2006 |
30 | EE | Noria Foukia,
Li Zhou,
B. Clifford Neuman:
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.
iTrust 2006: 77-92 |
2005 |
29 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Noria Foukia,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control for grids.
GRID 2005: 55-62 |
28 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control.
SACMAT 2005: 139-146 |
2003 |
27 | EE | Sung-Wook Ryu,
Eul-Gyu Im,
B. Clifford Neuman:
Distributed Garbage Collection by Timeouts and Backward Inquiry.
COMPSAC 2003: 426-432 |
26 | EE | Eul-Gyu Im,
B. Clifford Neuman:
A Flexible Framework for Replication in Distributed Systems.
COMPSAC 2003: 486-491 |
25 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim:
Dynamic Authorization and Intrusion Response in Distributed Systems.
DISCEX (1) 2003: 50-61 |
24 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim,
Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers.
ICDCS 2003: 394- |
23 | EE | Tatyana Ryutov,
B. Clifford Neuman,
Dong-Ho Kim,
Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers.
IEEE Trans. Parallel Distrib. Syst. 14(9): 841-850 (2003) |
2002 |
22 | EE | Tatyana Ryutov,
B. Clifford Neuman:
The Specification and Enforcement of Advanced Security Policies.
POLICY 2002: 128-138 |
2001 |
21 | EE | B. Clifford Neuman:
Condition-Driven Integration of Security Services.
ACISP 2001: 176 |
20 | EE | Tatyana Ryutov,
B. Clifford Neuman:
The Set and Function Approach to Modeling Authorization in Distributed Systems.
MMM-ACNS 2001: 189-206 |
1999 |
19 | | Tatyana Ryutov,
G. Gheorghiu,
B. Clifford Neuman:
An authorization framework for metacomputing applications.
Cluster Computing 2(2): 165-175 (1999) |
1998 |
18 | EE | G. Gheorghiu,
Tatyana Ryutov,
B. Clifford Neuman:
Authorization for Metacomputing Applications.
HPDC 1998: 132-139 |
17 | EE | B. Clifford Neuman:
Implementation Issues for E-Commerce.
NDSS 1998 |
1995 |
16 | | B. Clifford Neuman,
Gennady Medvinsky:
Requirements for Network Payment: The NetCheque Perspective.
COMPCON 1995: 32-36 |
15 | EE | Charlie Lai,
B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Electronic Commerce.
Electronic Markets 5(1): (1995) |
14 | | B. Clifford Neuman:
Security, Payment, and Privacy for Network Commerce (Invited Paper).
IEEE Journal on Selected Areas in Communications 13(8): 1523-1531 (1995) |
1994 |
13 | EE | Gennady Medvinsky,
Charlie Lai,
B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services.
ACM Conference on Computer and Communications Security 1994: 170-175 |
12 | EE | B. Clifford Neuman,
Santosh Rao:
The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems.
Concurrency - Practice and Experience 6(4): 339-355 (1994) |
1993 |
11 | EE | Gennady Medvinsky,
B. Clifford Neuman:
NetCash: A Design for Practical Electronic Currency on the Internet.
ACM Conference on Computer and Communications Security 1993: 102-106 |
10 | | B. Clifford Neuman,
Santosh Rao:
Resource Management for Distributed Parallel Systems.
HPDC 1993: 316-323 |
9 | | B. Clifford Neuman:
Proxy-Based Authorization and Accounting for Distributed Systems.
ICDCS 1993: 283-291 |
8 | | B. Clifford Neuman,
Stuart G. Stubblebine:
A Note on the Use of Timestamps as Nonces.
Operating Systems Review 27(2): 10-14 (1993) |
1992 |
7 | | B. Clifford Neuman:
The Prospero File System: A Global File System Based on the Virtual System Model.
Computing Systems 5(4): 407-432 (1992) |
6 | | Michael F. Schwartz,
Alan Emtage,
Brewster Kahle,
B. Clifford Neuman:
A Comparison of Internet Resource Discovery Approaches.
Computing Systems 5(4): 461-493 (1992) |
5 | | B. Clifford Neuman:
The Virtual System Project (Abstract).
Operating Systems Review 26(2): 17 (1992) |
1991 |
4 | | B. Clifford Neuman:
Protection and Security Issues for Future Systems.
Operating Systems of the 90s and Beyond 1991: 184-201 |
1989 |
3 | | B. Clifford Neuman:
The Need for Closure in Large Distributed Systems.
Operating Systems Review 23(4): 28-30 (1989) |
1988 |
2 | | Jennifer G. Steiner,
B. Clifford Neuman,
Jeffrey I. Schiller:
Kerberos: An Authentication Service for Open Network Systems.
USENIX Winter 1988: 191-202 |
1 | | B. Clifford Neuman,
Wayne Yamamoto:
Adding Packet Radio to the Ultrix Kernel.
USENIX Winter 1988: 303-308 |