}, } @inproceedings{CardelliGG00:1, title = {Ambient Groups and Mobility Types}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1872/18720333.htm}, researchr = {https://researchr.org/publication/CardelliGG00%3A1}, cites = {0}, citedby = {0}, pages = {333-347}, booktitle = {Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference IFIP TCS 2000, Sendai, Japan, August 17-19, 2000, Proceedings}, editor = {Jan van Leeuwen and Osamu Watanabe and Masami Hagiya and Peter D. Mosses and Takayasu Ito}, volume = {1872}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-67823-9}, } @inproceedings{BorgstromBG09, title = {A compositional theory for STM Haskell}, author = {Johannes Borgström and Karthikeyan Bhargavan and Andrew D. Gordon}, year = {2009}, doi = {10.1145/1596638.1596648}, url = {http://doi.acm.org/10.1145/1596638.1596648}, tags = {composition, Haskell}, researchr = {https://researchr.org/publication/BorgstromBG09}, cites = {0}, citedby = {0}, pages = {69-80}, booktitle = {Proceedings of the 2nd ACM SIGPLAN Symposium on Haskell, Haskell 2009, Edinburgh, Scotland, UK, 3 September 2009}, editor = {Stephanie Weirich}, publisher = {ACM}, isbn = {978-1-60558-508-6}, } @inproceedings{FournetGM05, title = {A Type Discipline for Authorization Policies}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2005}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3444&spage=141}, researchr = {https://researchr.org/publication/FournetGM05}, cites = {0}, citedby = {0}, pages = {141-156}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming,ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, editor = {Shmuel Sagiv}, volume = {3444}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-25435-8}, } @inproceedings{Gordon02:3, title = {Types for Cryptographic Protocols}, author = {Andrew D. Gordon}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2421/24210099.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/Gordon02%3A3}, cites = {0}, citedby = {0}, pages = {99-100}, booktitle = {CONCUR 2002 - Concurrency Theory, 13th International Conference, Brno, Czech Republic, August 20-23, 2002, Proceedings}, editor = {Lubos Brim and Petr Jancar and Mojmír Kretínský and Antonín Kucera}, volume = {2421}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-44043-7}, } @inproceedings{FournetG02, title = {Stack inspection: theory and variants}, author = {Cédric Fournet and Andrew D. Gordon}, year = {2002}, doi = {10.1145/503272.503301}, url = {http://doi.acm.org/10.1145/503272.503301}, researchr = {https://researchr.org/publication/FournetG02}, cites = {0}, citedby = {0}, pages = {307-318}, booktitle = {POPL}, } @article{GordonP99, title = {Preface}, author = {Andrew D. Gordon and Andrew M. Pitts}, year = {1999}, url = {http://www.elsevier.com/gej-ng/31/29/23/50/23/show/Products/notes/index.htt#001}, researchr = {https://researchr.org/publication/GordonP99}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {26}, pages = {1-2}, } @article{GordonJ04, title = {Types and effects for asymmetric cryptographic protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2004}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ04}, cites = {0}, citedby = {0}, journal = {Journal of Computer Security}, volume = {12}, number = {3-4}, pages = {435-483}, } @inproceedings{BeckerFG07, title = {Design and Semantics of a Decentralized Authorization Language}, author = {Moritz Y. Becker and Cédric Fournet and Andrew D. Gordon}, year = {2007}, doi = {10.1109/CSF.2007.18}, url = {http://dx.doi.org/10.1109/CSF.2007.18}, tags = {semantics, language design, design}, researchr = {https://researchr.org/publication/BeckerFG07}, cites = {0}, citedby = {0}, pages = {3-15}, booktitle = {20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy}, publisher = {IEEE Computer Society}, } @inproceedings{BessonBFG04, title = {From Stack Inspection to Access Control: A Security Analysis for Libraries}, author = {Frédéric Besson and Tomasz Blanc and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1109/CSFW.2004.11}, url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.11}, tags = {analysis, security, access control}, researchr = {https://researchr.org/publication/BessonBFG04}, cites = {0}, citedby = {0}, pages = {61}, booktitle = {17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA}, publisher = {IEEE Computer Society}, isbn = {0-7695-2169-X}, } @inproceedings{GordonBR10, title = {A Hybrid Expert System for IT Security Risk Assessment}, author = {Andrew D. Gordon and Ivan Belik and Shahram Rahimi}, year = {2010}, tags = {security}, researchr = {https://researchr.org/publication/GordonBR10}, cites = {0}, citedby = {0}, pages = {430-434}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2010, Las Vegas, Nevada, USA, July 12-15, 2010, 2 Volumes}, editor = {Hamid R. Arabnia and Steve C. Chiu and George A. Gravvanis and Minoru Ito and Kazuki Joe and Hiroaki Nishikawa and Ashu M. G. Solo}, publisher = {CSREA Press}, isbn = {1-60132-158-9}, } @article{GordonHL99, title = {Compilation and Equivalence of Imperative Objects}, author = {Andrew D. Gordon and Paul D. Hankin and Søren B. Lassen}, year = {1999}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonHL99}, cites = {0}, citedby = {0}, journal = {Journal of Functional Programming}, volume = {9}, number = {4}, pages = {373-426}, } @article{BeckerFG10, title = {SecPAL: Design and semantics of a decentralized authorization language}, author = {Moritz Y. Becker and Cédric Fournet and Andrew D. Gordon}, year = {2010}, doi = {10.3233/JCS-2009-0364}, url = {http://dx.doi.org/10.3233/JCS-2009-0364}, tags = {programming languages, semantics, rule-based, translation, completeness, language design, constraints, rules, logic programming, programming, database, logic, access control policies, access control, Datalog, design, role-based access control, query language}, researchr = {https://researchr.org/publication/BeckerFG10}, cites = {0}, citedby = {0}, journal = {Journal of Computer Security}, volume = {18}, number = {4}, pages = {619-665}, } @inproceedings{GordonJ01:1, title = {A Type and Effect Analysis of Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2126/21260432.htm}, tags = {protocol, analysis, security}, researchr = {https://researchr.org/publication/GordonJ01%3A1}, cites = {0}, citedby = {0}, pages = {432}, booktitle = {Static Analysis, 8th International Symposium, SAS 2001, Paris, France, July 16-18, 2001, Proceedings}, editor = {Patrick Cousot}, volume = {2126}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-42314-1}, } @inproceedings{GordonLVCJ04, title = {Branching Storylines in Virtual Reality Environments for Leadership Development}, author = {Andrew D. Gordon and Michael van Lent and Martin Van Velsen and Paul Carpenter and Arnav Jhala}, year = {2004}, tags = {Meta-Environment}, researchr = {https://researchr.org/publication/GordonLVCJ04}, cites = {0}, citedby = {0}, pages = {844-851}, booktitle = {Proceedings of the Nineteenth National Conference on Artificial Intelligence, Sixteenth Conference on Innovative Applications of Artificial Intelligence, July 25-29, 2004, San Jose, California, USA}, editor = {Deborah L. McGuinness and George Ferguson}, publisher = {AAAI Press / The MIT Press}, isbn = {0-262-51183-5}, } @article{GordonHH09, title = {Type Inference for Correspondence Types}, author = {Andrew D. Gordon and Hans Hüttel and René Rydhof Hansen}, year = {2009}, doi = {10.1016/j.entcs.2009.07.079}, url = {http://dx.doi.org/10.1016/j.entcs.2009.07.079}, tags = {type inference, meta-model, modeling, constraints, type system, e-science, logic, Meta-Environment, process modeling}, researchr = {https://researchr.org/publication/GordonHH09}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {242}, number = {3}, pages = {21-36}, } @article{AcetoG06, title = {Preface}, author = {Luca Aceto and Andrew D. Gordon}, year = {2006}, doi = {10.1016/j.entcs.2005.12.100}, url = {http://dx.doi.org/10.1016/j.entcs.2005.12.100}, researchr = {https://researchr.org/publication/AcetoG06}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {162}, pages = {1-2}, } @inproceedings{AbadiG97:0, title = {Reasoning about Cryptographic Protocols in the Spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1997}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG97%3A0}, cites = {0}, citedby = {0}, pages = {59-73}, booktitle = {CONCUR 97: Concurrency Theory, 8th International Conference, Warsaw, Poland, July 1-4, 1997, Proceedings}, editor = {Antoni W. Mazurkiewicz and Józef Winkowski}, volume = {1243}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-63141-0}, } @inproceedings{BengtsonBFGM08, title = {Refinement Types for Secure Implementations}, author = {Jesper Bengtson and Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2008}, doi = {10.1109/CSF.2008.27}, url = {http://doi.ieeecomputersociety.org/10.1109/CSF.2008.27}, tags = {refinement}, researchr = {https://researchr.org/publication/BengtsonBFGM08}, cites = {0}, citedby = {0}, pages = {17-32}, booktitle = {Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, 23-25 June 2008}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3182-3}, } @article{Gordon99, title = {Bisimilarity as a Theory of Functional Programming}, author = {Andrew D. Gordon}, year = {1999}, doi = {10.1016/S0304-3975(98)00353-3}, url = {http://dx.doi.org/10.1016/S0304-3975(98)00353-3}, tags = {functional programming, programming}, researchr = {https://researchr.org/publication/Gordon99}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {228}, number = {1-2}, pages = {5-47}, } @article{BorgstromGP08, title = {A Chart Semantics for the Pi-Calculus}, author = {Johannes Borgström and Andrew D. Gordon and Andrew Phillips}, year = {2008}, doi = {10.1016/j.entcs.2007.11.002}, url = {http://dx.doi.org/10.1016/j.entcs.2007.11.002}, tags = {semantics}, researchr = {https://researchr.org/publication/BorgstromGP08}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {194}, number = {2}, pages = {3-29}, } @inproceedings{BhargavanFGS08, title = {Verified implementations of the information card federated identity-management protocol}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Nikhil Swamy}, year = {2008}, doi = {10.1145/1368310.1368330}, url = {http://doi.acm.org/10.1145/1368310.1368330}, tags = {protocol}, researchr = {https://researchr.org/publication/BhargavanFGS08}, cites = {0}, citedby = {0}, pages = {123-135}, booktitle = {Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008}, editor = {Masayuki Abe and Virgil D. Gligor}, publisher = {ACM}, isbn = {978-1-59593-979-1}, } @inproceedings{GordonP02, title = {Validating a Web service security abstraction by typing}, author = {Andrew D. Gordon and Riccardo Pucella}, year = {2002}, doi = {10.1145/764792.764797}, url = {http://doi.acm.org/10.1145/764792.764797}, tags = {web service, security, abstraction}, researchr = {https://researchr.org/publication/GordonP02}, cites = {0}, citedby = {0}, pages = {18-29}, booktitle = {Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002}, editor = {Michiharu Kudo}, publisher = {ACM}, isbn = {1-58113-632-3}, } @inproceedings{Gordon02:1, title = {Authenticity Types for Cryptographic Protocols}, author = {Andrew D. Gordon}, year = {2002}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2629&spage=3}, tags = {protocol}, researchr = {https://researchr.org/publication/Gordon02%3A1}, cites = {0}, citedby = {0}, pages = {3}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, editor = {Ali E. Abdallah and Peter Ryan and Steve Schneider}, volume = {2629}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-20693-0}, } @article{AbadiG98:0, title = {A Bisimulation Method for Cryptographic Protocols}, author = {Martín Abadi and Andrew D. Gordon}, year = {1998}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG98%3A0}, cites = {0}, citedby = {0}, journal = {Nord. J. Comput.}, volume = {5}, number = {4}, pages = {267}, } @inproceedings{CharatonikGT02, title = {Finite-Control Mobile Ambients}, author = {Witold Charatonik and Andrew D. Gordon and Jean-Marc Talbot}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2305/23050295.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CharatonikGT02}, cites = {0}, citedby = {0}, pages = {295-313}, booktitle = {Programming Languages and Systems, 11th European Symposium on Programming, ESOP 2002, held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings}, editor = {Daniel Le Métayer}, volume = {2305}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-43363-5}, } @inproceedings{BhargavanGN07, title = {Service Combinators for Farming Virtual Machines}, author = {Karthikeyan Bhargavan and Andrew D. Gordon and Iman Narasamdya}, year = {2007}, doi = {10.1007/978-3-540-78663-4_3}, url = {http://dx.doi.org/10.1007/978-3-540-78663-4_3}, researchr = {https://researchr.org/publication/BhargavanGN07}, cites = {0}, citedby = {0}, pages = {22}, booktitle = {Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, editor = {Gilles Barthe and Cédric Fournet}, volume = {4912}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-78662-7}, } @inproceedings{Gordon93:2, title = {An Operational Semantics for I/O in a Lazy Functional Language}, author = {Andrew D. Gordon}, year = {1993}, tags = {laziness, semantics, operational semantics}, researchr = {https://researchr.org/publication/Gordon93%3A2}, cites = {0}, citedby = {0}, pages = {136-145}, booktitle = {FPCA}, } @inproceedings{BhargavanFG10, title = {Modular verification of security protocol code by typing}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2010}, doi = {10.1145/1706299.1706350}, url = {http://doi.acm.org/10.1145/1706299.1706350}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFG10}, cites = {0}, citedby = {0}, pages = {445-456}, booktitle = {Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2010, Madrid, Spain, January 17-23, 2010}, editor = {Manuel V. Hermenegildo and Jens Palsberg}, publisher = {ACM}, isbn = {978-1-60558-479-9}, } @article{CharatonikDGMT03, title = {Model checking mobile ambients}, author = {Witold Charatonik and Silvano Dal-Zilio and Andrew D. Gordon and Supratik Mukhopadhyay and Jean-Marc Talbot}, year = {2003}, doi = {10.1016/S0304-3975(02)00832-0}, url = {http://dx.doi.org/10.1016/S0304-3975(02)00832-0}, tags = {model checking, meta-model, Meta-Environment, mobile}, researchr = {https://researchr.org/publication/CharatonikDGMT03}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {308}, number = {1-3}, pages = {277-331}, } @article{BhargavanFG05, title = {A semantics for web services authentication}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.tcs.2005.03.005}, url = {http://dx.doi.org/10.1016/j.tcs.2005.03.005}, tags = {semantics, web service, web services}, researchr = {https://researchr.org/publication/BhargavanFG05}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {340}, number = {1}, pages = {102-153}, } @inproceedings{BhargavanFG04, title = {Verifying policy-based security for web services}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/1030083.1030120}, url = {http://doi.acm.org/10.1145/1030083.1030120}, tags = {rule-based, web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFG04}, cites = {0}, citedby = {0}, pages = {268-277}, booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick Drew McDaniel}, publisher = {ACM}, isbn = {1-58113-961-6}, } @article{GordonPT97, title = {Preface}, author = {Andrew D. Gordon and Andrew M. Pitts and Carolyn L. Talcott}, year = {1997}, url = {http://www.elsevier.com/gej-ng/31/29/23/35/23/show/Products/notes/index.htt#001}, researchr = {https://researchr.org/publication/GordonPT97}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {10}, pages = {1}, } @inproceedings{Gordon01, title = {Types for Cyphers: Thwarting Mischief and Malice with Type Theory}, author = {Andrew D. Gordon}, year = {2001}, tags = {type theory}, researchr = {https://researchr.org/publication/Gordon01}, cites = {0}, citedby = {0}, pages = {136}, booktitle = {Proceedings of the 3rd international ACM SIGPLAN conference on Principles and practice of declarative programming, September 5-7, 2001, Florence, Italy}, publisher = {ACM}, isbn = {1-58113-388-X}, } @article{GordonJ03, title = {Typing correspondence assertions for communication protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2003}, doi = {10.1016/S0304-3975(02)00333-X}, url = {http://dx.doi.org/10.1016/S0304-3975(02)00333-X}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ03}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {300}, number = {1-3}, pages = {379-409}, } @article{Gordon06, title = {V for Virtual}, author = {Andrew D. Gordon}, year = {2006}, doi = {10.1016/j.entcs.2006.01.030}, url = {http://dx.doi.org/10.1016/j.entcs.2006.01.030}, researchr = {https://researchr.org/publication/Gordon06}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {162}, pages = {177-181}, } @inproceedings{GordonJ02, title = {Types and Effects for Asymmetric Cryptographic Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2002}, url = {http://csdl.computer.org/comp/proceedings/csfw/2002/1689/00/16890077abs.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ02}, cites = {0}, citedby = {0}, pages = {77-91}, booktitle = {15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, publisher = {IEEE Computer Society}, isbn = {0-7695-1689-0}, } @article{Gordon05:0, title = {Preface for the Special Issue: Foundations of Software Science and Computation Structures}, author = {Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.tcs.2004.11.001}, url = {http://dx.doi.org/10.1016/j.tcs.2004.11.001}, tags = {e-science}, researchr = {https://researchr.org/publication/Gordon05%3A0}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {333}, number = {1-2}, pages = {1}, } @article{GordonP05:0, title = {Validating a web service security abstraction by typing}, author = {Andrew D. Gordon and Riccardo Pucella}, year = {2005}, doi = {10.1007/s00165-004-0058-1}, url = {http://dx.doi.org/10.1007/s00165-004-0058-1}, tags = {web service, security, abstraction}, researchr = {https://researchr.org/publication/GordonP05%3A0}, cites = {0}, citedby = {0}, journal = {Formal Asp. Comput.}, volume = {17}, number = {3}, pages = {277-318}, } @inproceedings{Gordon92a, title = {The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic}, author = {Andrew D. Gordon}, year = {1992}, tags = {logic}, researchr = {https://researchr.org/publication/Gordon92a}, cites = {0}, citedby = {0}, pages = {531-534}, booktitle = {Proceedings 1991 IEEE International Conference on Computer Design: VLSI in Computer & Processors, ICCD 92, Cambridge, MA, USA, October 11-14, 1992}, publisher = {IEEE Computer Society}, isbn = {0-8186-3110-4}, } @inproceedings{CardelliGG99, title = {Mobility Types for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon and Giorgio Ghelli}, year = {1999}, url = {http://link.springer.de/link/service/series/0558/bibs/1644/16440230.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliGG99}, cites = {0}, citedby = {0}, pages = {230-239}, booktitle = {Automata, Languages and Programming, 26th International Colloquium, ICALP 99, Prague, Czech Republic, July 11-15, 1999, Proceedings}, editor = {Jirí Wiedermann and Peter van Emde Boas and Mogens Nielsen}, volume = {1644}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66224-3}, } @inproceedings{CardelliG01:0, title = {Logical Properties of Name Restriction}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2044/20440046.htm}, researchr = {https://researchr.org/publication/CardelliG01%3A0}, cites = {0}, citedby = {0}, pages = {46-60}, booktitle = {Typed Lambda Calculi and Applications, 5th International Conference, TLCA 2001, Krakow, Poland, May 2-5, 2001, Proceedings}, editor = {Samson Abramsky}, volume = {2044}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-41960-8}, } @inproceedings{Gordon06:2, title = {Provable Implementations of Security Protocols}, author = {Andrew D. Gordon}, year = {2006}, doi = {10.1109/LICS.2006.43}, url = {http://doi.ieeecomputersociety.org/10.1109/LICS.2006.43}, tags = {protocol, security}, researchr = {https://researchr.org/publication/Gordon06%3A2}, cites = {0}, citedby = {0}, pages = {345-346}, booktitle = {21th IEEE Symposium on Logic in Computer Science (LICS 2006), 12-15 August 2006, Seattle, WA, USA, Proceedings}, publisher = {IEEE Computer Society}, } @article{GordonJ01, title = {Typing Correspondence Assertions for Communication Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://www.elsevier.com/gej-ng/31/29/23/88/27/show/Products/notes/index.htt#009}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ01}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {45}, pages = {119-140}, } @article{AcetoBFG07, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2007}, doi = {10.1016/j.jlap.2006.08.002}, url = {http://dx.doi.org/10.1016/j.jlap.2006.08.002}, researchr = {https://researchr.org/publication/AcetoBFG07}, cites = {0}, citedby = {0}, journal = {Journal of Logic and Algebraic Programming}, volume = {70}, number = {2}, pages = {119-120}, } @inproceedings{CardelliG98, title = {Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1998}, url = {http://link.springer.de/link/service/series/0558/bibs/1378/13780140.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG98}, cites = {0}, citedby = {0}, pages = {140-155}, booktitle = {Foundations of Software Science and Computation Structure, First International Conference, FoSSaCS 98, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings}, editor = {Maurice Nivat}, volume = {1378}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-64300-1}, } @article{GordonJ03:0, title = {Authenticity by Typing for Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2003}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ03%3A0}, cites = {0}, citedby = {0}, journal = {Journal of Computer Security}, volume = {11}, number = {4}, pages = {451-520}, } @inproceedings{CalcagnoCG03, title = {Deciding validity in a spatial logic for trees}, author = {Cristiano Calcagno and Luca Cardelli and Andrew D. Gordon}, year = {2003}, doi = {10.1145/604174.604183}, url = {http://doi.acm.org/10.1145/604174.604183}, tags = {logic}, researchr = {https://researchr.org/publication/CalcagnoCG03}, cites = {0}, citedby = {0}, pages = {62-73}, booktitle = {Proceedings of TLDI 03: 2003 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, New Orleans, Louisiana, USA, January 18, 2003}, editor = {Zhong Shao and Peter Lee}, publisher = {ACM}, isbn = {1-58113-649-8}, } @inproceedings{CroleG94, title = {A Sound Metalogical Semantics for Input/Output Effects}, author = {Roy L. Crole and Andrew D. Gordon}, year = {1994}, tags = {semantics}, researchr = {https://researchr.org/publication/CroleG94}, cites = {0}, citedby = {0}, pages = {339-353}, booktitle = {Computer Science Logic, 8th International Workshop, CSL 94, Kazimierz, Poland, September 25-30, 1994, Selected Papers}, editor = {Leszek Pacholski and Jerzy Tiuryn}, volume = {933}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-60017-5}, } @inproceedings{Gordon02:0, title = {XML Web Services: The Global Computer?}, author = {Andrew D. Gordon}, year = {2002}, tags = {XML, XML Schema, web service, web services}, researchr = {https://researchr.org/publication/Gordon02%3A0}, cites = {0}, citedby = {0}, pages = {355}, booktitle = {Foundations of Information Technology in the Era of Networking and Mobile Computing, IFIP 17:::th::: World Computer Congress - TC1 Stream / 2:::nd::: IFIP International Conference on Theoretical Computer Science (TCS 2002), August 25-30, 2002, Montr&eacut}, editor = {Ricardo A. Baeza-Yates and Ugo Montanari and Nicola Santoro}, volume = {223}, series = {IFIP Conference Proceedings}, publisher = {Kluwer}, isbn = {1-4020-7181-7}, } @inproceedings{BhargavanFG04:0, title = {A semantics for web services authentication}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/964001.964018}, url = {http://doi.acm.org/10.1145/964001.964018}, tags = {semantics, rule-based, formal semantics, meta-model, XML, XML Schema, protocol, web service, data-flow, certification, security, web services, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/BhargavanFG04%3A0}, cites = {0}, citedby = {0}, pages = {198-209}, booktitle = {Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy, January 14-16, 2004}, editor = {Neil D. Jones and Xavier Leroy}, publisher = {ACM}, isbn = {1-58113-729-X}, } @article{CardelliGG00, title = {Secrecy, Group Creation}, author = {Luca Cardelli and Andrew D. Gordon and Giorgio Ghelli}, year = {2000}, url = {http://www.elsevier.com/gej-ng/31/29/23/97/27/show/Products/notes/index.htt#006}, researchr = {https://researchr.org/publication/CardelliGG00}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {40}, pages = {7}, } @inproceedings{GordonM96, title = {Five Axioms of Alpha-Conversion}, author = {Andrew D. Gordon and Thomas F. Melham}, year = {1996}, researchr = {https://researchr.org/publication/GordonM96}, cites = {0}, citedby = {0}, pages = {173-190}, booktitle = {Theorem Proving in Higher Order Logics, 9th International Conference, TPHOLs 96, Turku, Finland, August 26-30, 1996, Proceedings}, editor = {Joakim von Wright and Jim Grundy and John Harrison}, volume = {1125}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-61587-3}, } @inproceedings{GordonKNP03, title = {Recognizing Expressions of Commonsense Psychology in English Text}, author = {Andrew D. Gordon and Abe Kazemzadeh and Anish Nair and Milena Petrova}, year = {2003}, url = {http://acl.ldc.upenn.edu/acl2003/main/pdfs/Gordon.pdf}, researchr = {https://researchr.org/publication/GordonKNP03}, cites = {0}, citedby = {0}, pages = {208-215}, booktitle = {ACL}, } @inproceedings{CharatonikDGMT01, title = {The Complexity of Model Checking Mobile Ambients}, author = {Witold Charatonik and Silvano Dal-Zilio and Andrew D. Gordon and Supratik Mukhopadhyay and Jean-Marc Talbot}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2030/20300152.htm}, tags = {model checking, meta-model, Meta-Environment, mobile}, researchr = {https://researchr.org/publication/CharatonikDGMT01}, cites = {0}, citedby = {0}, pages = {152-167}, booktitle = {Foundations of Software Science and Computation Structures, 4th International Conference, FOSSACS 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001, Proceedings}, editor = {Furio Honsell and Marino Miculan}, volume = {2030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-41864-4}, } @article{CardelliGG02, title = {Types for the Ambient Calculus}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2002}, doi = {10.1006/inco.2001.3121}, url = {http://dx.doi.org/10.1006/inco.2001.3121}, researchr = {https://researchr.org/publication/CardelliGG02}, cites = {0}, citedby = {0}, journal = {Inf. Comput.}, volume = {177}, number = {2}, pages = {160-194}, } @inproceedings{CardelliGG00:0, title = {Secrecy and Group Creation}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1877/18770365.htm}, researchr = {https://researchr.org/publication/CardelliGG00%3A0}, cites = {0}, citedby = {0}, pages = {365-379}, booktitle = {CONCUR 2000 - Concurrency Theory, 11th International Conference, University Park, PA, USA, August 22-25, 2000, Proceedings}, editor = {Catuscia Palamidessi}, volume = {1877}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-67897-2}, } @inproceedings{GordonJ05, title = {Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2005}, doi = {10.1007/11539452_17}, url = {http://dx.doi.org/10.1007/11539452_17}, researchr = {https://researchr.org/publication/GordonJ05}, cites = {0}, citedby = {0}, pages = {186-201}, booktitle = {CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings}, editor = {Martín Abadi and Luca de Alfaro}, volume = {3653}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-28309-9}, } @inproceedings{BhargavanFG06, title = {Verified Reference Implementations of WS-Security Protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2006}, doi = {10.1007/11841197_6}, url = {http://dx.doi.org/10.1007/11841197_6}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFG06}, cites = {0}, citedby = {0}, pages = {88-106}, booktitle = {Web Services and Formal Methods, Third International Workshop, WS-FM 2006 Vienna, Austria, September 8-9, 2006, Proceedings}, editor = {Mario Bravetti and Manuel Núñez and Gianluigi Zavattaro}, volume = {4184}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-38862-1}, } @article{GordonC03, title = {Equational Properties Of Mobile Ambients}, author = {Andrew D. Gordon and Luca Cardelli}, year = {2003}, tags = {mobile}, researchr = {https://researchr.org/publication/GordonC03}, cites = {0}, citedby = {0}, journal = {Mathematical Structures in Computer Science}, volume = {13}, number = {3}, pages = {371-408}, } @inproceedings{CardelliG00, title = {Anytime, Anywhere: Modal Logics for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2000}, doi = {10.1145/325694.325742}, url = {http://doi.acm.org/10.1145/325694.325742}, tags = {modal logic, logic, mobile}, researchr = {https://researchr.org/publication/CardelliG00}, cites = {0}, citedby = {0}, pages = {365-377}, booktitle = {POPL}, } @inproceedings{Dal-ZilioG00, title = {Region Analysis and a pi-Calculus wiht Groups}, author = {Silvano Dal-Zilio and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1893/18930001.htm}, tags = {analysis}, researchr = {https://researchr.org/publication/Dal-ZilioG00}, cites = {0}, citedby = {0}, pages = {1-20}, booktitle = {Mathematical Foundations of Computer Science 2000, 25th International Symposium, MFCS 2000, Bratislava, Slovakia, August 28 - September 1, 2000, Proceedings}, editor = {Mogens Nielsen and Branislav Rovan}, volume = {1893}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-67901-4}, } @article{FournetGM07, title = {A type discipline for authorization policies}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2007}, doi = {10.1145/1275497.1275500}, url = {http://doi.acm.org/10.1145/1275497.1275500}, researchr = {https://researchr.org/publication/FournetGM07}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {29}, number = {5}, pages = {25}, } @inproceedings{Gordon93:0, title = {A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion}, author = {Andrew D. Gordon}, year = {1993}, researchr = {https://researchr.org/publication/Gordon93%3A0}, cites = {0}, citedby = {0}, pages = {413-425}, booktitle = {Higher Order Logic Theorem Proving and its Applications, 6th International Workshop, HUG 93, Vancouver, BC, Canada, August 11-13, 1993, Proceedings}, editor = {Jeffrey J. Joyce and Carl-Johan H. Seger}, volume = {780}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-57826-9}, } @inproceedings{GordonJ02:0, title = {Typing One-to-One and One-to-Many Correspondences in Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2002}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2609&spage=263}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ02%3A0}, cites = {0}, citedby = {0}, pages = {263-282}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, volume = {2609}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-00708-3}, } @article{BhargavanCFG07, title = {Secure sessions for Web services}, author = {Karthikeyan Bhargavan and Ricardo Corin and Cédric Fournet and Andrew D. Gordon}, year = {2007}, doi = {10.1145/1237500.1237504}, url = {http://doi.acm.org/10.1145/1237500.1237504}, tags = {web service, web services}, researchr = {https://researchr.org/publication/BhargavanCFG07}, cites = {0}, citedby = {0}, journal = {ACM Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {8}, } @inproceedings{HillDGPV03, title = {Guided Conversations about Leadership: Mentoring with Movies and Interactive Characters}, author = {Randall W. Hill Jr. and Jay Douglas and Andrew D. Gordon and Frederic H. Pighin and Martin Van Velsen}, year = {2003}, researchr = {https://researchr.org/publication/HillDGPV03}, cites = {0}, citedby = {0}, pages = {101-108}, booktitle = {Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, August 12-14, 2003, Acapulco, Mexico}, editor = {John Riedl and Randall W. Hill Jr.}, publisher = {AAAI}, isbn = {1-57735-188-6}, } @inproceedings{BoultonGGHHT92, title = {Experience with Embedding Hardware Description Languages in HOL}, author = {Richard J. Boulton and Andrew D. Gordon and Michael J. C. Gordon and John Harrison and John Herbert and John Van Tassel}, year = {1992}, tags = {C++}, researchr = {https://researchr.org/publication/BoultonGGHHT92}, cites = {0}, citedby = {0}, pages = {129-156}, booktitle = {Theorem Provers in Circuit Design, Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design: Theory, Practice and Experience, Nijmegen, The Netherlands, 22-24 June 1992, Proceedings}, editor = {Victoria Stavridou and Thomas F. Melham and Raymond T. Boute}, volume = {A-10}, series = {IFIP Transactions}, publisher = {North-Holland}, isbn = {0-444-89686-4}, } @inproceedings{CardelliG99, title = {Types for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1999}, doi = {10.1145/292540.292550}, url = {http://doi.acm.org/10.1145/292540.292550}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG99}, cites = {0}, citedby = {0}, pages = {79-92}, booktitle = {POPL}, } @inproceedings{GordonHL97, title = {Compilation and Equivalence of Imperative Objects}, author = {Andrew D. Gordon and Paul D. Hankin and Søren B. Lassen}, year = {1997}, url = {http://link.springer.de/link/service/series/0558/bibs/1346/13460074.htm}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonHL97}, cites = {0}, citedby = {0}, pages = {74-87}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 17th Conference, Kharagpur, India, December 18-20, 1997, Proceedings}, editor = {S. Ramesh and G. Sivakumar}, volume = {1346}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-63876-8}, } @article{Dal-ZilioG02, title = {Region analysis and a pi-calculus with groups}, author = {Silvano Dal-Zilio and Andrew D. Gordon}, year = {2002}, tags = {analysis}, researchr = {https://researchr.org/publication/Dal-ZilioG02}, cites = {0}, citedby = {0}, journal = {Journal of Functional Programming}, volume = {12}, number = {3}, pages = {229-292}, } @inproceedings{FournetGM07:0, title = {A Type Discipline for Authorization in Distributed Systems}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2007}, doi = {10.1109/CSF.2007.7}, url = {http://dx.doi.org/10.1109/CSF.2007.7}, tags = {type system}, researchr = {https://researchr.org/publication/FournetGM07%3A0}, cites = {0}, citedby = {0}, pages = {31-48}, booktitle = {20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy}, publisher = {IEEE Computer Society}, } @inproceedings{MaffeisAFG08, title = {Code-Carrying Authorization}, author = {Sergio Maffeis and Martín Abadi and Cédric Fournet and Andrew D. Gordon}, year = {2008}, doi = {10.1007/978-3-540-88313-5_36}, url = {http://dx.doi.org/10.1007/978-3-540-88313-5_36}, researchr = {https://researchr.org/publication/MaffeisAFG08}, cites = {0}, citedby = {0}, pages = {563-579}, booktitle = {Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, editor = {Sushil Jajodia and Javier Lopez}, volume = {5283}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-88312-8}, } @inproceedings{BhargavanCFG04, title = {Secure sessions for web services}, author = {Karthikeyan Bhargavan and Ricardo Corin and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/1111348.1111355}, url = {http://doi.acm.org/10.1145/1111348.1111355}, tags = {web service, web services}, researchr = {https://researchr.org/publication/BhargavanCFG04}, cites = {0}, citedby = {0}, pages = {56-66}, booktitle = {Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004}, editor = {Vijay Atluri}, publisher = {ACM}, isbn = {1-58113-973-X}, } @inproceedings{Gordon05:1, title = {From Typed Process Calculi to Source-Based Security}, author = {Andrew D. Gordon}, year = {2005}, doi = {10.1007/11547662_2}, url = {http://dx.doi.org/10.1007/11547662_2}, tags = {rule-based, source-to-source, security, open-source}, researchr = {https://researchr.org/publication/Gordon05%3A1}, cites = {0}, citedby = {0}, pages = {2}, booktitle = {Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings}, editor = {Chris Hankin and Igor Siveroni}, volume = {3672}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-28584-9}, } @inproceedings{AbadiG97, title = {A Calculus for Cryptographic Protocols: The Spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1997}, doi = {10.1145/266420.266432}, url = {http://doi.acm.org/10.1145/266420.266432}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG97}, cites = {0}, citedby = {0}, pages = {36-47}, booktitle = {ACM Conference on Computer and Communications Security}, } @article{AcetoBFG07a, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2007}, doi = {10.1016/j.jlap.2007.02.001}, url = {http://dx.doi.org/10.1016/j.jlap.2007.02.001}, researchr = {https://researchr.org/publication/AcetoBFG07a}, cites = {0}, citedby = {0}, journal = {Journal of Logic and Algebraic Programming}, volume = {72}, number = {1}, pages = {1-2}, } @article{GordonH98, title = {A Concurrent Object Calculus: Reduction and Typing}, author = {Andrew D. Gordon and Paul D. Hankin}, year = {1998}, url = {http://www.elsevier.com/gej-ng/31/29/23/40/26/show/Products/notes/index.htt#007}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonH98}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {16}, number = {3}, pages = {248-264}, } @inproceedings{JonesGF96, title = {Concurrent Haskell}, author = {Simon L. Peyton Jones and Andrew D. Gordon and Sigbjorn Finne}, year = {1996}, doi = {10.1145/237721.237794}, url = {http://doi.acm.org/10.1145/237721.237794}, tags = {Haskell}, researchr = {https://researchr.org/publication/JonesGF96}, cites = {0}, citedby = {0}, pages = {295-308}, booktitle = {POPL}, } @article{CardelliG97, title = {Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1997}, url = {http://www.elsevier.com/gej-ng/31/29/23/35/23/show/Products/notes/index.htt#017}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG97}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {10}, pages = {198-201}, } @inproceedings{Gordon00:4, title = {Notes on Nominal Calculi for Security and Mobility}, author = {Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/2171/21710262.htm}, tags = {security}, researchr = {https://researchr.org/publication/Gordon00%3A4}, cites = {0}, citedby = {0}, pages = {262-330}, booktitle = {Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000]}, editor = {Riccardo Focardi and Roberto Gorrieri}, volume = {2171}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-42896-8}, } @article{CroleG99, title = {Relating operational and denotational semantics for input/output effects}, author = {Roy L. Crole and Andrew D. Gordon}, year = {1999}, tags = {semantics, denotational semantics, operational semantics}, researchr = {https://researchr.org/publication/CroleG99}, cites = {0}, citedby = {0}, journal = {Mathematical Structures in Computer Science}, volume = {9}, number = {2}, pages = {125-158}, } @article{CalcagnoCG05, title = {Deciding validity in a spatial logic for trees}, author = {Cristiano Calcagno and Luca Cardelli and Andrew D. Gordon}, year = {2005}, doi = {10.1017/S0956796804005404}, url = {http://dx.doi.org/10.1017/S0956796804005404}, tags = {logic}, researchr = {https://researchr.org/publication/CalcagnoCG05}, cites = {0}, citedby = {0}, journal = {Journal of Functional Programming}, volume = {15}, number = {4}, pages = {543-572}, } @inproceedings{GordonS01, title = {Typing a multi-language intermediate code}, author = {Andrew D. Gordon and Don Syme}, year = {2001}, doi = {10.1145/360204.360228}, url = {http://doi.acm.org/10.1145/360204.360228}, researchr = {https://researchr.org/publication/GordonS01}, cites = {0}, citedby = {0}, pages = {248-260}, booktitle = {Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages}, series = {POPL}, publisher = {Association for Computing Machinery}, } @article{BhargavanFG08, title = {Verifying policy-based web services security}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2008}, doi = {10.1145/1391956.1391957}, url = {http://doi.acm.org/10.1145/1391956.1391957}, tags = {rule-based, web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFG08}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {30}, number = {6}, } @inproceedings{GordonC99, title = {Equational Properties of Mobile Ambients}, author = {Andrew D. Gordon and Luca Cardelli}, year = {1999}, tags = {mobile}, researchr = {https://researchr.org/publication/GordonC99}, cites = {0}, citedby = {0}, pages = {212-226}, booktitle = {Foundations of Software Science and Computation Structure, Second International Conference, FoSSaCS 99, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 99, Amsterdam, The Netherlands, March 22-28, 1999, Proceed}, editor = {Wolfgang Thomas}, volume = {1578}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-65719-3}, } @article{Gordon95:0, title = {Bisimilarity as a theory of functional programming}, author = {Andrew D. Gordon}, year = {1995}, url = {http://www.elsevier.com/gej-ng/31/29/23/26/23/show/Products/notes/index.htt#014}, tags = {functional programming, programming}, researchr = {https://researchr.org/publication/Gordon95%3A0}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {1}, pages = {232-252}, } @inproceedings{SymeG02, title = {Automating Type Soundness Proofs via Decision Procedures and Guided Reductions}, author = {Don Syme and Andrew D. Gordon}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2514/25140418.htm}, tags = {type soundness}, researchr = {https://researchr.org/publication/SymeG02}, cites = {0}, citedby = {0}, pages = {418-434}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 9th International Conference, LPAR 2002, Tbilisi, Georgia, October 14-18, 2002, Proceedings}, editor = {Matthias Baaz and Andrei Voronkov}, volume = {2514}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-00010-0}, } @article{CardelliGG05, title = {Secrecy and group creation}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.ic.2004.08.003}, url = {http://dx.doi.org/10.1016/j.ic.2004.08.003}, researchr = {https://researchr.org/publication/CardelliGG05}, cites = {0}, citedby = {0}, journal = {Inf. Comput.}, volume = {196}, number = {2}, pages = {127-155}, } @article{AbadiG99, title = {A Calculus for Cryptographic Protocols: The spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1999}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG99}, cites = {0}, citedby = {0}, journal = {Inf. Comput.}, volume = {148}, number = {1}, pages = {1-70}, } @article{CardelliG00:0, title = {Mobile ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2000}, doi = {10.1016/S0304-3975(99)00231-5}, url = {http://dx.doi.org/10.1016/S0304-3975(99)00231-5}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG00%3A0}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {240}, number = {1}, pages = {177-213}, } @article{AcetoBFG08, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2008}, doi = {10.1016/j.jlap.2007.06.001}, url = {http://dx.doi.org/10.1016/j.jlap.2007.06.001}, researchr = {https://researchr.org/publication/AcetoBFG08}, cites = {0}, citedby = {0}, journal = {Journal of Logic and Algebraic Programming}, volume = {75}, number = {1}, pages = {1-2}, } @inproceedings{BaltopoulosG09, title = {Secure compilation of a multi-tier web language}, author = {Ioannis G. Baltopoulos and Andrew D. Gordon}, year = {2009}, doi = {10.1145/1481861.1481866}, url = {http://doi.acm.org/10.1145/1481861.1481866}, researchr = {https://researchr.org/publication/BaltopoulosG09}, cites = {0}, citedby = {0}, pages = {27-38}, booktitle = {Proceedings of TLDI 08: 2008 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Savannah, GA, USA, January 24, 2009}, editor = {Andrew Kennedy and Amal Ahmed}, publisher = {ACM}, isbn = {978-1-60558-420-1}, } @inproceedings{BhargavanFGO05, title = {An advisor for web services security policies}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Greg O Shea}, year = {2005}, doi = {10.1145/1103022.1103024}, url = {http://doi.acm.org/10.1145/1103022.1103024}, tags = {web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFGO05}, cites = {0}, citedby = {0}, pages = {1-9}, booktitle = {Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005}, editor = {Ernesto Damiani and Hiroshi Maruyama}, publisher = {ACM}, isbn = {1-59593-234-8}, } @article{FournetG03, title = {Stack inspection: Theory and variants}, author = {Cédric Fournet and Andrew D. Gordon}, year = {2003}, doi = {10.1145/641909.641912}, url = {http://doi.acm.org/10.1145/641909.641912}, researchr = {https://researchr.org/publication/FournetG03}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {25}, number = {3}, pages = {360-399}, } @inproceedings{BhargavanGN08, title = {Service Combinators for Farming Virtual Machines}, author = {Karthikeyan Bhargavan and Andrew D. Gordon and Iman Narasamdya}, year = {2008}, doi = {10.1007/978-3-540-68265-3_3}, url = {http://dx.doi.org/10.1007/978-3-540-68265-3_3}, researchr = {https://researchr.org/publication/BhargavanGN08}, cites = {0}, citedby = {0}, pages = {33-49}, booktitle = {Coordination Models and Languages, 10th International Conference, COORDINATION 2008, Oslo, Norway, June 4-6, 2008. Proceedings}, editor = {Doug Lea and Gianluigi Zavattaro}, volume = {5052}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-68264-6}, } @inproceedings{GordonJ01:0, title = {Authenticity by Typing for Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460145abs.htm}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ01%3A0}, cites = {0}, citedby = {0}, pages = {145-159}, booktitle = {14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, publisher = {IEEE Computer Society}, isbn = {0-7695-1146-5}, } @inproceedings{GordonR96, title = {Bisimilarity for a First-Order Calculus of Objects with Subtyping}, author = {Andrew D. Gordon and Gareth D. Rees}, year = {1996}, doi = {10.1145/237721.237807}, url = {http://doi.acm.org/10.1145/237721.237807}, tags = {meta-model, subtyping, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonR96}, cites = {0}, citedby = {0}, pages = {386-395}, booktitle = {POPL}, } @inproceedings{BiermanGHL10, title = {Semantic subtyping with an SMT solver}, author = {Gavin M. Bierman and Andrew D. Gordon and Catalin Hritcu and David E. Langworthy}, year = {2010}, doi = {10.1145/1863543.1863560}, url = {http://doi.acm.org/10.1145/1863543.1863560}, tags = {semantics, model checking, meta-model, modeling language, refinement, language modeling, testing, subtyping, type checking, algebra, logic, type theory, Meta-Environment, domain-specific language}, researchr = {https://researchr.org/publication/BiermanGHL10}, cites = {0}, citedby = {0}, pages = {105-116}, booktitle = {Proceeding of the 15th ACM SIGPLAN international conference on Functional programming, ICFP 2010, Baltimore, Maryland, USA, September 27-29, 2010}, editor = {Paul Hudak and Stephanie Weirich}, publisher = {ACM}, isbn = {978-1-60558-794-3}, } @inproceedings{AbadiG98, title = {A Bisimulation Method for Cryptographic Protocols}, author = {Martín Abadi and Andrew D. Gordon}, year = {1998}, url = {http://link.springer.de/link/service/series/0558/bibs/1381/13810012.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG98}, cites = {0}, citedby = {0}, pages = {12-26}, booktitle = {Programming Languages and Systems - ESOP 98, 7th European Symposium on Programming, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings}, editor = {Chris Hankin}, volume = {1381}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-64302-8}, } @proceedings{fossacs:2003, title = {Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, year = {2003}, tags = {e-science}, researchr = {https://researchr.org/publication/fossacs%3A2003}, cites = {0}, citedby = {0}, booktitle = {Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, conference = {fossacs}, editor = {Andrew D. Gordon}, volume = {2620}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-00897-7}, } @proceedings{esop-2010, title = {Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, year = {2010}, doi = {10.1007/978-3-642-11957-6}, url = {http://dx.doi.org/10.1007/978-3-642-11957-6}, tags = {programming languages, programming}, researchr = {https://researchr.org/publication/esop-2010}, cites = {0}, citedby = {0}, booktitle = {Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, conference = {ESOP}, editor = {Andrew D. Gordon}, volume = {6012}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-11956-9}, } @proceedings{ccs:2006fmse, title = {Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006}, year = {2006}, tags = {security}, researchr = {https://researchr.org/publication/ccs%3A2006fmse}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006}, editor = {Marianne Winslett and Andrew D. Gordon and David Sands}, publisher = {ACM}, isbn = {1-59593-550-9}, }