2009 | ||
---|---|---|
161 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 34(1): 17-26 (2009) |
160 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 34(2): 15-24 (2009) |
159 | EE | Peter G. Neumann: Inside risks - U.S. election after-math. Commun. ACM 52(2): 29 (2009) |
2008 | ||
158 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 11(1): (2008) |
157 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(2): 18-28 (2008) |
156 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(3): 17-28 (2008) |
155 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(4): 17-26 (2008) |
154 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(5): (2008) |
153 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(6): 15-24 (2008) |
152 | EE | Peter G. Neumann: Reflections on computer-related risks. Commun. ACM 51(1): 78-80 (2008) |
151 | EE | Jim Horning, Peter G. Neumann: Risks of neglecting infrastructure. Commun. ACM 51(6): 112 (2008) |
2007 | ||
150 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(1): 15-20 (2007) |
149 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(2): 18-23 (2007) |
148 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(3): 20-24 (2007) |
147 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(4): 20-29 (2007) |
146 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(5): 17-25 (2007) |
145 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(6): 20-27 (2007) |
144 | Peter G. Neumann: Reflections on systems trustworthiness. Advances in Computers 70: 269-310 (2007) | |
143 | EE | Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman: Toward a safer and more secure cyberspace. Commun. ACM 50(10): 128 (2007) |
142 | EE | Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann: Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) |
141 | EE | Peter G. Neumann: Widespread network failures. Commun. ACM 50(2): 112 (2007) |
140 | EE | Peter G. Neumann: E-migrating risks? Commun. ACM 50(9): 120 (2007) |
2006 | ||
139 | EE | Peter G. Neumann: System and network trustworthiness in perspective. ACM Conference on Computer and Communications Security 2006: 1-5 |
138 | EE | Peter G. Neumann: Risks of Untrustworthiness. ACSAC 2006: 321-328 |
137 | EE | Steven Fraser, Gregor Kiczales, Ricardo Lopez, Peter G. Neumann, Linda M. Northrop, Martin C. Rinard, Douglas C. Schmidt, Kevin Sullivan: The ultra challenge: software systems beyond big. OOPSLA Companion 2006: 929-933 |
136 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(1): 14-19 (2006) |
135 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(2): 6-16 (2006) |
134 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(3): 17-24 (2006) |
133 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(4): 25-37 (2006) |
132 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(5): 16-21 (2006) |
131 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(6): 21-37 (2006) |
130 | EE | Peter G. Neumann: Trustworthy systems revisited. Commun. ACM 49(2): 152 (2006) |
129 | EE | Peter G. Neumann, Lauren Weinstein: Risks of RFID. Commun. ACM 49(5): 136 (2006) |
128 | EE | Peter G. Neumann: Risks relating to system compositions. Commun. ACM 49(7): 120 (2006) |
127 | EE | Peter G. Neumann: The foresight saga. Commun. ACM 49(9): 112 (2006) |
2005 | ||
126 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 30(1): 9 (2005) |
125 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 30(1): 9-18 (2005) |
124 | EE | Peter G. Neumann: Risks to the Public. ACM SIGSOFT Software Engineering Notes 30(2): 17-25 (2005) |
123 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(3): 22-37 (2005) |
122 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(4): 19-35 (2005) |
121 | EE | Peter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(6): 14-25 (2005) |
120 | EE | Peter G. Neumann: Responsibilities of technologists. Commun. ACM 48(2): 128 (2005) |
119 | EE | Peter G. Neumann: Anticipating disasters. Commun. ACM 48(3): 128 (2005) |
118 | EE | Peter G. Neumann, Michael D. Byrne: Disability-related risks. Commun. ACM 48(8): 144 (2005) |
2004 | ||
117 | EE | Peter G. Neumann: When Can Formal Methods Make a Real Difference? ICFEM 2004: 12 |
116 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(2): 8-16 (2004) |
115 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(3): 7-14 (2004) |
114 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(5): 13-18 (2004) |
113 | EE | Peter G. Neumann: Introduction. Commun. ACM 47(10): 28-30 (2004) |
112 | EE | Peter G. Neumann: Optimistic optimization. Commun. ACM 47(6): 112 (2004) |
111 | EE | Peter G. Neumann: The big picture. Commun. ACM 47(9): 112 (2004) |
2003 | ||
110 | EE | Peter G. Neumann, Richard J. Feiertag: PSOS Revisited. ACSAC 2003: 208-216 |
109 | Peter G. Neumann: Social and Technical Implications of Nonproprietary Software. BSDCon 2003 | |
108 | EE | Peter G. Neumann: Achieving Principled Assuredly Trustworthy Composable Systems and Networks. DISCEX (2) 2003: 182-187 |
107 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(2): 12-17 (2003) |
106 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(3): 5-9 (2003) |
105 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(4): 6-10 (2003) |
104 | EE | Peter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(6): 6-14 (2003) |
103 | EE | Peter G. Neumann: Information system security redux. Commun. ACM 46(10): 136 (2003) |
102 | EE | Rebecca Mercuri, Peter G. Neumann: Security by obscurity. Commun. ACM 46(11): 160 (2003) |
101 | EE | Peter G. Neumann: Gambling on system accountability. Commun. ACM 46(2): 120 (2003) |
100 | EE | Peter G. Neumann: E-epistemology and misinformation. Commun. ACM 46(5): 104 (2003) |
99 | EE | Peter G. Neumann: Risks in trusting untrustworthiness. Commun. ACM 46(9): 120 (2003) |
2001 | ||
98 | EE | Rebecca Mercuri, Peter G. Neumann: System integrity revisited. Commun. ACM 44(1): 160 (2001) |
97 | Lauren Weinstein, Peter G. Neumann: Inside Risks: Risks of Panic. Commun. ACM 44(11): 152 (2001) | |
96 | EE | Peter G. Neumann, Lauren Weinstein: Risks of National Identity Cards. Commun. ACM 44(12): 176 (2001) |
95 | EE | Peter G. Neumann: What to know about risks. Commun. ACM 44(2): 136 (2001) |
94 | EE | Peter G. Neumann, David Lorge Parnas: Computers: boon or bane? Commun. ACM 44(3): 168 (2001) |
2000 | ||
93 | EE | Peter G. Neumann: Certitude and Rectitude. ICRE 2000: 153 |
92 | EE | Peter G. Neumann: Requirements-Related Risks in Critical Systems. ICRE 2000: 3- |
91 | EE | Peter G. Neumann: Robust Nonproprietary Software. IEEE Symposium on Security and Privacy 2000: 122-123 |
90 | EE | Peter G. Neumann: A Tale of Two Thousands. Commun. ACM 43(3): 144 (2000) |
89 | EE | Peter G. Neumann: Denial-of-Service Attacks. Commun. ACM 43(4): 136 (2000) |
88 | EE | Lauren Weinstein, Peter G. Neumann: Internet Risks. Commun. ACM 43(5): 144 (2000) |
87 | EE | Peter G. Neumann: Risks in retrospect. Commun. ACM 43(7): 144 (2000) |
86 | EE | Peter G. Neumann: Missile defense. Commun. ACM 43(9): 128 (2000) |
1999 | ||
85 | EE | Peter G. Neumann, Phillip A. Porras: Experience with EMERALD to Date. Workshop on Intrusion Detection and Network Monitoring 1999: 73-80 |
84 | EE | Peter G. Neumann, Lauren Weinstein: Risks of Content Filtering. Commun. ACM 42(11): 152 (1999) |
83 | EE | Peter G. Neumann: Risks of Insiders. Commun. ACM 42(12): 160 (1999) |
82 | EE | Peter G. Neumann: Robust Open-Source Software. Commun. ACM 42(2): 128 (1999) |
81 | EE | Peter G. Neumann, Declan McCullagh: Risks of Y2K. Commun. ACM 42(6): 144 (1999) |
80 | EE | Peter G. Neumann: Information is a Double-Edged Sword. Commun. ACM 42(7): 120 (1999) |
79 | Peter G. Neumann: IC Online Exclusive Interview: Internet Security - Beyond Cryptography. IEEE Internet Computing 3(2): 100 (1999) | |
1998 | ||
78 | EE | Peter G. Neumann: Protecting the Infrastructures. Commun. ACM 41(1): 128 (1998) |
77 | Peter G. Neumann: Risks of E-Education. Commun. ACM 41(10): 136 (1998) | |
76 | Peter G. Neumann: Internet Gambling. Commun. ACM 41(2): 112 (1998) | |
75 | Peter G. Neumann: Are Computers Addictive? Commun. ACM 41(3): 128 (1998) | |
74 | EE | Peter G. Neumann: Laptops in Congress? Commun. ACM 41(7): 128 (1998) |
73 | Peter G. Neumann: Y2K Update. Commun. ACM 41(9): 128 (1998) | |
1997 | ||
72 | Peter G. Neumann: Security and Privacy Issues in Computer and Communication Systems. The Computer Science and Engineering Handbook 1997: 1910-1913 | |
71 | Peter G. Neumann: Integrity in Software Development. Commun. ACM 40(10): 144 (1997) | |
70 | Peter G. Neumann: System Development Woes. Commun. ACM 40(12): 160 (1997) | |
69 | Peter G. Neumann: Hopes for Fewer Risks? Commun. ACM 40(2): 170 (1997) | |
68 | Peter G. Neumann: The Big Picture. Commun. ACM 40(5): 136 (1997) | |
67 | Peter G. Neumann, Lauren Weinstein: Spam, Spam, Spam! Commun. ACM 40(6): 112 (1997) | |
66 | Peter G. Neumann: Identity-Ralated Misuse. Commun. ACM 40(7): 112 (1997) | |
65 | Peter G. Neumann: Crypto Key Management. Commun. ACM 40(8): 136 (1997) | |
1996 | ||
64 | Peter G. Neumann: Risks in Digital Commerce. Commun. ACM 39(1): 154 (1996) | |
63 | Peter G. Neumann: Disinformation Theory. Commun. ACM 39(10): 138 (1996) | |
62 | Peter G. Neumann: Distributed Systems have Distributed Risks. Commun. ACM 39(11): 130 (1996) | |
61 | Peter G. Neumann: Risks of Anonymity. Commun. ACM 39(12): 162 (1996) | |
60 | Peter G. Neumann, Peter J. Denning: W(h)ither Research and Education? Commun. ACM 39(2): 154 (1996) | |
59 | Peter G. Neumann: A Risks-related Bookshelf. Commun. ACM 39(4): 122 (1996) | |
58 | Peter G. Neumann: Linguistic Risks. Commun. ACM 39(5): 154 (1996) | |
57 | Peter G. Neumann: Using Formal Methods to Reduce Risks. Commun. ACM 39(7): 114 (1996) | |
1995 | ||
56 | EE | Peter G. Neumann: Risks, Responsibilities, and the Future: Walking the Tightwire. ACM Conference on Computer Science 1995: 257 |
55 | Peter G. Neumann: Reviewing the Risks Archives. Commun. ACM 38(12): 138 (1995) | |
54 | Peter G. Neumann: Reassessing the Crypto Debate. Commun. ACM 38(3): 138 (1995) | |
53 | Peter G. Neumann: Computer Vulnerabilities: Exploitation or Avoidance. Commun. ACM 38(6): 138 (1995) | |
52 | Peter G. Neumann: Risks of Easy Answers. Commun. ACM 38(9): 130 (1995) | |
1994 | ||
51 | Peter G. Neumann: Inside "Inside Risks". Commun. ACM 37(12): 154 (1994) | |
50 | Peter G. Neumann: Technology, Laws, and Society. Commun. ACM 37(3): 138 (1994) | |
49 | Peter G. Neumann: Risks of Passwords. Commun. ACM 37(4): 126 (1994) | |
48 | Peter G. Neumann: Alternative Passwords. Commun. ACM 37(5): 146 (1994) | |
47 | Peter G. Neumann: Risks on the Information Superhighway. Commun. ACM 37(6): 114 (1994) | |
46 | Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel: Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994) | |
45 | Peter G. Neumann: Friendly Fire. Commun. ACM 37(8): 138 (1994) | |
44 | Peter G. Neumann: Expectations of Security and Privacy. Commun. ACM 37(9): 138 (1994) | |
1993 | ||
43 | Peter G. Neumann: Risks Considered Global(ly). Commun. ACM 36(1): 154 (1993) | |
42 | Peter G. Neumann: System Development Woes. Commun. ACM 36(10): 146 (1993) | |
41 | Peter G. Neumann: Are Dependable Systems Feasible? Commun. ACM 36(2): 146 (1993) | |
40 | Peter G. Neumann: Risks of Technology. Commun. ACM 36(3): 130 (1993) | |
39 | Peter G. Neumann: Using Names as Identifiers. Commun. ACM 36(4): 154 (1993) | |
38 | Peter G. Neumann: The Role of Software Engineering. Commun. ACM 36(5): 114 (1993) | |
37 | Peter G. Neumann: Modeling and Simulation. Commun. ACM 36(6): 124 (1993) | |
36 | Peter G. Neumann: Risks on the Rails. Commun. ACM 36(7): 130 (1993) | |
35 | Peter G. Neumann: Risks of Surveillance. Commun. ACM 36(8): 122 (1993) | |
34 | Peter G. Neumann: Animal Crackers. Commun. ACM 36(9): 162 (1993) | |
33 | EE | Nancy G. Leveson, Peter G. Neumann: Introduction to Special Issue on Software for Critical Systems. IEEE Trans. Software Eng. 19(1): 1-2 (1993) |
1992 | ||
32 | Peter G. Neumann: Developing Complex Software for Critical Systems. GI Jahrestagung 1992: 117-131 | |
31 | Peter G. Neumann: What's in a Name? Commun. ACM 35(1): 186 (1992) | |
30 | Peter G. Neumann: Where to Place Trust. Commun. ACM 35(10): 138 (1992) | |
29 | Peter G. Neumann: Avoiding Weak Links. Commun. ACM 35(12): 146 (1992) | |
28 | Peter G. Neumann: Inside "Risks of Risks". Commun. ACM 35(3): 160 (1992) | |
27 | Peter G. Neumann: Survivable Systems. Commun. ACM 35(5): 130 (1992) | |
26 | Peter G. Neumann: Leap-Year Problems. Commun. ACM 35(6): 162 (1992) | |
25 | Peter G. Neumann: Aggravation by Computer: Life, Death, and Taxes. Commun. ACM 35(7): 122 (1992) | |
24 | Peter G. Neumann: Fraud by Computer. Commun. ACM 35(8): 154 (1992) | |
23 | Peter G. Neumann: Accidental Financial Losses. Commun. ACM 35(9): 194 (1992) | |
1991 | ||
22 | Peter G. Neumann: The Clock Grows at Midnight. Commun. ACM 34(1): 170 (1991) | |
21 | Peter G. Neumann: The Human Element. Commun. ACM 34(11): 150 (1991) | |
20 | Peter G. Neumann: Collaborative Effords. Commun. ACM 34(12): 162 (1991) | |
19 | Peter G. Neumann: Certifying Professionals. Commun. ACM 34(2): 130 (1991) | |
18 | Peter G. Neumann: Putting on Your Best Interface. Commun. ACM 34(3): 138 (1991) | |
17 | Peter G. Neumann: Interpreting (Mis)information. Commun. ACM 34(4): 144 (1991) | |
16 | Peter G. Neumann: Expecting the Unexpected Mayday. Commun. ACM 34(5): 128 (1991) | |
15 | Peter G. Neumann: Computers, Ethics, and Values. Commun. ACM 34(7): 106 (1991) | |
14 | Peter G. Neumann: The Not-So-Accidental Holist. Commun. ACM 34(9): 122 (1991) | |
1990 | ||
13 | Peter G. Neumann: Ghosts, Mysteries and Uncertainty. Commun. ACM 33(10): 170 (1990) | |
12 | Peter G. Neumann: Risks in Computerized Elections. Commun. ACM 33(11): 170 (1990) | |
11 | Peter G. Neumann: Some Reflections on a Telephone Switching Problem. Commun. ACM 33(7): 154 (1990) | |
10 | Peter G. Neumann: Insecurity about Security? Commun. ACM 33(8): 170 (1990) | |
9 | Peter G. Neumann: A Few Old Coincidences. Commun. ACM 33(9): 202 (1990) | |
1987 | ||
8 | Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell: Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987) | |
1986 | ||
7 | Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman: Views for Multilevel Database Security. IEEE Symposium on Security and Privacy 1986: 156-172 | |
6 | Peter G. Neumann: On Hierarchical Design of Computer Systems for Critical Applications. IEEE Trans. Software Eng. 12(9): 905-920 (1986) | |
1984 | ||
5 | Peter G. Neumann: A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. Commun. ACM 27(4): 343 (1984) | |
1976 | ||
4 | Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson: Software Development and Proofs of Multi-Level Security. ICSE 1976: 421-428 | |
1975 | ||
3 | Peter G. Neumann, T. R. N. Rao: Error-Correcting Codes for Byte-Organized Arithmetic Processors. IEEE Trans. Computers 24(3): 226-232 (1975) | |
1974 | ||
2 | Peter G. Neumann: Toward a Methodology for Designing Large Systems and Verifying Their Properties. GI Jahrestagung 1974: 52-67 | |
1962 | ||
1 | Peter G. Neumann: A Note on Cyclic Permutation Error-Correcting Codes Information and Control 5(1): 72-86 (1962) |