Michael Burrows

Co-Authors
Google Publications
-
Distributed Authorization With Distributed Grammars
Martin Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly
Programming Languages with Applications to Biology and Security, Springer International Publishing Switzerland, Gewerbestrasse 11 CH-6330 Cham (ZG) Switzerland (2015), pp. 10-26
-
Dapper, a Large-Scale Distributed Systems Tracing Infrastructure
Benjamin H. Sigelman, Luiz André Barroso, Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, Chandan Shanbhag
Google, Inc. (2010)
-
Bigtable: A Distributed Storage System for Structured Data
Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), {USENIX} (2006), pp. 205-218
-
The Chubby lock service for loosely-coupled distributed systems
7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), {USENIX} (2006)
Previous Publications
-
Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!)
Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Michael Burrows, Tushar Chandra, Andrew Fikes, Robert Gruber
OSDI (2006), pp. 205-218
-
Moderately hard, memory-bound functions
Martín Abadi, Michael M. Burrows, Mark Manasse, Ted Wobber
ACM Transactions on Internet Technology, vol. 5 (2005), pp. 299-327
-
Finding stale-value errors in concurrent programs
Michael Burrows, K. Rustan M. Leino
Concurrency and Computation: Practice and Experience, vol. 16 (2004), pp. 1161 - 1172
-
Bankable Postage for Network Services
Martin Aba, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber
ASIAN (2003), pp. 72-90
-
Bankable Postage for Network Services
Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber
ASIAN (2003), pp. 72-90
-
Efficient and Flexible Value Sampling
Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl
ASPLOSProceedings of the 9th International Conference on Architectural Support Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), ACM, Cambridge, MA (2000), pp. 160-167
-
Secure Network Objects
Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
Secure Internet Programming (1999), pp. 395-412
-
Secure Network Objects
Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
IEEE Symposium on Security and Privacy (1996), pp. 211-221
-
Authentication in the Taos Operating System
Edward Wobber, Martín Abadi, Michael Burrows
ACM Trans. Comput. Syst., vol. 12 (1994), pp. 3-32
-
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
ACM Trans. Program. Lang. Syst., vol. 15 (1993), pp. 706-734
-
Authentication in the Taos Operating System
Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
SOSP (1993), pp. 256-269
-
Authentification and Delegation with Smart-Cards
Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
Sci. Comput. Program., vol. 21 (1993), pp. 93-113
-
Authentication in Distributed Systems: Theory and Practice
Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
ACM Trans. Comput. Syst., vol. 10 (1992), pp. 265-310
-
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
CRYPTO (1991), pp. 1-23
-
Authentication and Delegation with Smart-cards
Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
TACS (1991), pp. 326-345
-
Authentication in Distributed Systems: Theory and Practice
Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
SOSP (1991), pp. 165-182
-
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Needham
ACM Trans. Comput. Syst., vol. 8 (1990), pp. 18-36
-
Rejoinder to Nessett
Michael Burrows, Martín Abadi, Roger M. Needham
Operating Systems Review, vol. 24 (1990), pp. 39-40
-
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Needham
SOSP (1989), pp. 1-13
-
Authentication: A Practical Study in Belief and Action
Michael Burrows, Martín Abadi, Roger M. Needham
TARK (1988), pp. 325-342