dblp.uni-trier.dewww.uni-trier.de

B. Clifford Neuman

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
30EENoria Foukia, Li Zhou, B. Clifford Neuman: Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. iTrust 2006: 77-92
2005
29EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control for grids. GRID 2005: 55-62
28EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control. SACMAT 2005: 139-146
2003
27EESung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman: Distributed Garbage Collection by Timeouts and Backward Inquiry. COMPSAC 2003: 426-432
26EEEul-Gyu Im, B. Clifford Neuman: A Flexible Framework for Replication in Distributed Systems. COMPSAC 2003: 486-491
25EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim: Dynamic Authorization and Intrusion Response in Distributed Systems. DISCEX (1) 2003: 50-61
24EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou: Integrated Access Control and Intrusion Detection for Web Servers. ICDCS 2003: 394-
23EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou: Integrated Access Control and Intrusion Detection for Web Servers. IEEE Trans. Parallel Distrib. Syst. 14(9): 841-850 (2003)
2002
22EETatyana Ryutov, B. Clifford Neuman: The Specification and Enforcement of Advanced Security Policies. POLICY 2002: 128-138
2001
21EEB. Clifford Neuman: Condition-Driven Integration of Security Services. ACISP 2001: 176
20EETatyana Ryutov, B. Clifford Neuman: The Set and Function Approach to Modeling Authorization in Distributed Systems. MMM-ACNS 2001: 189-206
1999
19 Tatyana Ryutov, G. Gheorghiu, B. Clifford Neuman: An authorization framework for metacomputing applications. Cluster Computing 2(2): 165-175 (1999)
1998
18EEG. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman: Authorization for Metacomputing Applications. HPDC 1998: 132-139
17EEB. Clifford Neuman: Implementation Issues for E-Commerce. NDSS 1998
1995
16 B. Clifford Neuman, Gennady Medvinsky: Requirements for Network Payment: The NetCheque Perspective. COMPCON 1995: 32-36
15EECharlie Lai, B. Clifford Neuman: Endorsements, Licensing, and Insurance for Electronic Commerce. Electronic Markets 5(1): (1995)
14 B. Clifford Neuman: Security, Payment, and Privacy for Network Commerce (Invited Paper). IEEE Journal on Selected Areas in Communications 13(8): 1523-1531 (1995)
1994
13EEGennady Medvinsky, Charlie Lai, B. Clifford Neuman: Endorsements, Licensing, and Insurance for Distributed System Services. ACM Conference on Computer and Communications Security 1994: 170-175
12EEB. Clifford Neuman, Santosh Rao: The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems. Concurrency - Practice and Experience 6(4): 339-355 (1994)
1993
11EEGennady Medvinsky, B. Clifford Neuman: NetCash: A Design for Practical Electronic Currency on the Internet. ACM Conference on Computer and Communications Security 1993: 102-106
10 B. Clifford Neuman, Santosh Rao: Resource Management for Distributed Parallel Systems. HPDC 1993: 316-323
9 B. Clifford Neuman: Proxy-Based Authorization and Accounting for Distributed Systems. ICDCS 1993: 283-291
8 B. Clifford Neuman, Stuart G. Stubblebine: A Note on the Use of Timestamps as Nonces. Operating Systems Review 27(2): 10-14 (1993)
1992
7 B. Clifford Neuman: The Prospero File System: A Global File System Based on the Virtual System Model. Computing Systems 5(4): 407-432 (1992)
6 Michael F. Schwartz, Alan Emtage, Brewster Kahle, B. Clifford Neuman: A Comparison of Internet Resource Discovery Approaches. Computing Systems 5(4): 461-493 (1992)
5 B. Clifford Neuman: The Virtual System Project (Abstract). Operating Systems Review 26(2): 17 (1992)
1991
4 B. Clifford Neuman: Protection and Security Issues for Future Systems. Operating Systems of the 90s and Beyond 1991: 184-201
1989
3 B. Clifford Neuman: The Need for Closure in Large Distributed Systems. Operating Systems Review 23(4): 28-30 (1989)
1988
2 Jennifer G. Steiner, B. Clifford Neuman, Jeffrey I. Schiller: Kerberos: An Authentication Service for Open Network Systems. USENIX Winter 1988: 191-202
1 B. Clifford Neuman, Wayne Yamamoto: Adding Packet Radio to the Ultrix Kernel. USENIX Winter 1988: 303-308

Coauthor Index

1Alan Emtage [6]
2Noria Foukia [29] [30]
3G. Gheorghiu [18] [19]
4Eul-Gyu Im [26] [27]
5Brewster Kahle [6]
6Dong-Ho Kim [23] [24] [25]
7Charlie Lai [13] [15]
8Travis Leithead [28] [29]
9Gennady Medvinsky [11] [13] [16]
10Santosh Rao [10] [12]
11Sung-Wook Ryu [27]
12Tatyana Ryutov [18] [19] [20] [22] [23] [24] [25] [28] [29]
13Jeffrey I. Schiller [2]
14Michael F. Schwartz [6]
15Kent E. Seamons [28] [29]
16Jennifer G. Steiner [2]
17Stuart G. Stubblebine [8]
18Wayne Yamamoto [1]
19Li Zhou [23] [24] [28] [29] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)