| 2006 | 
| 30 | EE | Noria Foukia,
Li Zhou,
B. Clifford Neuman:
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.
iTrust 2006: 77-92 | 
| 2005 | 
| 29 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Noria Foukia,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control for grids.
GRID 2005: 55-62 | 
| 28 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control.
SACMAT 2005: 139-146 | 
| 2003 | 
| 27 | EE | Sung-Wook Ryu,
Eul-Gyu Im,
B. Clifford Neuman:
Distributed Garbage Collection by Timeouts and Backward Inquiry.
COMPSAC 2003: 426-432 | 
| 26 | EE | Eul-Gyu Im,
B. Clifford Neuman:
A Flexible Framework for Replication in Distributed Systems.
COMPSAC 2003: 486-491 | 
| 25 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim:
Dynamic Authorization and Intrusion Response in Distributed Systems.
DISCEX (1) 2003: 50-61 | 
| 24 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim,
Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers.
ICDCS 2003: 394- | 
| 23 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim,
Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers.
IEEE Trans. Parallel Distrib. Syst. 14(9): 841-850 (2003) | 
| 2002 | 
| 22 | EE | Tatyana Ryutov,
B. Clifford Neuman:
The Specification and Enforcement of Advanced Security Policies.
POLICY 2002: 128-138 | 
| 2001 | 
| 21 | EE | B. Clifford Neuman:
Condition-Driven Integration of Security Services.
ACISP 2001: 176 | 
| 20 | EE | Tatyana Ryutov,
B. Clifford Neuman:
The Set and Function Approach to Modeling Authorization in Distributed Systems.
MMM-ACNS 2001: 189-206 | 
| 1999 | 
| 19 |   | Tatyana Ryutov,
G. Gheorghiu,
B. Clifford Neuman:
An authorization framework for metacomputing applications.
Cluster Computing 2(2): 165-175 (1999) | 
| 1998 | 
| 18 | EE | G. Gheorghiu,
Tatyana Ryutov,
B. Clifford Neuman:
Authorization for Metacomputing Applications.
HPDC 1998: 132-139 | 
| 17 | EE | B. Clifford Neuman:
Implementation Issues for E-Commerce.
NDSS 1998 | 
| 1995 | 
| 16 |   | B. Clifford Neuman,
Gennady Medvinsky:
Requirements for Network Payment: The NetCheque Perspective.
COMPCON 1995: 32-36 | 
| 15 | EE | Charlie Lai,
B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Electronic Commerce.
Electronic Markets 5(1):  (1995) | 
| 14 |   | B. Clifford Neuman:
Security, Payment, and Privacy for Network Commerce (Invited Paper).
IEEE Journal on Selected Areas in Communications 13(8): 1523-1531 (1995) | 
| 1994 | 
| 13 | EE | Gennady Medvinsky,
Charlie Lai,
B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services.
ACM Conference on Computer and Communications Security 1994: 170-175 | 
| 12 | EE | B. Clifford Neuman,
Santosh Rao:
The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems.
Concurrency - Practice and Experience 6(4): 339-355 (1994) | 
| 1993 | 
| 11 | EE | Gennady Medvinsky,
B. Clifford Neuman:
NetCash: A Design for Practical Electronic Currency on the Internet.
ACM Conference on Computer and Communications Security 1993: 102-106 | 
| 10 |   | B. Clifford Neuman,
Santosh Rao:
Resource Management for Distributed Parallel Systems.
HPDC 1993: 316-323 | 
| 9 |   | B. Clifford Neuman:
Proxy-Based Authorization and Accounting for Distributed Systems.
ICDCS 1993: 283-291 | 
| 8 |   | B. Clifford Neuman,
Stuart G. Stubblebine:
A Note on the Use of Timestamps as Nonces.
Operating Systems Review 27(2): 10-14 (1993) | 
| 1992 | 
| 7 |   | B. Clifford Neuman:
The Prospero File System: A Global File System Based on the Virtual System Model.
Computing Systems 5(4): 407-432 (1992) | 
| 6 |   | Michael F. Schwartz,
Alan Emtage,
Brewster Kahle,
B. Clifford Neuman:
A Comparison of Internet Resource Discovery Approaches.
Computing Systems 5(4): 461-493 (1992) | 
| 5 |   | B. Clifford Neuman:
The Virtual System Project (Abstract).
Operating Systems Review 26(2): 17 (1992) | 
| 1991 | 
| 4 |   | B. Clifford Neuman:
Protection and Security Issues for Future Systems.
Operating Systems of the 90s and Beyond 1991: 184-201 | 
| 1989 | 
| 3 |   | B. Clifford Neuman:
The Need for Closure in Large Distributed Systems.
Operating Systems Review 23(4): 28-30 (1989) | 
| 1988 | 
| 2 |   | Jennifer G. Steiner,
B. Clifford Neuman,
Jeffrey I. Schiller:
Kerberos: An Authentication Service for Open Network Systems.
USENIX Winter 1988: 191-202 | 
| 1 |   | B. Clifford Neuman,
Wayne Yamamoto:
Adding Packet Radio to the Ultrix Kernel.
USENIX Winter 1988: 303-308 |