mart´ın abadi · 2005-09-16 · systems 8, 1 (february 1990), 18–36. 50. “temporal logic...

25
Mart´ ın Abadi Professor Computer Science Department University of California at Santa Cruz Santa Cruz, CA 95064, USA [email protected] July 14, 2004 Personal information Born in Buenos Aires, Argentina, in 1963. Argentinian and Italian citizen. U.S. permanent resident. Professional experience Employment July 2001 – present: Professor at the Computer Science Department, Uni- versity of California at Santa Cruz (UCSC). March 2001 – July 2001: Research fellow at the Strategic Technologies and Architectural Research Laboratory, InterTrust Technologies. July 1999 – March 2001: Member of the research staff at Bell Labs Re- search, Lucent Technologies (and, for a time, acting director of a lab). February 1987 – July 1999: Member of the research staff at the Systems Research Center (SRC), Digital Equipment Corporation / Compaq Computer Corporation. Other appointments May 2003 – present: Visiting Professor at the Computer Science Depart- ment, Stanford University. January 1987 – January 2003: Visiting scholar at the Computer Science Department, Stanford University. Consulting 2002 – present: Member of Microsoft’s Trustworthy Computing Academic Advisory Board. 1

Upload: others

Post on 23-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

Martın Abadi

ProfessorComputer Science Department

University of California at Santa CruzSanta Cruz, CA 95064, USA

[email protected]

July 14, 2004

Personal information

Born in Buenos Aires, Argentina, in 1963. Argentinian and Italian citizen.U.S. permanent resident.

Professional experience

Employment

July 2001 – present: Professor at the Computer Science Department, Uni-versity of California at Santa Cruz (UCSC).

March 2001 – July 2001: Research fellow at the Strategic Technologies andArchitectural Research Laboratory, InterTrust Technologies.

July 1999 – March 2001: Member of the research staff at Bell Labs Re-search, Lucent Technologies (and, for a time, acting director of a lab).

February 1987 – July 1999: Member of the research staff at the SystemsResearch Center (SRC), Digital Equipment Corporation / CompaqComputer Corporation.

Other appointments

May 2003 – present: Visiting Professor at the Computer Science Depart-ment, Stanford University.

January 1987 – January 2003: Visiting scholar at the Computer ScienceDepartment, Stanford University.

Consulting

2002 – present: Member of Microsoft’s Trustworthy Computing AcademicAdvisory Board.

1

Page 2: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

2001 – present: Consultant for Microsoft.

2001: Consultant for XDegrees.

1997 – 2001: Contributor to Digital’s projects on authentication and onsecure tunneling, to Netscape’s Secure Socket Layer (SSL) protocoland to the IETF’s TLS protocol (RFC 2246), and to other securityprojects, for employers or on their behalf.

Education

Ph.D. (Computer Science, minor in Mathematics). Stanford University,April 1987.

M.S. (Computer Science). Stanford University, April 1985.

B.S. (Mathematical Sciences). Stanford University, June 1983.

Publication awards

Award paper, 2003 Internet Society Symposium on Network and DistributedSystems Security.

Award paper, 1994 IEEE Symposium on Security and Privacy.

Award paper, 1993 ACM Symposium on Operating Systems Principles.

Award paper, 1989 ACM Symposium on Operating Systems Principles.

Publications

Publications are available at:http://www.soe.ucsc.edu/~abadi/allpapers.html

Book

1. A Theory of Objects. [Martın Abadi and Luca Cardelli] Springer-Verlag (1996).

Articles in collections

2. “On Access Control, Data Integration, and Their Languages” [MartınAbadi] Computer Systems: Theory, Technology and Applications, ATribute to Roger Needham (A. Herbert and K. Sparck Jones, eds.),Springer-Verlag (2004), 9–14.

2

Page 3: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

3. “A Logic of Object-Oriented Programs” [Martın Abadi and K. Rus-tan M. Leino] Verification: Theory and Practice, Essays Dedicated toZohar Manna on the Occasion of His 64th Birthday (N. Dershowitz,ed.), Springer-Verlag (2004), 11–41.

4. “Security Protocols and their Properties” [Martın Abadi] Foundationsof Secure Computation (F.L. Bauer and R. Steinbruggen, eds.), NATOScience Series, IOS Press (2000), 39–60. Volume for the 20th Interna-tional Summer School on Foundations of Secure Computation, held inMarktoberdorf, Germany (1999).

5. “Protection in Programming-Language Translations” [Martın Abadi]Secure Internet Programming (J. Vitek and and C.D. Jensen, eds.),Springer-Verlag (1999), 19–34.

6. “Secure Network Objects” [Leendert van Doorn, Martın Abadi, MikeBurrows, and Edward Wobber] Secure Internet Programming (J. Vitekand and C.D. Jensen, eds.), Springer-Verlag (1999), 395–412.

7. “Authentication in Distributed Systems: Theory and Practice” [But-ler Lampson, Martın Abadi, Michael Burrows, and Edward Wobber]Practical Cryptography for Data Internetworks (W. Stallings, ed.),IEEE Computer Society Press (1996), 126–171.

8. “A Logic of Authentication” [Michael Burrows, Martın Abadi,and Roger Needham] Practical Cryptography for Data Internetworks(W. Stallings, ed.), IEEE Computer Society Press (1996), 172–221.

9. “On TLA as a Logic” [Martın Abadi and Stephan Merz] DeductiveProgram Design (M. Broy, ed.), NATO ASI Series, Springer-Verlag(1996), 235–271. Volume for the NATO Advanced Study Institute onDeductive Program Design, held in Marktoberdorf, Germany (1994).

10. “Formal Parametric Polymorphism” [Martın Abadi, Luca Cardelli,and Pierre-Louis Curien] A Collection of Contributions in Honourof Corrado Bohm on the Occasion of his 70th Birthday (M. Dezani-Ciancaglini, S. Ronchi Della Rocca, and M. Venturini Zilli, eds.), El-sevier (1993), 9–58.

Articles in journals

10. “Moderately Hard, Memory-bound Functions” [Martın Abadi, MikeBurrows, Mark Manasse, and Edward Wobber] To appear in ACMTransactions on Internet Technology.

3

Page 4: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

11. “Private Authentication” [Martın Abadi and Cedric Fournet] To ap-pear in Theoretical Computer Science.

12. “Secrecy Types for Asymmetric Communication” [Martın Abadi andBruno Blanchet] Theoretical Computer Science 298, 3 (2003), 387–415.

13. “Reasoning about Secrecy for Active Networks” [Pankaj Kakkar, CarlA. Gunter, and Martın Abadi] Journal of Computer Security 11, 2(2003), 245–287.

14. “Secure Implementation of Channel Abstractions” [Martın Abadi,Cedric Fournet, and Georges Gonthier] Information and Computation174, 1 (April 2002), 37–83.

15. “Reconciling Two Views of Cryptography (The Computational Sound-ness of Formal Encryption)” [Martın Abadi and Phillip Rogaway]Journal of Cryptology 15, 2 (2002), 103–127.

16. “>>-Closed Relations and Admissibility” [Martın Abadi] Mathemati-cal Structures in Computer Science 10, 3 (June 2000), 313–320.

17. “Secrecy by Typing in Security Protocols” [Martın Abadi] Journal ofthe ACM 46, 5 (September 1999), 749–786.

18. “A Type System for Java Bytecode Subroutines” [Raymie Stata andMartın Abadi] ACM Transactions on Programming Languages andSystems 21, 1 (January 1999), 90–137. Also appeared as SRC ResearchReport 158.

19. “A Bisimulation Method for Cryptographic Protocols” [Martın Abadiand Andrew D. Gordon] Nordic Journal of Computing 5, 4 (Winter1998), 267–303.

20. “A Calculus for Cryptographic Protocols: The Spi Calculus” [MartınAbadi and Andrew D. Gordon] Information and Computation 148, 1(January 1999), 1–70. An extended version appeared as SRC ResearchReport 149.

21. “On SDSI’s Linked Local Name Spaces” [Martın Abadi] Journal ofComputer Security 6, 1–2 (1998), 3–21.

22. “Explicit Communication Revisited: Two New Attacks on Authen-tication Protocols” [Martın Abadi] IEEE Transactions on SoftwareEngineering 23, 3 (March 1997), 185–186.

4

Page 5: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

23. “On Subtyping and Matching” [Martın Abadi and Luca Cardelli] ACMTransactions on Programming Languages and Systems 18, 4 (July1996), 401–423.

24. “A Theory of Primitive Objects: Untyped and First-Order Systems”[Martın Abadi and Luca Cardelli] Information and Computation 125,2 (March 1996), 78–102.

25. “Prudent Engineering Practice for Cryptographic Protocols” [MartınAbadi and Roger Needham] IEEE Transactions on Software Engineer-ing 22, 1 (January 1996), 6–15.

26. “A Theory of Primitive Objects: Second-Order Systems” [MartınAbadi and Luca Cardelli] Science of Computer Programming 25, 2–3(December 1995), 81–116.

27. “An Imperative Object Calculus” [Martın Abadi and Luca Cardelli]Theory and Practice of Object Systems 1, 3 (1995), 151–166.

28. “Conjoining Specifications” [Martın Abadi and Leslie Lamport] ACMTransactions on Programming Languages and Systems 17, 3 (May1995), 507–534. Also appeared as SRC Research Report 118.

29. “Methods as Assertions” [John Lamping and Martın Abadi] Theoryand Practice of Object Systems 1, 1 (1995), 5–18.

30. “Dynamic Typing in Polymorphic Languages” [Martın Abadi, LucaCardelli, Benjamin Pierce, and Didier Remy] Journal of FunctionalProgramming 5, 1 (January 1995), 111–130. Also appeared as SRCResearch Report 120.

31. “An Old-Fashioned Recipe for Real-Time” [Martın Abadi and LeslieLamport] ACM Transactions on Programming Languages and Systems16, 5 (September 1994), 1543–1571. Also appeared as SRC ResearchReport 91.

32. “Decidability and Expressiveness for First-order Logics of Probability”[Martın Abadi and Joe Halpern] Information and Computation 112, 1(July 1994), 1–36. Also appeared as SRC Research Report 73.

33. “Baby Modula-3 and a Theory of Objects” [Martın Abadi] Journal ofFunctional Programming 4, 2 (April 1994), 249–283. Also appeared asSRC Research Report 95.

34. “A Semantics for Static Type Inference in a Nondeterministic Lan-guage” [Martın Abadi] Information and Computation 109, 1–2 (Febru-ary/March 1994), 300–306.

5

Page 6: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

35. “Authentication in the Taos Operating System” [Edward Wobber,Martın Abadi, Michael Burrows, and Butler Lampson] ACM Trans-actions on Computer Systems 12, 1 (February 1994), 3–32. Also ap-peared as SRC Research Report 117.

36. “Formal Parametric Polymorphism” [Martın Abadi, Luca Cardelli,and Pierre-Louis Curien] Theoretical Computer Science 121, 1–2 (De-cember 1993), 9–58. Also appeared as SRC Research Report 109 andas [10].

37. “Authentication and Delegation with Smart-Cards” [Martın Abadi,Michael Burrows, Charles Kaufman, and Butler Lampson] Science ofComputer Programming 21, 2 (October 1993), 93–113.

38. “A Calculus for Access Control in Distributed Systems” [MartınAbadi, Michael Burrows, Butler Lampson, and Gordon Plotkin] ACMTransactions on Programming Languages and Systems 15, 4 (Septem-ber 1993), 706–734. Also appeared as SRC Research Report 70.

39. “A Logical View of Composition” [Martın Abadi and Gordon Plotkin]Theoretical Computer Science 114, 1 (June 1993), 3–30. Also appearedas SRC Research Report 86.

40. “Composing Specifications” [Martın Abadi and Leslie Lamport] ACMTransactions on Programming Languages and Systems 15, 1 (January1993), 73–132. Also appeared as SRC Research Report 66.

41. “Authentication in Distributed Systems: Theory and Practice” [ButlerLampson, Martın Abadi, Michael Burrows, and Edward Wobber] ACMTransactions on Computer Systems 10, 4 (November 1992), 265–310.Also appeared as SRC Research Report 83 and as [7].

42. “Preserving Liveness: Comments on ‘Safety and Liveness from aMethodological Point of View.’” [Martın Abadi, Bowen Alpern,Krzysztof Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, andFred Schneider] Information Processing Letters 40, 3 (November 1991),141–142.

43. “Explicit Substitutions” [Martın Abadi, Luca Cardelli, Pierre-LouisCurien, and Jean-Jacques Levy] Journal of Functional Programming 1,4 (October 1991), 375–416. Also appeared as SRC Research Report 54.

44. “Faithful Ideal Models for Recursive Polymorphic Types” [MartınAbadi, Benjamin Pierce, and Gordon Plotkin] International Journalof Foundations of Computer Science 2, 1 (August 1991), 1–21.

6

Page 7: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

45. “The Existence of Refinement Mappings” [Martın Abadi and LeslieLamport] Theoretical Computer Science 82, 2 (May 1991), 253–284.Also appeared as SRC Research Report 29.

46. “Dynamic Typing in a Statically-Typed Language” [Martın Abadi,Luca Cardelli, Benjamin Pierce, and Gordon Plotkin] ACM Trans-actions on Programming Languages and Systems 13, 2 (April 1991),237–268. Also appeared as SRC Research Report 47.

47. “Secure Circuit Evaluation: A Protocol Based on Hiding Informa-tion from an Oracle” [Martın Abadi and Joan Feigenbaum] Journal ofCryptology 2, 1 (May 1990), 1–12.

48. “Nonclausal Deduction in First-order Temporal Logic” [Martın Abadiand Zohar Manna] Journal of the ACM 37, 2 (April 1990), 279–317.

49. “A Logic of Authentication” [Michael Burrows, Martın Abadi, andRoger Needham] Proceedings of the Royal Society, Series A, 426, 1871(December 1989), 233–271. Also appeared as SRC Research Report 39,as [8] and, in a shortened form, in ACM Transactions on ComputerSystems 8, 1 (February 1990), 18–36.

50. “Temporal Logic Programming” [Martın Abadi and Zohar Manna]Journal of Symbolic Computation 8, 3 (September 1989), 277–295.

51. “On Hiding Information from an Oracle” [Martın Abadi, Joan Feigen-baum, and Joe Kilian] Journal of Computer and System Sciences 39,1 (August 1989), 21–50.

52. “The Power of Temporal Proofs” [Martın Abadi] Theoretical ComputerScience 65, 1 (June 1989), 35–84. See corrigendum in TheoreticalComputer Science 70 (1990), 275. Also appeared as SRC ResearchReport 30.

Articles in conference proceedings

53. “By Reason and Authority: A System for Authorization of Proof-Carrying Code” [Nathan Whitehead, Martın Abadi, and George Nec-ula] Proceedings of the 17th IEEE Computer Security FoundationsWorkshop (June 2004), 236–250.

54. “Choice in Dynamic Linking” [Martın Abadi, Georges Gonthier,and Benjamin Werner] Foundations of Software Science and Com-putation Structures: 7th International Conference, FOSSACS 2004(I. Walukiewicz, ed.), Springer-Verlag (March 2004), 12–26.

7

Page 8: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

55. “Just Fast Keying in the Pi Calculus” [Martın Abadi, Bruno Blanchet,and Cedric Fournet] Programming Languages and Systems: 13th Eu-ropean Symposium on Programming, ESOP 2004 (D. Schmidt, ed.),Springer-Verlag (March 2004), 340–354.

56. “Bankable Postage for Network Services” [Martın Abadi, AndrewBirrell, Mike Burrows, Frank Dabek, and Ted Wobber] Advancesin Computing Science—ASIAN 2003, Programming Languages andDistributed Computation, 8th Asian Computing Science Conference(V.A. Saraswat, ed.), Springer-Verlag (December 2003), 72–90 (invitedpaper).

57. “Logic in Access Control” [Martın Abadi] Proceedings of the EighteenthAnnual IEEE Symposium on Logic in Computer Science (June 2003),228–233 (invited paper).

58. “Computer-Assisted Verification of a Protocol for Certified Email”[Martın Abadi and Bruno Blanchet] Static Analysis, 10th InternationalSymposium, SAS 2003 (R. Cousot, ed.), Springer-Verlag (June 2003),316–335.

59. “Moderately Hard, Memory-bound Functions” [Martın Abadi, MikeBurrows, Mark Manasse, and Edward Wobber] Proceedings of the 10thAnnual Network and Distributed System Security Symposium (Febru-ary 2003), 25–39. This is a preliminary version of [10].

60. “Access Control based on Execution History” [Martın Abadi andCedric Fournet] Proceedings of the 10th Annual Network and Dis-tributed System Security Symposium (February 2003), 107–121.

61. “Hiding Names: Private Authentication in the Applied Pi Calcu-lus” [Cedric Fournet and Martın Abadi] Software Security – Theoriesand Systems. Mext-NSF-JSPS International Symposium (ISSS’02)(M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, eds.),Springer-Verlag (2003), 317–338. This paper is subsumed by [11].

62. “Private Authentication” [Martın Abadi] Proceedings of the 2002Workshop on Privacy Enhancing Technologies (R. Dingledine andP. Syverson, eds.), Springer-Verlag (2003), 27–40. This paper is sub-sumed by [11].

63. “Certified Email with a Light On-Line Trusted Third Party: De-sign and Implementation” [Martın Abadi, Neal Glew, Bill Horne, andBenny Pinkas] Proceedings of the Eleventh International World WideWeb Conference (May 2002), 387–395.

8

Page 9: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

64. “Analyzing Security Protocols with Secrecy Types and Logic Pro-grams” [Martın Abadi and Bruno Blanchet] Proceedings of the 29thACM Symposium on Principles of Programming Languages (January2002), 33–44.

65. “Formal Eavesdropping and its Computational Interpretation” [Mar-tın Abadi and Jan Jurjens] Theoretical Aspects of Computer Software(N. Kobayashi and B. Pierce, eds.), Springer-Verlag (October 2001),82–94.

66. “Computing Symbolic Models for Verifying Cryptographic Protocols”[Marcelo Fiore and Martın Abadi] Proceedings of the 14th IEEE Com-puter Security Foundations Workshop (June 2001), 160–173.

67. “Secrecy Types for Asymmetric Communication” [Martın Abadi andBruno Blanchet] Foundations of Software Science and Computa-tion Structures: Fourth International Conference, FOSSACS 2001(F. Honsell and M. Miculan, eds.), Springer-Verlag (April 2001), 25–41. This is a preliminary version of [12].

68. “Mobile Values, New Names, and Secure Communication” [MartınAbadi and Cedric Fournet] Proceedings of the 28th ACM Symposiumon Principles of Programming Languages (January 2001), 104–115.

69. “Reconciling Two Views of Cryptography (The Computational Sound-ness of Formal Encryption)” [Martın Abadi and Phillip Rogaway] The-oretical Computer Science, Proceedings of the International Confer-ence IFIP TCS 2000 (J. van Leeuwen et al., eds.), Springer-Verlag(August 2000), 3–22 (invited paper). This is a preliminary versionof [15].

70. “Taming the Adversary” [Martın Abadi] Advances in Cryptology—CRYPTO 2000 (M. Bellare, ed.), Springer-Verlag (August 2000), 353–358 (invited paper).

71. “Reasoning about Secrecy for Active Networks” [Pankaj Kakkar, CarlA. Gunter, and Martın Abadi] Proceedings of the 13th IEEE Com-puter Security Foundations Workshop (July 2000), 118–129. This is apreliminary version of [13].

72. “Authentication Primitives and their Compilation” [Martın Abadi,Cedric Fournet, and Georges Gonthier] Proceedings of the 27th ACMSymposium on Principles of Programming Languages (January 2000),302–315.

9

Page 10: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

73. “A Top-Down Look at a Secure Message” [Martın Abadi, CedricFournet, and Georges Gonthier] Proceedings of the 19th InternationalConference on Foundations of Software Technology and TheoreticalComputer Science (C. Pandu Rangan, V. Raman, and R. Ramanu-jan, eds.), Springer-Verlag (December 1999), 122–141 (invited paper).Parts of this paper are subsumed by [14].

74. “Object Types against Races” [Cormac Flanagan and Martın Abadi]CONCUR ’99 (J.C.M. Baeten and S. Mauw, eds.), Springer-Verlag(August 1999), 288–303.

75. “Secure Communications Processing for Distributed Languages” [Mar-tın Abadi, Cedric Fournet, and Georges Gonthier] Proceedings of the1999 IEEE Symposium on Security and Privacy (May 1999), 74–88.This paper is subsumed by [14].

76. “Secrecy in Programming-Language Semantics” [Martın Abadi] Pro-ceedings of MFPS XV, Mathematical Foundations of Programming Se-mantics, Fifteenth Annual Conference, Electronic Notes in TheoreticalComputer Science 20 (April 1999) (invited paper).

77. “Types for Safe Locking” [Cormac Flanagan and Martın Abadi] Pro-gramming Languages and Systems: 8th European Symposium on Pro-gramming, ESOP ’99 (S.D. Swierstra, ed.), Springer-Verlag (March1999), 91–108.

78. “Security Protocols and Specifications” [Martın Abadi] Foundationsof Software Science and Computation Structures: Second InternationalConference, FOSSACS ’99 (W. Thomas, ed.), Springer-Verlag (March1999), 1–13 (invited paper for the European Joint Conferences on The-ory and Practice of Software). This paper is subsumed by [4].

79. “A Core Calculus of Dependency” [Martın Abadi, Anindya Baner-jee, Nevin Heintze, and Jon G. Riecke] Proceedings of the 26th ACMSymposium on Principles of Programming Languages (January 1999),147–160.

80. “Protection in Programming-Language Translations” [Martın Abadi]Automata, Languages and Programming: 25th International Collo-quium, ICALP’98 (K.G. Larsen, S. Skyum, and G. Winskel, eds.),Springer-Verlag (July 1998), 868–883 (invited paper). Also appearedas SRC Research Report 154. A revised version appeared in a collec-tion [5].

10

Page 11: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

81. “Secure Implementation of Channel Abstractions” [Martın Abadi,Cedric Fournet, and Georges Gonthier] Proceedings of the ThirteenthAnnual IEEE Symposium on Logic in Computer Science (June 1998),105–116. This paper is subsumed by [14].

82. “Two Facets of Authentication” [Martın Abadi] Proceedings of the 11thIEEE Computer Security Foundations Workshop (June 1998), 27–32.Also appeared as SRC Technical Note 1998-007. This paper is sub-sumed by [4].

83. “Secure Web Tunneling” [Martın Abadi, Andrew Birrell, RaymieStata, and Edward Wobber] Proceedings of the 7th International WorldWide Web Conference, Computer Networks and ISDN Systems 30, 1–7(April 1998), 531–539.

84. “A Bisimulation Method for Cryptographic Protocols” [Martın Abadiand Andrew D. Gordon] Programming Languages and Systems: 7thEuropean Symposium on Programming, ESOP ’98 (C. Hankin, ed.),Springer-Verlag (April 1998), 12–26. This is a preliminary versionof [19].

85. “A Type System for Java Bytecode Subroutines” [Raymie Stata andMartın Abadi] Proceedings of the 25th ACM Symposium on Princi-ples of Programming Languages (January 1998), 149–160. This is apreliminary version of [18].

86. “Secrecy by Typing in Security Protocols” [Martın Abadi] TheoreticalAspects of Computer Software (M. Abadi and T. Ito, eds.), Springer-Verlag (September 1997), 611–638 (presented in conjunction with thesymposium). This is a preliminary version of [17].

87. “Reasoning about Cryptographic Protocols in the Spi Calculus” [Mar-tın Abadi and Andrew D. Gordon] CONCUR ’97 (A. Mazurkiewiczand J. Winkowski, eds.), Springer-Verlag (July 1997), 59–73. Thispaper is subsumed by [20].

88. “On SDSI’s Linked Local Name Spaces” [Martın Abadi] Proceedings ofthe 10th IEEE Computer Security Foundations Workshop (June 1997),98–108. This is a preliminary version of [21].

89. “A Logic of Object-Oriented Programs” [Martın Abadi and K. RustanM. Leino] TAPSOFT ’97: Theory and Practice of Software Develop-ment (M. Bidoit and M. Dauchet, eds.), Springer-Verlag (April 1997),682–696. An extended version appeared as SRC Research Report 161,and a further revision in a collection [3].

11

Page 12: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

90. “A Calculus for Cryptographic Protocols: The Spi Calculus” [MartınAbadi and Andrew D. Gordon] Proceedings of the 4th ACM Conferenceon Computer and Communications Security (April 1997), 36–47. Thispaper is subsumed by [20].

91. “A TLA Solution to the RPC-Memory Specification Problem” [MartınAbadi, Leslie Lamport, and Stephan Merz] Formal Systems Specifica-tion: The RPC-Memory Specification Case Study (M. Broy, S. Merz,and K. Spies, eds.), Springer-Verlag (December 1996), 21–66.

92. “Syntactic Considerations on Recursive Types” [Martın Abadi andMarcelo Fiore] Proceedings of the Eleventh Annual IEEE Symposiumon Logic in Computer Science (July 1996), 242–252.

93. “Analysis and Caching of Dependencies” [Martın Abadi, Jean-JacquesLevy, and Butler Lampson] Proceedings of the 1996 ACM InternationalConference on Functional Programming (May 1996), 83–91.

94. “Secure Network Objects” [Leendert van Doorn, Martın Abadi, MikeBurrows, and Edward Wobber] Proceedings of the 1996 IEEE Sympo-sium on Security and Privacy (May 1996), 211–221. A revised versionappeared in a collection [5].

95. “An Interpretation of Objects and Object Types” [Martın Abadi, LucaCardelli, and Ramesh Viswanathan] Proceedings of the 23rd ACMSymposium on Principles of Programming Languages (January 1996),396–409.

96. “The Millicent Protocol for Inexpensive Electronic Commerce” [SteveGlassman, Mark Manasse, Martın Abadi, Paul Gauthier, and PatrickSobalvarro] World Wide Web Journal—Fourth International WorldWide Web Conference Proceedings, O’Reilly & Associates, Inc. (De-cember 1995), 603–618.

97. “An Abstract Account of Composition” [Martın Abadi and StephanMerz] Mathematical Foundations of Computer Science (J. Wieder-mann and P. Hajek, eds.), Springer-Verlag (August 1995), 499–508.

98. “On Subtyping and Matching” [Martın Abadi and Luca Cardelli]ECOOP ’95—Object-Oriented Programming (W. Olthoff, ed.), Sprin-ger-Verlag (August 1995), 145–167 (invited paper). This is a prelimi-nary version of [23].

99. “An Imperative Object Calculus” [Martın Abadi and Luca Cardelli]TAPSOFT ’95: Theory and Practice of Software Development

12

Page 13: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

(P.D. Mosses, M. Nielsen, and M.I. Schwartzbach, eds.), Springer-Verlag (May 1995), 471–485. This is a preliminary version of [27].

100. “A Model for Formal Parametric Polymorphism: A PER Interpre-tation for System R” [Roberto Bellucci, Martın Abadi, and Pierre-Louis Curien] Typed Lambda Calculi and Applications—TLCA ’95(M. Dezani-Ciancaglini and G. Plotkin, eds.), Springer-Verlag (April1995), 32–46.

101. “An Imperative Object Calculus: Basic Typing and Soundness”[Martın Abadi and Luca Cardelli] SIPL ’95 – Proceedings of the SecondACM SIGPLAN Workshop on State in Programming Languages, Tech-nical Report UIUCDCS-R-95-1900, Department of Computer Science,University of Illinois at Urbana-Champaign (January 1995), 19–32.This paper is subsumed by [27].

102. “Open Systems in TLA” [Martın Abadi and Leslie Lamport] Proceed-ings of the Thirteenth Annual ACM Symposium on Principles of Dis-tributed Computing (August 1994), 81–90. This paper is subsumedby [28].

103. “Methods as Assertions” [John Lamping and Martın Abadi] Object-Oriented Programming – Eighth European Conference, ECOOP ’94(M. Tokoro and R. Pareschi, eds.), Springer-Verlag (July 1994), 60–80. This is a preliminary version of [29].

104. “A Semantics of Object Types” [Martın Abadi and Luca Cardelli] Pro-ceedings of the Ninth Annual IEEE Symposium on Logic in ComputerScience (July 1994), 332–341.

105. “Subtyping and Parametricity” [Gordon Plotkin, Martın Abadi, andLuca Cardelli] Proceedings of the Ninth Annual IEEE Symposium onLogic in Computer Science (July 1994), 310–319.

106. “Decomposing Specifications of Concurrent Systems” [Martın Abadiand Leslie Lamport] Programming Concepts, Methods and Cal-culi: Proceedings of the IFIP TC2/WG2.1/WG2.2/WG2.3 Work-ing Conference on Programming Concepts, Methods and Calculi (E.-R. Olderog, ed.), North-Holland (June 1994), 327–340. This paper issubsumed by [28].

107. “Prudent Engineering Practice for Cryptographic Protocols” [MartınAbadi and Roger Needham] Proceedings of the 1994 IEEE Symposiumon Security and Privacy (May 1994), 122–136. Also appeared as SRCResearch Report 125. This is a preliminary version of [25].

13

Page 14: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

108. “A Theory of Primitive Objects: Second-Order Systems” [MartınAbadi and Luca Cardelli] Programming Languages and Systems —ESOP ’94 (D. Sanella, ed.), Springer-Verlag (April 1994), 1–25 (in-vited paper). This is a preliminary version of [26].

109. “A Theory of Primitive Objects: Untyped and First-Order Systems”[Martın Abadi and Luca Cardelli] Theoretical Aspects of ComputerSoftware (M. Hagiya and J.C. Mitchell, eds.), Springer-Verlag (April1994), 296–320. This is a preliminary version of [24].

110. “Extensible Grammars for Language Specialization” [Luca Cardelli,Florian Matthes, and Martın Abadi] Database Programming Lan-guages (DBPL-4) (C. Beeri, A. Ohori, A., and D.E. Shasha, eds.),Springer-Verlag (February 1994), 11–31. This is a preliminary ver-sion of “Extensible Syntax with Lexical Scoping,” SRC Research Re-port 121 (February 1994).

111. “Authentication in the Taos Operating System” [Edward Wobber,Martın Abadi, Michael Burrows, and Butler Lampson] Proceedingsof the Fourteenth ACM Symposium on Operating System Principles(December 1993), 256–269. This is a preliminary version of [35].

112. “A Logic for Parametric Polymorphism” [Gordon Plotkin and Mar-tın Abadi] Typed Lambda Calculi and Applications—TLCA ’93(M. Bezem and J.F. Groote, eds.), Springer-Verlag (March 1993), 361–375.

113. “Formal Parametric Polymorphism” [Martın Abadi, Luca Cardelli,and Pierre-Louis Curien] Proceedings of the Twentieth Annual ACMSymposium on Principles of Programming Languages (January 1993),157–170. This is a preliminary version of [36].

114. “Dynamic Typing in Polymorphic Languages” [Martın Abadi, LucaCardelli, Benjamin Pierce, and Didier Remy] ACM Sigplan Workshopon ML and its Applications (P. Lee, ed.), Technical Report CMU-CS-93-105, School of Computer Science, Carnegie Mellon University (June1992), 92–103. This is a preliminary version of [30].

115. “Linear Logic Without Boxes” [Georges Gonthier, Martın Abadi, andJean-Jacques Levy] Proceedings of the Seventh Annual IEEE Sympo-sium on Logic in Computer Science (June 1992), 223–234.

116. “The Geometry of Optimal Lambda Reduction” [Georges Gonthier,Martın Abadi, and Jean-Jacques Levy] Proceedings of the Nineteenth

14

Page 15: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

Annual ACM Symposium on Principles of Programming Languages(January 1992), 15–26.

117. “Authentication in Distributed Systems: Theory and Practice” [But-ler Lampson, Martın Abadi, Michael Burrows, and Edward Wobber]Proceedings of the Thirteenth ACM Symposium on Operating SystemPrinciples (October 1991), 165–182. This is a preliminary versionof [41].

118. “Authentication and Delegation with Smart-Cards” [Martın Abadi,Michael Burrows, Charles Kaufman, and Butler Lampson] TheoreticalAspects of Computer Software (T. Ito and A.R. Meyer, eds.), Springer-Verlag (September 1991), 326–345. Also appeared as SRC ResearchReport 67. This is a preliminary version of [37]

119. “A Calculus for Access Control in Distributed Systems” [MartınAbadi, Michael Burrows, Butler Lampson, and Gordon Plotkin] Ad-vances in Cryptology—CRYPTO ’91 (J. Feigenbaum, ed.), Springer-Verlag (August 1991), 1–23 (invited paper). This is a preliminaryversion of [38].

120. “A Semantics for a Logic of Authentication” [Martın Abadi and MarkTuttle] Proceedings of the Tenth Annual ACM Symposium on Princi-ples of Distributed Computing (August 1991), 201–216.

121. “An Old-Fashioned Recipe for Real-Time” [Martın Abadi and LeslieLamport] Real-Time: Theory in Practice (J.W. de Bakker et al.,eds.), Springer-Verlag (June 1991), 1–27. This is a preliminary versionof [31].

122. “A Logical View of Composition and Refinement” [Martın Abadi andGordon Plotkin] Proceedings of the Eighteenth Annual ACM Sympo-sium on Principles of Programming Languages (January 1991), 323–332. Part of this is a preliminary version of [39].

123. “An Axiomatization of Lamport’s Temporal Logic of Actions” [MartınAbadi] CONCUR ’90 (J.C.M. Baeten and J.W. Klop, eds.), Springer-Verlag (August 1990), 57–69. Also appeared as SRC Research Re-port 65.

124. “A Per Model of Polymorphism and Recursive Types” [Martın Abadiand Gordon Plotkin] Proceedings of the Fifth Annual IEEE Symposiumon Logic in Computer Science (June 1990), 355–365.

15

Page 16: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

125. “Explicit Substitutions” [Martın Abadi, Luca Cardelli, Pierre-LouisCurien, and Jean-Jacques Levy] Proceedings of the Sixteenth AnnualACM Symposium on Principles of Programming Languages (January1990), 31–46. This is a preliminary version of [43].

126. “A Logic of Authentication” [Michael Burrows, Martın Abadi, andRoger Needham] Proceedings of the Twelfth ACM Symposium on Oper-ating System Principles (December 1989), 1–13. This is a preliminaryversion of [49].

127. “Decidability and Expressiveness for First-order Logics of Probability”[Martın Abadi and Joe Halpern] Proceedings of the 30th Annual IEEESymposium on the Foundations of Computer Science (October 1989),148–153. This is a preliminary version of [32].

128. “The Scope of a Logic of Authentication” [Michael Burrows, MartınAbadi, and Roger Needham] Distributed Computing and Cryptography:Proceedings of a DIMACS Workshop (October 1989), 119–126. Alsoappeared as appendix to SRC Research Report 39.

129. “Realizable and Unrealizable Specifications of Reactive Systems”[Martın Abadi, Leslie Lamport, and Pierre Wolper] Automata, Lan-guages and Programming: 16th International Colloquium, ICALP’89(G. Ausiello et al., eds.), Springer-Verlag (July 1989), 1–17.

130. “Faithful Ideal Models for Recursive Polymorphic Types” [MartınAbadi, Benjamin Pierce, and Gordon Plotkin] Proceedings of theFourth Annual IEEE Symposium on Logic in Computer Science (June1989), 216–225. This is a preliminary version of [44].

131. “Composing Specifications” [Martın Abadi and Leslie Lamport] Step-wise Refinement of Distributed Systems: Models, Formalisms, Cor-rectness (J.W. de Bakker et al., eds.), Springer-Verlag (May 1989),1–41 (invited paper). This is a preliminary version of [40].

132. “Dynamic Typing in a Statically-Typed Language” [Martın Abadi,Luca Cardelli, Benjamin Pierce, and Gordon Plotkin] Proceedings ofthe Sixteenth Annual ACM Symposium on Principles of ProgrammingLanguages (January 1989), 213–227. This is a preliminary versionof [46].

133. “On Generating Solved Instances of Computational Problems” [MartınAbadi, Eric Allender, Andrei Broder, Joan Feigenbaum, and LaneHemachandra] Advances in Cryptology—CRYPTO ’88 (S. Goldwasser,ed.), Springer-Verlag (August 1988), 297–310.

16

Page 17: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

134. “The Existence of Refinement Mappings” [Martın Abadi and LeslieLamport] Proceedings of the Third Annual IEEE Symposium on Logicin Computer Science (July 1988), 165–177. This is a preliminary ver-sion of [45].

135. “Authentication: A Practical Study in Belief and Action” [MichaelBurrows, Martın Abadi, and Roger Needham] Proceedings of the 2ndConference in Theoretical Aspects of Reasoning about Knowledge, Mor-gan Kaufmann (March 1988), 325–342. This paper is subsumedby [49].

136. “A Simple Protocol for Secure Circuit Evaluation” [Martın Abadi andJoan Feigenbaum] STACS 88 (R. Cori and M. Wirsing, eds.), Springer-Verlag (February 1988), 264–272. This paper is subsumed by [47].

137. “Temporal Logic Programming” [Martın Abadi and Zohar Manna]Proceedings of the 1987 IEEE Symposium on Logic Programming (Au-gust 1987), 4–16. This is a preliminary version of [50].

138. “The Power of Temporal Proofs” [Martın Abadi] Proceedings of theIEEE Symposium on Logic in Computer Science (June 1987), 123–130. This is a preliminary version of [52].

139. “On Hiding Information from an Oracle” [Martın Abadi, Joan Feigen-baum, and Joe Kilian] Proceedings of the Nineteenth Annual ACMSymposium on the Theory of Computing (May 1987), 195–203. Thisis a preliminary version of [51].

140. “Modal Theorem Proving” [Martın Abadi and Zohar Manna] Pro-ceedings of the 8th International Conference on Automated Deduction(J.H. Siekmann, ed.), Springer-Verlag (July 1986), 172–189.

141. “A Timely Resolution” [Martın Abadi and Zohar Manna] Proceedingsof the IEEE Symposium on Logic in Computer Science (June 1986),176–186. This paper is subsumed by [48].

142. “Nonclausal Temporal Deduction” [Martın Abadi and Zohar Manna]Logics of Programs (R. Parikh, ed.), Springer-Verlag (June 1985), 1–15. This paper is subsumed by [48].

Abstracts

143. “Built-in Object Security” [Martın Abadi] Object-Oriented Program-ming – ECOOP 2003 (L. Cardelli, ed.), Springer-Verlag (July 2003), 1.

17

Page 18: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

144. “Leslie Lamport’s Properties and Actions” [Martın Abadi] Proceedingsof the Twentieth Annual ACM Symposium on Principles of DistributedComputing (August 2001), 15.

145. “On Hiding Information from an Oracle” [Martın Abadi, Joan Feigen-baum, and Joe Kilian] Proceedings of the Second Annual IEEE Con-ference on Structure in Complexity Theory (June 1987), 9. See [51].

Dissertation

146. “Temporal-Logic Theorem Proving” [Martın Abadi] Doctoral Thesis,Stanford University (March 1987).

Patents

147. “Method for avoiding broadcast deadlocks in a mesh-connected net-work” [with Thomas Rodeheffer] U.S. Patent 6,480,502 (2002).

148. “Method and Apparatus for Annotating a Computer Program to Facil-itate Subsequent Processing of the Program” [with Sanjay Ghemawatand Raymie Stata] U.S. Patent 6,253,370 (2001).

149. “Method for Selectively Restricting Access to Computer Systems”[with Krishna Bharat, Andrei Broder, and Mark Lillibridge] U.S.Patent 6,195,698 (2001).

150. “System and Method for Generating Unique Passwords” [with KrishnaBharat and Johannes Marais] U.S. Patent 6,141,760 (2000).

151. “Method and Apparatus for Strengthening Passwords for Protectionof Computer Systems” [with Mark Lomas and Roger Needham] U.S.Patent 6,079,021 (2000).

152. “Dynamic Fine-Grained Dependency Analysis for a Functional Lan-guage” [with Jim Horning, Butler Lampson, Roy Levin, Jean-JacquesLevy, and Yuan Yu] U.S. Patent 5,940,619 (1999).

153. “Secure Web Tunnel” [with Andrew Birrell, Raymie Stata, and Ed-ward Wobber] U.S. Patent 5,805,803 (1998).

154. “Compound Principals in Access Control Lists” [with Andrew Gold-stein and Butler Lampson] U.S. Patent 5,315,657 (1994).

155. “Computer Network with Modified Host-to-Host Encryption Keys”[with Michael Burrows and Butler Lampson] U.S. Patent 5,268,962(1993).

18

Page 19: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

156. “Access Control Subsystem and Method for Distributed ComputerSystem Using Locally Cached Authentication Credentials” [with An-drew Birrell, Butler Lampson, and Edward Wobber] U.S. Patent5,235,642 (1993).

157. “Access Control Subsystem and Method for Distributed ComputerSystem Using Compound Principals” [with Michael Burrows and Ed-ward Wobber] U.S. Patent 5,173,939 (1992).

Selected invited lectures and lecture series

Invited lectures

European Conference on Object-Oriented Programming (ECOOP), 2003(Darmstadt, Germany).

Eighteenth IEEE Symposium on Logic in Computer Science (LICS), 2003(one-lecture tutorial) (Ottawa, Canada).

Colloquium Jacques Morgenstern (INRIA), 2003 (Sophia Antipolis, France).

“Roger Needham 50 and 5” (a celebration in honor of Roger Needham), 2003(Cambridge, UK).

Foundations of Wide Area Network Computing, 2002 (Malaga, Spain).

The Milner Lecture, 2002 (University of Edinburgh, UK).

Lamport Lecture Series at the Twentieth Annual ACM Symposium on Prin-ciples of Distributed Computing (PODC), 2001 (Newport, Rhode Island).

CRYPTO 2000 (Santa Barbara, California).

First IFIP International Conference on Theoretical Computer Science (IFIPTCS), 2000 (keynote talk) (Sendai, Japan).

Nineteenth Conference on the Foundations of Software Technology and The-oretical Computer Science (FST & TCS), 1999 (Chennai, India).

Fifteenth Conference on Mathematical Foundations of Programming Seman-tics (MFPS XV), 1999 (New Orleans, Louisiana).

1999 European Joint Conferences on Theory and Practice of Software(ETAPS) (Amsterdam, Netherlands).

TYPES 98, Annual Meeting of the Working Group TYPES, 1998 (KlosterIrsee, Germany).

25th International Colloquium on Automata, Languages and Programming(ICALP), 1998 (Aalborg, Denmark).

Open lecture in conjunction with the Third International Symposium onTheoretical Aspects of Computer Software (TACS), 1997 (Sendai, Japan).

19

Page 20: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

ACM Workshop on Functional and Object Oriented Programming, 1997(Jadwisin, Poland).

Second Workshop on Logic, Language, Information and Computation (WoL-LIC), 1995 (Recife, Brazil).

Nineteenth Latin American Computer Science Conference (PANEL), 1993(Buenos Aires, Argentina).

3rd Workshop on Concurrency and Compositionality, 1991 (Goslar, Ger-many).

CRYPTO ’91 (Santa Barbara, California).

Invited tutorials

European Conference on Object-Oriented Programming (ECOOP), 2000(Cannes, France) [with Peter Lee].

4th African Conference on Research in Computer Science, 1998 (Dakar,Senegal).

ACM Conference on Computer and Communications Security, 1998 (SanFrancisco, California) [with George Necula].

Other tutorials (by submission)

European Conference on Object-Oriented Programming (ECOOP), 1997(Jyvaskyla, Finland) [with, and delivered by, Luca Cardelli].

ACM Conference on Object-Oriented Programming Languages and Systems(OOPSLA), 1996 (San Jose, California) [with Luca Cardelli].

Invited short courses

Summer School on Software Security, 2004 (Eugene, Oregon).

TYPES Summer School, 2002 (Giens, France).

1st North American Summer School in Logic, Language, and Information,2002 (Stanford, California).

30th Spring School of Theoretical Computer Science, 2002 (Agay, France)[with Francois Pottier].

Foundations of Wide Area Network Programming, 13th International Schoolfor Computer Science Researchers, 2001 (Lipari, Italy).

International Summer School Marktoberdorf, 1999 (Marktoberdorf, Ger-many).

European Educational Forum Summer School on Foundations of ComputingScience, 1998 (Turku, Finland).

20

Page 21: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

ACM State of the Art Summer School in Computer Science, 1996 (Sobotka,Poland).

International Summer School Marktoberdorf, 1994 (Marktoberdorf, Ger-many).

University service and other professional activities

University service (at UCSC)

In the Computer Science Department:

– Chair of the Faculty Recruitment Committee, since 2002.

– Member of the Undergraduate Committee, 2001 – 2002.

– Member of the Graduate Committee, since 2001.

– Member of the Personnel Committee, since 2001.

Member of the Search Committee for the Associate Dean of Graduate Stud-ies, 2004.

Member of the Graduate Council, 2002–2004.

Member of an Academic Personnel ad hoc committee, 2002 – 2003.

External evaluation committees

Member of the external evaluation committee for the Laboratoire d’Infor-matique (LIX) of the Ecole Polytechnique, France, 2004.

Member of a proposal-review panel for the National Science Foundation,2004.

Member of a proposal-review panel for the National Science Foundation,2003.

Member of the external evaluation committee for the Laboratoire d’Infor-matique (LIX) of the Ecole Polytechnique, France, 2002.

Member of two proposal-review panels for the National Science Foundation,2002.

External member of the Computer Science recruitment committee of theEcole Polytechnique, France, since 2002.

Member of the external evaluation committee for the Computer Science De-partment of the University of Pisa, Italy, 1999.

Member of the external evaluation committee for INRIA’s division for re-search in symbolic computation, programming, and software engineering(Programme 2), France, 1994.

21

Page 22: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

Journal editorial boards

Associate Editor of the ACM Transactions on Programming Languages andSystems, since 2003.

Area Editor of the Journal of the ACM, since 2000.

Member of the Editorial Board of the International Journal of InformationSecurity, since 2000.

Member of the Editorial Board of the Chicago Journal of Theoretical Com-puter Science, since 1994.

Member of the Editorial Board of Information and Computation, since 1991.

Other editorial work

Member of the Editorial Board of the magazine IEEE Security & Privacy,since 2003.

Guest editor of a special issue of Journal of Functional Programming (2003,in progress) [with Greg Morrisett and Andrei Sabelfeld].

Guest editor of a special issue of ACM Transactions on Computational Logic(2002) [with Leonid Libkin and Frank Pfenning].

Member of the Advisory Board for the Springer-Verlag book series Infor-mation Security and Cryptography, since 1998.

Editor of Theoretical Aspects of Computer Software, Proceedings, Springer-Verlag (1997) [with Takayasu Ito].

Conference program chairs

Program co-chair of the 16th International Conference on Concurrency The-ory (CONCUR 2005).

Program chair of the Thirty-second ACM Symposium on Principles of Pro-gramming Languages (POPL 2005).

Senior program chair of the 2002 IEEE Symposium on Security and Privacy.

Junior program chair of the 2001 IEEE Symposium on Security and Privacy.

Program chair of the Fifteenth IEEE Symposium on Logic in Computer Sci-ence (LICS 2000).

Program chair for the Seventh International Workshop on Foundations ofObject-Oriented Languages (FOOL 7, 2000).

Program co-chair of the Third International Symposium on Theoretical As-pects of Computer Software (TACS 1997).

22

Page 23: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

Conference program committees

Member of the program committees for:

– the 14th European Symposium on Programming (ESOP 2005),

– the First Conference on Email and Anti-Spam (CEAS, 2004),

– the 7th Information Security Conference (ISC04),

– the 11th Annual Internet Society Network and Distributed System Secu-rity Symposium (NDSS 2004),

– the Thirty-first ACM Symposium on Principles of Programming Lan-guages (POPL 2004),

– the 2003 Argentinian Workshop on Theoretical Computer Science (WAIT2003),

– the 2003 IEEE Symposium on Security and Privacy,

– the 7th European Symposium on Research in Computer Security (ES-ORICS 2002),

– the 29th International Colloquium on Automata, Languages and Pro-gramming (ICALP 2002),

– the 2001 ACM Conference on Electronic Commerce (EC-01),

– the Tenth European Symposium on Programming (ESOP 2001),

– the 1999 IEEE Computer Security Foundations Workshop,

– the 1999 International Conference on Principles and Practice of Declara-tive Programming (PPDP ’99),

– the Fourteenth IEEE Symposium on Logic in Computer Science (LICS1999),

– the 1999 IEEE Symposium on Security and Privacy,

– the Twenty-sixth ACM Symposium on Principles of Programming Lan-guages (POPL 1999),

– the Fourth ACM Conference on Computer and Communications Security(CCS 1998),

– the 1998 ACM Conference on Object-Oriented Programming Systems,Languages and Applications (OOPSLA ’98),

– the CONCUR ’98 conference,

– the Fourth ECOOP Workshop on Mobile Object Systems (1998),

– the Tenth Conference on Computer-Aided Verification (CAV ’98),

– the 1998 IEEE Symposium on Security and Privacy,

23

Page 24: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

– the Fifth International Workshop on Foundations of Object-Oriented Lan-guages (FOOL 5, 1998),

– the Third ACM Conference on Computer and Communications Security(CCS 1997),

– the 1996 Asian Computing Science Conference,

– the Fifth International Conference on Algebraic Methodology and Soft-ware Technology (AMAST 1996),

– the Fourth International Conference on Algebraic Methodology and Soft-ware Technology (AMAST 1995),

– the Tenth IEEE Symposium on Logic in Computer Science (LICS 1995),

– the Second International Symposium on Theoretical Aspects of ComputerSoftware (TACS 1994),

– the First Smart Card Research and Advanced Application Conference(CARDIS 1994),

– the Third International Conference on Algebraic Methodology and Soft-ware Technology (AMAST 1993),

– the Nineteenth Latin American Computer Science Conference (PANEL1993),

– the Eighth IEEE Symposium on Logic in Computer Science (LICS 1993),

– the Twentieth ACM Symposium on Principles of Programming Languages(POPL 1993),

– the Eleventh ACM Symposium on Principles of Distributed Computing(PODC 1992).

Other conference committees

Member of the Steering Committee of the ACM Symposium on Principlesof Programming Languages (POPL), since 2004.

Member of the organizing committee for the Summer School on the Foun-dations of Security, 2003.

Member of the organizing committee for Foundations of Computer Securityworkshop, 2002.

Member of the steering committee for the International Workshop on Foun-dations of Object-Oriented Languages, from 2000 to 2004.

Member of the organizing committee of the IEEE Symposium on Logic inComputer Science (LICS), from 1988 to 1997 and again from 2000 to 2003,and of its Advisory Board from 1997 to 2003.

24

Page 25: Mart´ın Abadi · 2005-09-16 · Systems 8, 1 (February 1990), 18–36. 50. “Temporal Logic Programming” [Mart´ın Abadi and Zohar Manna] Journal of Symbolic Computation 8,

Teaching

University courses

UCSC, since 2001: regular teaching as faculty member.

– Spring Quarter 2004: security (CS 223),

– Spring Quarter 2004: programming languages (CS 203),

– Fall Quarter 2003: introduction to Computer Science (CS 10),

– Spring Quarter 2003: security (CS 223),

– Fall Quarter 2002: programming languages (CS 203),

– Spring Quarter 2002: programming languages (CS 203),

– Fall Quarter 2001: topics in security (CS 290X).

University of California at Berkeley, Spring Semester 1997: design of pro-gramming languages (CS 263).

Stanford University, Fall Quarter 1994: object-oriented programming lan-guages and their theory (CS 359–2).

Thesis committees

Member of thesis committees for:

– Veronique Cortier, Ecole Normale Superieure de Cachan (PhD, 2003),

– Albert Atserias, UCSC (PhD, 2002),

– Francis Tang, Edinburgh (PhD, 2002),

– Giuseppe Castagna, Paris 7 (Habilitation, 2002),

– Chiara Bodei, Pisa (PhD, 2000),

– Silvano Dal-Zilio, Nice (PhD, 1999),

– Andrew Myers, MIT (Phd, 1998),

– Kathleen Fisher, Stanford (Phd, 1996),

– Ramesh Viswanathan, Stanford (PhD, 1995),

– Roberto Amadio, Pisa (PhD, 1991).

25