@article{BhargavanFGT08, title = {Verified interoperable implementations of security protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Stephen Tse}, year = {2008}, doi = {10.1145/1452044.1452049}, url = {http://doi.acm.org/10.1145/1452044.1452049}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFGT08}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {31}, number = {1}, } @inproceedings{BhargavanFGP03, title = {TulaFale: A Security Tool for Web Services}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Riccardo Pucella}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3188&spage=197}, tags = {web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFGP03}, cites = {0}, citedby = {0}, pages = {197-222}, booktitle = {FMCO}, } @inproceedings{BhargavanFGT06, title = {Verified Interoperable Implementations of Security Protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Stephen Tse}, year = {2006}, doi = {10.1109/CSFW.2006.32}, url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.32}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFGT06}, cites = {0}, citedby = {0}, pages = {139-152}, booktitle = {csfw}, } @inproceedings{CardelliGG00:1, title = {Ambient Groups and Mobility Types}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1872/18720333.htm}, researchr = {https://researchr.org/publication/CardelliGG00%3A1}, cites = {0}, citedby = {0}, pages = {333-347}, booktitle = {ifipTCS}, } @inproceedings{BorgstromBG09, title = {A compositional theory for STM Haskell}, author = {Johannes Borgström and Karthikeyan Bhargavan and Andrew D. Gordon}, year = {2009}, doi = {10.1145/1596638.1596648}, url = {http://doi.acm.org/10.1145/1596638.1596648}, tags = {composition, Haskell}, researchr = {https://researchr.org/publication/BorgstromBG09}, cites = {0}, citedby = {0}, pages = {69-80}, booktitle = {haskell}, } @inproceedings{FournetGM05, title = {A Type Discipline for Authorization Policies}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2005}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3444&spage=141}, researchr = {https://researchr.org/publication/FournetGM05}, cites = {0}, citedby = {0}, pages = {141-156}, booktitle = {ESOP}, } @inproceedings{Gordon02:3, title = {Types for Cryptographic Protocols}, author = {Andrew D. Gordon}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2421/24210099.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/Gordon02%3A3}, cites = {0}, citedby = {0}, pages = {99-100}, booktitle = {concur}, } @inproceedings{FournetG02, title = {Stack inspection: theory and variants}, author = {Cédric Fournet and Andrew D. Gordon}, year = {2002}, doi = {10.1145/503272.503301}, url = {http://doi.acm.org/10.1145/503272.503301}, researchr = {https://researchr.org/publication/FournetG02}, cites = {0}, citedby = {0}, pages = {307-318}, booktitle = {POPL}, } @article{GordonP99, title = {Preface}, author = {Andrew D. Gordon and Andrew M. Pitts}, year = {1999}, url = {http://www.elsevier.com/gej-ng/31/29/23/50/23/show/Products/notes/index.htt#001}, researchr = {https://researchr.org/publication/GordonP99}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {26}, pages = {1-2}, } @article{GordonJ04, title = {Types and effects for asymmetric cryptographic protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2004}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ04}, cites = {0}, citedby = {0}, journal = {jcs}, volume = {12}, number = {3-4}, pages = {435-483}, } @inproceedings{BeckerFG07, title = {Design and Semantics of a Decentralized Authorization Language}, author = {Moritz Y. Becker and Cédric Fournet and Andrew D. Gordon}, year = {2007}, doi = {10.1109/CSF.2007.18}, url = {http://dx.doi.org/10.1109/CSF.2007.18}, tags = {semantics, language design, design}, researchr = {https://researchr.org/publication/BeckerFG07}, cites = {0}, citedby = {0}, pages = {3-15}, booktitle = {csfw}, } @inproceedings{BessonBFG04, title = {From Stack Inspection to Access Control: A Security Analysis for Libraries}, author = {Frédéric Besson and Tomasz Blanc and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1109/CSFW.2004.11}, url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.11}, tags = {analysis, security, access control}, researchr = {https://researchr.org/publication/BessonBFG04}, cites = {0}, citedby = {0}, pages = {61}, booktitle = {csfw}, } @inproceedings{GordonBR10, title = {A Hybrid Expert System for IT Security Risk Assessment}, author = {Andrew D. Gordon and Ivan Belik and Shahram Rahimi}, year = {2010}, tags = {security}, researchr = {https://researchr.org/publication/GordonBR10}, cites = {0}, citedby = {0}, pages = {430-434}, booktitle = {pdpta}, } @article{GordonHL99, title = {Compilation and Equivalence of Imperative Objects}, author = {Andrew D. Gordon and Paul D. Hankin and Søren B. Lassen}, year = {1999}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonHL99}, cites = {0}, citedby = {0}, journal = {JFP}, volume = {9}, number = {4}, pages = {373-426}, } @article{BeckerFG10, title = {SecPAL: Design and semantics of a decentralized authorization language}, author = {Moritz Y. Becker and Cédric Fournet and Andrew D. Gordon}, year = {2010}, doi = {10.3233/JCS-2009-0364}, url = {http://dx.doi.org/10.3233/JCS-2009-0364}, tags = {programming languages, semantics, rule-based, translation, completeness, language design, constraints, rules, logic programming, programming, database, logic, access control policies, access control, Datalog, design, role-based access control, query language}, researchr = {https://researchr.org/publication/BeckerFG10}, cites = {0}, citedby = {0}, journal = {jcs}, volume = {18}, number = {4}, pages = {619-665}, } @inproceedings{GordonJ01:1, title = {A Type and Effect Analysis of Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2126/21260432.htm}, tags = {protocol, analysis, security}, researchr = {https://researchr.org/publication/GordonJ01%3A1}, cites = {0}, citedby = {0}, pages = {432}, booktitle = {SAS}, } @inproceedings{GordonLVCJ04, title = {Branching Storylines in Virtual Reality Environments for Leadership Development}, author = {Andrew D. Gordon and Michael van Lent and Martin Van Velsen and Paul Carpenter and Arnav Jhala}, year = {2004}, tags = {Meta-Environment}, researchr = {https://researchr.org/publication/GordonLVCJ04}, cites = {0}, citedby = {0}, pages = {844-851}, booktitle = {AAAI}, } @article{GordonHH09, title = {Type Inference for Correspondence Types}, author = {Andrew D. Gordon and Hans Hüttel and René Rydhof Hansen}, year = {2009}, doi = {10.1016/j.entcs.2009.07.079}, url = {http://dx.doi.org/10.1016/j.entcs.2009.07.079}, tags = {type inference, meta-model, modeling, constraints, type system, e-science, logic, Meta-Environment, process modeling}, researchr = {https://researchr.org/publication/GordonHH09}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {242}, number = {3}, pages = {21-36}, } @article{AcetoG06, title = {Preface}, author = {Luca Aceto and Andrew D. Gordon}, year = {2006}, doi = {10.1016/j.entcs.2005.12.100}, url = {http://dx.doi.org/10.1016/j.entcs.2005.12.100}, researchr = {https://researchr.org/publication/AcetoG06}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {162}, pages = {1-2}, } @inproceedings{AbadiG97:0, title = {Reasoning about Cryptographic Protocols in the Spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1997}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG97%3A0}, cites = {0}, citedby = {0}, pages = {59-73}, booktitle = {concur}, } @inproceedings{BengtsonBFGM08, title = {Refinement Types for Secure Implementations}, author = {Jesper Bengtson and Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2008}, doi = {10.1109/CSF.2008.27}, url = {http://doi.ieeecomputersociety.org/10.1109/CSF.2008.27}, tags = {refinement}, researchr = {https://researchr.org/publication/BengtsonBFGM08}, cites = {0}, citedby = {0}, pages = {17-32}, booktitle = {csfw}, } @article{Gordon99, title = {Bisimilarity as a Theory of Functional Programming}, author = {Andrew D. Gordon}, year = {1999}, doi = {10.1016/S0304-3975(98)00353-3}, url = {http://dx.doi.org/10.1016/S0304-3975(98)00353-3}, tags = {functional programming, programming}, researchr = {https://researchr.org/publication/Gordon99}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {228}, number = {1-2}, pages = {5-47}, } @article{BorgstromGP08, title = {A Chart Semantics for the Pi-Calculus}, author = {Johannes Borgström and Andrew D. Gordon and Andrew Phillips}, year = {2008}, doi = {10.1016/j.entcs.2007.11.002}, url = {http://dx.doi.org/10.1016/j.entcs.2007.11.002}, tags = {semantics}, researchr = {https://researchr.org/publication/BorgstromGP08}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {194}, number = {2}, pages = {3-29}, } @inproceedings{BhargavanFGS08, title = {Verified implementations of the information card federated identity-management protocol}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Nikhil Swamy}, year = {2008}, doi = {10.1145/1368310.1368330}, url = {http://doi.acm.org/10.1145/1368310.1368330}, tags = {protocol}, researchr = {https://researchr.org/publication/BhargavanFGS08}, cites = {0}, citedby = {0}, pages = {123-135}, booktitle = {ccs}, } @inproceedings{GordonP02, title = {Validating a Web service security abstraction by typing}, author = {Andrew D. Gordon and Riccardo Pucella}, year = {2002}, doi = {10.1145/764792.764797}, url = {http://doi.acm.org/10.1145/764792.764797}, tags = {web service, security, abstraction}, researchr = {https://researchr.org/publication/GordonP02}, cites = {0}, citedby = {0}, pages = {18-29}, booktitle = {xmlsec}, } @inproceedings{Gordon02:1, title = {Authenticity Types for Cryptographic Protocols}, author = {Andrew D. Gordon}, year = {2002}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2629&spage=3}, tags = {protocol}, researchr = {https://researchr.org/publication/Gordon02%3A1}, cites = {0}, citedby = {0}, pages = {3}, booktitle = {fasec}, } @article{AbadiG98:0, title = {A Bisimulation Method for Cryptographic Protocols}, author = {Martín Abadi and Andrew D. Gordon}, year = {1998}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG98%3A0}, cites = {0}, citedby = {0}, journal = {njc}, volume = {5}, number = {4}, pages = {267}, } @inproceedings{CharatonikGT02, title = {Finite-Control Mobile Ambients}, author = {Witold Charatonik and Andrew D. Gordon and Jean-Marc Talbot}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2305/23050295.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CharatonikGT02}, cites = {0}, citedby = {0}, pages = {295-313}, booktitle = {ESOP}, } @inproceedings{BhargavanGN07, title = {Service Combinators for Farming Virtual Machines}, author = {Karthikeyan Bhargavan and Andrew D. Gordon and Iman Narasamdya}, year = {2007}, doi = {10.1007/978-3-540-78663-4_3}, url = {http://dx.doi.org/10.1007/978-3-540-78663-4_3}, researchr = {https://researchr.org/publication/BhargavanGN07}, cites = {0}, citedby = {0}, pages = {22}, booktitle = {tgc}, } @inproceedings{Gordon93:2, title = {An Operational Semantics for I/O in a Lazy Functional Language}, author = {Andrew D. Gordon}, year = {1993}, tags = {laziness, semantics, operational semantics}, researchr = {https://researchr.org/publication/Gordon93%3A2}, cites = {0}, citedby = {0}, pages = {136-145}, booktitle = {fpca}, } @inproceedings{BhargavanFG10, title = {Modular verification of security protocol code by typing}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2010}, doi = {10.1145/1706299.1706350}, url = {http://doi.acm.org/10.1145/1706299.1706350}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFG10}, cites = {0}, citedby = {0}, pages = {445-456}, booktitle = {POPL}, } @article{CharatonikDGMT03, title = {Model checking mobile ambients}, author = {Witold Charatonik and Silvano Dal-Zilio and Andrew D. Gordon and Supratik Mukhopadhyay and Jean-Marc Talbot}, year = {2003}, doi = {10.1016/S0304-3975(02)00832-0}, url = {http://dx.doi.org/10.1016/S0304-3975(02)00832-0}, tags = {model checking, meta-model, Meta-Environment, mobile}, researchr = {https://researchr.org/publication/CharatonikDGMT03}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {308}, number = {1-3}, pages = {277-331}, } @article{BhargavanFG05, title = {A semantics for web services authentication}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.tcs.2005.03.005}, url = {http://dx.doi.org/10.1016/j.tcs.2005.03.005}, tags = {semantics, web service, web services}, researchr = {https://researchr.org/publication/BhargavanFG05}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {340}, number = {1}, pages = {102-153}, } @inproceedings{BhargavanFG04, title = {Verifying policy-based security for web services}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/1030083.1030120}, url = {http://doi.acm.org/10.1145/1030083.1030120}, tags = {rule-based, web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFG04}, cites = {0}, citedby = {0}, pages = {268-277}, booktitle = {ccs}, } @article{GordonPT97, title = {Preface}, author = {Andrew D. Gordon and Andrew M. Pitts and Carolyn L. Talcott}, year = {1997}, url = {http://www.elsevier.com/gej-ng/31/29/23/35/23/show/Products/notes/index.htt#001}, researchr = {https://researchr.org/publication/GordonPT97}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {10}, pages = {1}, } @inproceedings{Gordon01, title = {Types for Cyphers: Thwarting Mischief and Malice with Type Theory}, author = {Andrew D. Gordon}, year = {2001}, tags = {type theory}, researchr = {https://researchr.org/publication/Gordon01}, cites = {0}, citedby = {0}, pages = {136}, booktitle = {ppdp}, } @article{GordonJ03, title = {Typing correspondence assertions for communication protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2003}, doi = {10.1016/S0304-3975(02)00333-X}, url = {http://dx.doi.org/10.1016/S0304-3975(02)00333-X}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ03}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {300}, number = {1-3}, pages = {379-409}, } @article{Gordon06, title = {V for Virtual}, author = {Andrew D. Gordon}, year = {2006}, doi = {10.1016/j.entcs.2006.01.030}, url = {http://dx.doi.org/10.1016/j.entcs.2006.01.030}, researchr = {https://researchr.org/publication/Gordon06}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {162}, pages = {177-181}, } @inproceedings{GordonJ02, title = {Types and Effects for Asymmetric Cryptographic Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2002}, url = {http://csdl.computer.org/comp/proceedings/csfw/2002/1689/00/16890077abs.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ02}, cites = {0}, citedby = {0}, pages = {77-91}, booktitle = {csfw}, } @article{Gordon05:0, title = {Preface for the Special Issue: Foundations of Software Science and Computation Structures}, author = {Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.tcs.2004.11.001}, url = {http://dx.doi.org/10.1016/j.tcs.2004.11.001}, tags = {e-science}, researchr = {https://researchr.org/publication/Gordon05%3A0}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {333}, number = {1-2}, pages = {1}, } @article{GordonP05:0, title = {Validating a web service security abstraction by typing}, author = {Andrew D. Gordon and Riccardo Pucella}, year = {2005}, doi = {10.1007/s00165-004-0058-1}, url = {http://dx.doi.org/10.1007/s00165-004-0058-1}, tags = {web service, security, abstraction}, researchr = {https://researchr.org/publication/GordonP05%3A0}, cites = {0}, citedby = {0}, journal = {fac}, volume = {17}, number = {3}, pages = {277-318}, } @inproceedings{Gordon92a, title = {The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic}, author = {Andrew D. Gordon}, year = {1992}, tags = {logic}, researchr = {https://researchr.org/publication/Gordon92a}, cites = {0}, citedby = {0}, pages = {531-534}, booktitle = {iccd}, } @inproceedings{CardelliGG99, title = {Mobility Types for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon and Giorgio Ghelli}, year = {1999}, url = {http://link.springer.de/link/service/series/0558/bibs/1644/16440230.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliGG99}, cites = {0}, citedby = {0}, pages = {230-239}, booktitle = {icalp}, } @inproceedings{CardelliG01:0, title = {Logical Properties of Name Restriction}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2044/20440046.htm}, researchr = {https://researchr.org/publication/CardelliG01%3A0}, cites = {0}, citedby = {0}, pages = {46-60}, booktitle = {tlca}, } @inproceedings{Gordon06:2, title = {Provable Implementations of Security Protocols}, author = {Andrew D. Gordon}, year = {2006}, doi = {10.1109/LICS.2006.43}, url = {http://doi.ieeecomputersociety.org/10.1109/LICS.2006.43}, tags = {protocol, security}, researchr = {https://researchr.org/publication/Gordon06%3A2}, cites = {0}, citedby = {0}, pages = {345-346}, booktitle = {lics}, } @article{GordonJ01, title = {Typing Correspondence Assertions for Communication Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://www.elsevier.com/gej-ng/31/29/23/88/27/show/Products/notes/index.htt#009}, tags = {protocol}, researchr = {https://researchr.org/publication/GordonJ01}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {45}, pages = {119-140}, } @article{AcetoBFG07, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2007}, doi = {10.1016/j.jlap.2006.08.002}, url = {http://dx.doi.org/10.1016/j.jlap.2006.08.002}, researchr = {https://researchr.org/publication/AcetoBFG07}, cites = {0}, citedby = {0}, journal = {jlp}, volume = {70}, number = {2}, pages = {119-120}, } @inproceedings{CardelliG98, title = {Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1998}, url = {http://link.springer.de/link/service/series/0558/bibs/1378/13780140.htm}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG98}, cites = {0}, citedby = {0}, pages = {140-155}, booktitle = {fossacs}, } @article{GordonJ03:0, title = {Authenticity by Typing for Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2003}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ03%3A0}, cites = {0}, citedby = {0}, journal = {jcs}, volume = {11}, number = {4}, pages = {451-520}, } @inproceedings{CalcagnoCG03, title = {Deciding validity in a spatial logic for trees}, author = {Cristiano Calcagno and Luca Cardelli and Andrew D. Gordon}, year = {2003}, doi = {10.1145/604174.604183}, url = {http://doi.acm.org/10.1145/604174.604183}, tags = {logic}, researchr = {https://researchr.org/publication/CalcagnoCG03}, cites = {0}, citedby = {0}, pages = {62-73}, booktitle = {tldi}, } @inproceedings{CroleG94, title = {A Sound Metalogical Semantics for Input/Output Effects}, author = {Roy L. Crole and Andrew D. Gordon}, year = {1994}, tags = {semantics}, researchr = {https://researchr.org/publication/CroleG94}, cites = {0}, citedby = {0}, pages = {339-353}, booktitle = {csl}, } @inproceedings{Gordon02:0, title = {XML Web Services: The Global Computer?}, author = {Andrew D. Gordon}, year = {2002}, tags = {XML, XML Schema, web service, web services}, researchr = {https://researchr.org/publication/Gordon02%3A0}, cites = {0}, citedby = {0}, pages = {355}, booktitle = {ifipTCS}, } @inproceedings{BhargavanFG04:0, title = {A semantics for web services authentication}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/964001.964018}, url = {http://doi.acm.org/10.1145/964001.964018}, tags = {semantics, rule-based, formal semantics, meta-model, XML, XML Schema, protocol, web service, data-flow, certification, security, web services, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/BhargavanFG04%3A0}, cites = {0}, citedby = {0}, pages = {198-209}, booktitle = {POPL}, } @article{CardelliGG00, title = {Secrecy, Group Creation}, author = {Luca Cardelli and Andrew D. Gordon and Giorgio Ghelli}, year = {2000}, url = {http://www.elsevier.com/gej-ng/31/29/23/97/27/show/Products/notes/index.htt#006}, researchr = {https://researchr.org/publication/CardelliGG00}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {40}, pages = {7}, } @inproceedings{GordonM96, title = {Five Axioms of Alpha-Conversion}, author = {Andrew D. Gordon and Thomas F. Melham}, year = {1996}, researchr = {https://researchr.org/publication/GordonM96}, cites = {0}, citedby = {0}, pages = {173-190}, booktitle = {tphol}, } @inproceedings{GordonKNP03, title = {Recognizing Expressions of Commonsense Psychology in English Text}, author = {Andrew D. Gordon and Abe Kazemzadeh and Anish Nair and Milena Petrova}, year = {2003}, url = {http://acl.ldc.upenn.edu/acl2003/main/pdfs/Gordon.pdf}, researchr = {https://researchr.org/publication/GordonKNP03}, cites = {0}, citedby = {0}, pages = {208-215}, booktitle = {acl}, } @inproceedings{CharatonikDGMT01, title = {The Complexity of Model Checking Mobile Ambients}, author = {Witold Charatonik and Silvano Dal-Zilio and Andrew D. Gordon and Supratik Mukhopadhyay and Jean-Marc Talbot}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2030/20300152.htm}, tags = {model checking, meta-model, Meta-Environment, mobile}, researchr = {https://researchr.org/publication/CharatonikDGMT01}, cites = {0}, citedby = {0}, pages = {152-167}, booktitle = {fossacs}, } @article{CardelliGG02, title = {Types for the Ambient Calculus}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2002}, doi = {10.1006/inco.2001.3121}, url = {http://dx.doi.org/10.1006/inco.2001.3121}, researchr = {https://researchr.org/publication/CardelliGG02}, cites = {0}, citedby = {0}, journal = {iandc}, volume = {177}, number = {2}, pages = {160-194}, } @inproceedings{CardelliGG00:0, title = {Secrecy and Group Creation}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1877/18770365.htm}, researchr = {https://researchr.org/publication/CardelliGG00%3A0}, cites = {0}, citedby = {0}, pages = {365-379}, booktitle = {concur}, } @inproceedings{GordonJ05, title = {Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2005}, doi = {10.1007/11539452_17}, url = {http://dx.doi.org/10.1007/11539452_17}, researchr = {https://researchr.org/publication/GordonJ05}, cites = {0}, citedby = {0}, pages = {186-201}, booktitle = {concur}, } @inproceedings{BhargavanFG06, title = {Verified Reference Implementations of WS-Security Protocols}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2006}, doi = {10.1007/11841197_6}, url = {http://dx.doi.org/10.1007/11841197_6}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BhargavanFG06}, cites = {0}, citedby = {0}, pages = {88-106}, booktitle = {wsfm}, } @article{GordonC03, title = {Equational Properties Of Mobile Ambients}, author = {Andrew D. Gordon and Luca Cardelli}, year = {2003}, tags = {mobile}, researchr = {https://researchr.org/publication/GordonC03}, cites = {0}, citedby = {0}, journal = {mscs}, volume = {13}, number = {3}, pages = {371-408}, } @inproceedings{CardelliG00, title = {Anytime, Anywhere: Modal Logics for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2000}, doi = {10.1145/325694.325742}, url = {http://doi.acm.org/10.1145/325694.325742}, tags = {modal logic, logic, mobile}, researchr = {https://researchr.org/publication/CardelliG00}, cites = {0}, citedby = {0}, pages = {365-377}, booktitle = {POPL}, } @inproceedings{Dal-ZilioG00, title = {Region Analysis and a pi-Calculus wiht Groups}, author = {Silvano Dal-Zilio and Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1893/18930001.htm}, tags = {analysis}, researchr = {https://researchr.org/publication/Dal-ZilioG00}, cites = {0}, citedby = {0}, pages = {1-20}, booktitle = {mfcs}, } @article{FournetGM07, title = {A type discipline for authorization policies}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2007}, doi = {10.1145/1275497.1275500}, url = {http://doi.acm.org/10.1145/1275497.1275500}, researchr = {https://researchr.org/publication/FournetGM07}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {29}, number = {5}, pages = {25}, } @inproceedings{Gordon93:0, title = {A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion}, author = {Andrew D. Gordon}, year = {1993}, researchr = {https://researchr.org/publication/Gordon93%3A0}, cites = {0}, citedby = {0}, pages = {413-425}, booktitle = {tphol}, } @inproceedings{GordonJ02:0, title = {Typing One-to-One and One-to-Many Correspondences in Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2002}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2609&spage=263}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ02%3A0}, cites = {0}, citedby = {0}, pages = {263-282}, booktitle = {isss2}, } @article{BhargavanCFG07, title = {Secure sessions for Web services}, author = {Karthikeyan Bhargavan and Ricardo Corin and Cédric Fournet and Andrew D. Gordon}, year = {2007}, doi = {10.1145/1237500.1237504}, url = {http://doi.acm.org/10.1145/1237500.1237504}, tags = {web service, web services}, researchr = {https://researchr.org/publication/BhargavanCFG07}, cites = {0}, citedby = {0}, journal = {tissec}, volume = {10}, number = {2}, pages = {8}, } @inproceedings{HillDGPV03, title = {Guided Conversations about Leadership: Mentoring with Movies and Interactive Characters}, author = {Randall W. Hill Jr. and Jay Douglas and Andrew D. Gordon and Frederic H. Pighin and Martin Van Velsen}, year = {2003}, researchr = {https://researchr.org/publication/HillDGPV03}, cites = {0}, citedby = {0}, pages = {101-108}, booktitle = {AAAI}, } @inproceedings{BoultonGGHHT92, title = {Experience with Embedding Hardware Description Languages in HOL}, author = {Richard J. Boulton and Andrew D. Gordon and Michael J. C. Gordon and John Harrison and John Herbert and John Van Tassel}, year = {1992}, tags = {C++}, researchr = {https://researchr.org/publication/BoultonGGHHT92}, cites = {0}, citedby = {0}, pages = {129-156}, booktitle = {tpcd}, } @inproceedings{CardelliG99, title = {Types for Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1999}, doi = {10.1145/292540.292550}, url = {http://doi.acm.org/10.1145/292540.292550}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG99}, cites = {0}, citedby = {0}, pages = {79-92}, booktitle = {POPL}, } @inproceedings{GordonHL97, title = {Compilation and Equivalence of Imperative Objects}, author = {Andrew D. Gordon and Paul D. Hankin and Søren B. Lassen}, year = {1997}, url = {http://link.springer.de/link/service/series/0558/bibs/1346/13460074.htm}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonHL97}, cites = {0}, citedby = {0}, pages = {74-87}, booktitle = {fsttcs}, } @article{Dal-ZilioG02, title = {Region analysis and a pi-calculus with groups}, author = {Silvano Dal-Zilio and Andrew D. Gordon}, year = {2002}, tags = {analysis}, researchr = {https://researchr.org/publication/Dal-ZilioG02}, cites = {0}, citedby = {0}, journal = {JFP}, volume = {12}, number = {3}, pages = {229-292}, } @inproceedings{FournetGM07:0, title = {A Type Discipline for Authorization in Distributed Systems}, author = {Cédric Fournet and Andrew D. Gordon and Sergio Maffeis}, year = {2007}, doi = {10.1109/CSF.2007.7}, url = {http://dx.doi.org/10.1109/CSF.2007.7}, tags = {type system}, researchr = {https://researchr.org/publication/FournetGM07%3A0}, cites = {0}, citedby = {0}, pages = {31-48}, booktitle = {csfw}, } @inproceedings{MaffeisAFG08, title = {Code-Carrying Authorization}, author = {Sergio Maffeis and Martín Abadi and Cédric Fournet and Andrew D. Gordon}, year = {2008}, doi = {10.1007/978-3-540-88313-5_36}, url = {http://dx.doi.org/10.1007/978-3-540-88313-5_36}, researchr = {https://researchr.org/publication/MaffeisAFG08}, cites = {0}, citedby = {0}, pages = {563-579}, booktitle = {esorics}, } @inproceedings{BhargavanCFG04, title = {Secure sessions for web services}, author = {Karthikeyan Bhargavan and Ricardo Corin and Cédric Fournet and Andrew D. Gordon}, year = {2004}, doi = {10.1145/1111348.1111355}, url = {http://doi.acm.org/10.1145/1111348.1111355}, tags = {web service, web services}, researchr = {https://researchr.org/publication/BhargavanCFG04}, cites = {0}, citedby = {0}, pages = {56-66}, booktitle = {sws}, } @inproceedings{Gordon05:1, title = {From Typed Process Calculi to Source-Based Security}, author = {Andrew D. Gordon}, year = {2005}, doi = {10.1007/11547662_2}, url = {http://dx.doi.org/10.1007/11547662_2}, tags = {rule-based, source-to-source, security, open-source}, researchr = {https://researchr.org/publication/Gordon05%3A1}, cites = {0}, citedby = {0}, pages = {2}, booktitle = {SAS}, } @inproceedings{AbadiG97, title = {A Calculus for Cryptographic Protocols: The Spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1997}, doi = {10.1145/266420.266432}, url = {http://doi.acm.org/10.1145/266420.266432}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG97}, cites = {0}, citedby = {0}, pages = {36-47}, booktitle = {ccs}, } @article{AcetoBFG07a, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2007}, doi = {10.1016/j.jlap.2007.02.001}, url = {http://dx.doi.org/10.1016/j.jlap.2007.02.001}, researchr = {https://researchr.org/publication/AcetoBFG07a}, cites = {0}, citedby = {0}, journal = {jlp}, volume = {72}, number = {1}, pages = {1-2}, } @article{GordonH98, title = {A Concurrent Object Calculus: Reduction and Typing}, author = {Andrew D. Gordon and Paul D. Hankin}, year = {1998}, url = {http://www.elsevier.com/gej-ng/31/29/23/40/26/show/Products/notes/index.htt#007}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonH98}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {16}, number = {3}, pages = {248-264}, } @inproceedings{JonesGF96, title = {Concurrent Haskell}, author = {Simon L. Peyton Jones and Andrew D. Gordon and Sigbjorn Finne}, year = {1996}, doi = {10.1145/237721.237794}, url = {http://doi.acm.org/10.1145/237721.237794}, tags = {Haskell}, researchr = {https://researchr.org/publication/JonesGF96}, cites = {0}, citedby = {0}, pages = {295-308}, booktitle = {POPL}, } @article{CardelliG97, title = {Mobile Ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {1997}, url = {http://www.elsevier.com/gej-ng/31/29/23/35/23/show/Products/notes/index.htt#017}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG97}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {10}, pages = {198-201}, } @inproceedings{Gordon00:4, title = {Notes on Nominal Calculi for Security and Mobility}, author = {Andrew D. Gordon}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/2171/21710262.htm}, tags = {security}, researchr = {https://researchr.org/publication/Gordon00%3A4}, cites = {0}, citedby = {0}, pages = {262-330}, booktitle = {fosad}, } @article{CroleG99, title = {Relating operational and denotational semantics for input/output effects}, author = {Roy L. Crole and Andrew D. Gordon}, year = {1999}, tags = {semantics, denotational semantics, operational semantics}, researchr = {https://researchr.org/publication/CroleG99}, cites = {0}, citedby = {0}, journal = {mscs}, volume = {9}, number = {2}, pages = {125-158}, } @article{CalcagnoCG05, title = {Deciding validity in a spatial logic for trees}, author = {Cristiano Calcagno and Luca Cardelli and Andrew D. Gordon}, year = {2005}, doi = {10.1017/S0956796804005404}, url = {http://dx.doi.org/10.1017/S0956796804005404}, tags = {logic}, researchr = {https://researchr.org/publication/CalcagnoCG05}, cites = {0}, citedby = {0}, journal = {JFP}, volume = {15}, number = {4}, pages = {543-572}, } @inproceedings{GordonS01, title = {Typing a multi-language intermediate code}, author = {Andrew D. Gordon and Don Syme}, year = {2001}, doi = {10.1145/360204.360228}, url = {http://doi.acm.org/10.1145/360204.360228}, researchr = {https://researchr.org/publication/GordonS01}, cites = {0}, citedby = {0}, pages = {248-260}, booktitle = {POPL}, } @article{BhargavanFG08, title = {Verifying policy-based web services security}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon}, year = {2008}, doi = {10.1145/1391956.1391957}, url = {http://doi.acm.org/10.1145/1391956.1391957}, tags = {rule-based, web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFG08}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {30}, number = {6}, } @inproceedings{GordonC99, title = {Equational Properties of Mobile Ambients}, author = {Andrew D. Gordon and Luca Cardelli}, year = {1999}, tags = {mobile}, researchr = {https://researchr.org/publication/GordonC99}, cites = {0}, citedby = {0}, pages = {212-226}, booktitle = {fossacs}, } @article{Gordon95:0, title = {Bisimilarity as a theory of functional programming}, author = {Andrew D. Gordon}, year = {1995}, url = {http://www.elsevier.com/gej-ng/31/29/23/26/23/show/Products/notes/index.htt#014}, tags = {functional programming, programming}, researchr = {https://researchr.org/publication/Gordon95%3A0}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {1}, pages = {232-252}, } @inproceedings{SymeG02, title = {Automating Type Soundness Proofs via Decision Procedures and Guided Reductions}, author = {Don Syme and Andrew D. Gordon}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2514/25140418.htm}, tags = {type soundness}, researchr = {https://researchr.org/publication/SymeG02}, cites = {0}, citedby = {0}, pages = {418-434}, booktitle = {lpar}, } @article{CardelliGG05, title = {Secrecy and group creation}, author = {Luca Cardelli and Giorgio Ghelli and Andrew D. Gordon}, year = {2005}, doi = {10.1016/j.ic.2004.08.003}, url = {http://dx.doi.org/10.1016/j.ic.2004.08.003}, researchr = {https://researchr.org/publication/CardelliGG05}, cites = {0}, citedby = {0}, journal = {iandc}, volume = {196}, number = {2}, pages = {127-155}, } @article{AbadiG99, title = {A Calculus for Cryptographic Protocols: The spi Calculus}, author = {Martín Abadi and Andrew D. Gordon}, year = {1999}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG99}, cites = {0}, citedby = {0}, journal = {iandc}, volume = {148}, number = {1}, pages = {1-70}, } @article{CardelliG00:0, title = {Mobile ambients}, author = {Luca Cardelli and Andrew D. Gordon}, year = {2000}, doi = {10.1016/S0304-3975(99)00231-5}, url = {http://dx.doi.org/10.1016/S0304-3975(99)00231-5}, tags = {mobile}, researchr = {https://researchr.org/publication/CardelliG00%3A0}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {240}, number = {1}, pages = {177-213}, } @article{AcetoBFG08, title = {Guest Editors Foreword}, author = {Luca Aceto and Mario Bravetti and Wan Fokkink and Andrew D. Gordon}, year = {2008}, doi = {10.1016/j.jlap.2007.06.001}, url = {http://dx.doi.org/10.1016/j.jlap.2007.06.001}, researchr = {https://researchr.org/publication/AcetoBFG08}, cites = {0}, citedby = {0}, journal = {jlp}, volume = {75}, number = {1}, pages = {1-2}, } @inproceedings{BaltopoulosG09, title = {Secure compilation of a multi-tier web language}, author = {Ioannis G. Baltopoulos and Andrew D. Gordon}, year = {2009}, doi = {10.1145/1481861.1481866}, url = {http://doi.acm.org/10.1145/1481861.1481866}, researchr = {https://researchr.org/publication/BaltopoulosG09}, cites = {0}, citedby = {0}, pages = {27-38}, booktitle = {tldi}, } @inproceedings{BhargavanFGO05, title = {An advisor for web services security policies}, author = {Karthikeyan Bhargavan and Cédric Fournet and Andrew D. Gordon and Greg O Shea}, year = {2005}, doi = {10.1145/1103022.1103024}, url = {http://doi.acm.org/10.1145/1103022.1103024}, tags = {web service, security, web services}, researchr = {https://researchr.org/publication/BhargavanFGO05}, cites = {0}, citedby = {0}, pages = {1-9}, booktitle = {sws}, } @article{FournetG03, title = {Stack inspection: Theory and variants}, author = {Cédric Fournet and Andrew D. Gordon}, year = {2003}, doi = {10.1145/641909.641912}, url = {http://doi.acm.org/10.1145/641909.641912}, researchr = {https://researchr.org/publication/FournetG03}, cites = {0}, citedby = {0}, journal = {TOPLAS}, volume = {25}, number = {3}, pages = {360-399}, } @inproceedings{BhargavanGN08, title = {Service Combinators for Farming Virtual Machines}, author = {Karthikeyan Bhargavan and Andrew D. Gordon and Iman Narasamdya}, year = {2008}, doi = {10.1007/978-3-540-68265-3_3}, url = {http://dx.doi.org/10.1007/978-3-540-68265-3_3}, researchr = {https://researchr.org/publication/BhargavanGN08}, cites = {0}, citedby = {0}, pages = {33-49}, booktitle = {coordination}, } @inproceedings{GordonJ01:0, title = {Authenticity by Typing for Security Protocols}, author = {Andrew D. Gordon and Alan Jeffrey}, year = {2001}, url = {http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460145abs.htm}, tags = {protocol, security}, researchr = {https://researchr.org/publication/GordonJ01%3A0}, cites = {0}, citedby = {0}, pages = {145-159}, booktitle = {csfw}, } @inproceedings{GordonR96, title = {Bisimilarity for a First-Order Calculus of Objects with Subtyping}, author = {Andrew D. Gordon and Gareth D. Rees}, year = {1996}, doi = {10.1145/237721.237807}, url = {http://doi.acm.org/10.1145/237721.237807}, tags = {meta-model, subtyping, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/GordonR96}, cites = {0}, citedby = {0}, pages = {386-395}, booktitle = {POPL}, } @inproceedings{BiermanGHL10, title = {Semantic subtyping with an SMT solver}, author = {Gavin M. Bierman and Andrew D. Gordon and Catalin Hritcu and David E. Langworthy}, year = {2010}, doi = {10.1145/1863543.1863560}, url = {http://doi.acm.org/10.1145/1863543.1863560}, tags = {semantics, model checking, meta-model, modeling language, refinement, language modeling, testing, subtyping, type checking, algebra, logic, type theory, Meta-Environment, domain-specific language}, researchr = {https://researchr.org/publication/BiermanGHL10}, cites = {0}, citedby = {0}, pages = {105-116}, booktitle = {ICFP}, } @inproceedings{AbadiG98, title = {A Bisimulation Method for Cryptographic Protocols}, author = {Martín Abadi and Andrew D. Gordon}, year = {1998}, url = {http://link.springer.de/link/service/series/0558/bibs/1381/13810012.htm}, tags = {protocol}, researchr = {https://researchr.org/publication/AbadiG98}, cites = {0}, citedby = {0}, pages = {12-26}, booktitle = {ESOP}, } @proceedings{fossacs:2003, title = {Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, year = {2003}, tags = {e-science}, researchr = {https://researchr.org/publication/fossacs%3A2003}, cites = {0}, citedby = {0}, booktitle = {Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, conference = {fossacs}, editor = {Andrew D. Gordon}, volume = {2620}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-00897-7}, } @proceedings{esop-2010, title = {Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, year = {2010}, doi = {10.1007/978-3-642-11957-6}, url = {http://dx.doi.org/10.1007/978-3-642-11957-6}, tags = {programming languages, programming}, researchr = {https://researchr.org/publication/esop-2010}, cites = {0}, citedby = {0}, booktitle = {Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, conference = {ESOP}, editor = {Andrew D. Gordon}, volume = {6012}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-11956-9}, } @proceedings{ccs:2006fmse, title = {Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006}, year = {2006}, tags = {security}, researchr = {https://researchr.org/publication/ccs%3A2006fmse}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006}, editor = {Marianne Winslett and Andrew D. Gordon and David Sands}, publisher = {ACM}, isbn = {1-59593-550-9}, }