dblp.uni-trier.dewww.uni-trier.de

Peter G. Neumann

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
161EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 34(1): 17-26 (2009)
160EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 34(2): 15-24 (2009)
159EEPeter G. Neumann: Inside risks - U.S. election after-math. Commun. ACM 52(2): 29 (2009)
2008
158EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 11(1): (2008)
157EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(2): 18-28 (2008)
156EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(3): 17-28 (2008)
155EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(4): 17-26 (2008)
154EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(5): (2008)
153EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 33(6): 15-24 (2008)
152EEPeter G. Neumann: Reflections on computer-related risks. Commun. ACM 51(1): 78-80 (2008)
151EEJim Horning, Peter G. Neumann: Risks of neglecting infrastructure. Commun. ACM 51(6): 112 (2008)
2007
150EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(1): 15-20 (2007)
149EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(2): 18-23 (2007)
148EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(3): 20-24 (2007)
147EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(4): 20-29 (2007)
146EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(5): 17-25 (2007)
145EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 32(6): 20-27 (2007)
144 Peter G. Neumann: Reflections on systems trustworthiness. Advances in Computers 70: 269-310 (2007)
143EEHerbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman: Toward a safer and more secure cyberspace. Commun. ACM 50(10): 128 (2007)
142EESteven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann: Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007)
141EEPeter G. Neumann: Widespread network failures. Commun. ACM 50(2): 112 (2007)
140EEPeter G. Neumann: E-migrating risks? Commun. ACM 50(9): 120 (2007)
2006
139EEPeter G. Neumann: System and network trustworthiness in perspective. ACM Conference on Computer and Communications Security 2006: 1-5
138EEPeter G. Neumann: Risks of Untrustworthiness. ACSAC 2006: 321-328
137EESteven Fraser, Gregor Kiczales, Ricardo Lopez, Peter G. Neumann, Linda M. Northrop, Martin C. Rinard, Douglas C. Schmidt, Kevin Sullivan: The ultra challenge: software systems beyond big. OOPSLA Companion 2006: 929-933
136EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(1): 14-19 (2006)
135EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(2): 6-16 (2006)
134EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(3): 17-24 (2006)
133EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(4): 25-37 (2006)
132EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(5): 16-21 (2006)
131EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 31(6): 21-37 (2006)
130EEPeter G. Neumann: Trustworthy systems revisited. Commun. ACM 49(2): 152 (2006)
129EEPeter G. Neumann, Lauren Weinstein: Risks of RFID. Commun. ACM 49(5): 136 (2006)
128EEPeter G. Neumann: Risks relating to system compositions. Commun. ACM 49(7): 120 (2006)
127EEPeter G. Neumann: The foresight saga. Commun. ACM 49(9): 112 (2006)
2005
126EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 30(1): 9 (2005)
125EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 30(1): 9-18 (2005)
124EEPeter G. Neumann: Risks to the Public. ACM SIGSOFT Software Engineering Notes 30(2): 17-25 (2005)
123EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(3): 22-37 (2005)
122EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(4): 19-35 (2005)
121EEPeter G. Neumann: Risks to the public. ACM SIGSOFT Software Engineering Notes 30(6): 14-25 (2005)
120EEPeter G. Neumann: Responsibilities of technologists. Commun. ACM 48(2): 128 (2005)
119EEPeter G. Neumann: Anticipating disasters. Commun. ACM 48(3): 128 (2005)
118EEPeter G. Neumann, Michael D. Byrne: Disability-related risks. Commun. ACM 48(8): 144 (2005)
2004
117EEPeter G. Neumann: When Can Formal Methods Make a Real Difference? ICFEM 2004: 12
116EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(2): 8-16 (2004)
115EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(3): 7-14 (2004)
114EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 29(5): 13-18 (2004)
113EEPeter G. Neumann: Introduction. Commun. ACM 47(10): 28-30 (2004)
112EEPeter G. Neumann: Optimistic optimization. Commun. ACM 47(6): 112 (2004)
111EEPeter G. Neumann: The big picture. Commun. ACM 47(9): 112 (2004)
2003
110EEPeter G. Neumann, Richard J. Feiertag: PSOS Revisited. ACSAC 2003: 208-216
109 Peter G. Neumann: Social and Technical Implications of Nonproprietary Software. BSDCon 2003
108EEPeter G. Neumann: Achieving Principled Assuredly Trustworthy Composable Systems and Networks. DISCEX (2) 2003: 182-187
107EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(2): 12-17 (2003)
106EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(3): 5-9 (2003)
105EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(4): 6-10 (2003)
104EEPeter G. Neumann: Risks to the public in computers and related systems. ACM SIGSOFT Software Engineering Notes 28(6): 6-14 (2003)
103EEPeter G. Neumann: Information system security redux. Commun. ACM 46(10): 136 (2003)
102EERebecca Mercuri, Peter G. Neumann: Security by obscurity. Commun. ACM 46(11): 160 (2003)
101EEPeter G. Neumann: Gambling on system accountability. Commun. ACM 46(2): 120 (2003)
100EEPeter G. Neumann: E-epistemology and misinformation. Commun. ACM 46(5): 104 (2003)
99EEPeter G. Neumann: Risks in trusting untrustworthiness. Commun. ACM 46(9): 120 (2003)
2001
98EERebecca Mercuri, Peter G. Neumann: System integrity revisited. Commun. ACM 44(1): 160 (2001)
97 Lauren Weinstein, Peter G. Neumann: Inside Risks: Risks of Panic. Commun. ACM 44(11): 152 (2001)
96EEPeter G. Neumann, Lauren Weinstein: Risks of National Identity Cards. Commun. ACM 44(12): 176 (2001)
95EEPeter G. Neumann: What to know about risks. Commun. ACM 44(2): 136 (2001)
94EEPeter G. Neumann, David Lorge Parnas: Computers: boon or bane? Commun. ACM 44(3): 168 (2001)
2000
93EEPeter G. Neumann: Certitude and Rectitude. ICRE 2000: 153
92EEPeter G. Neumann: Requirements-Related Risks in Critical Systems. ICRE 2000: 3-
91EEPeter G. Neumann: Robust Nonproprietary Software. IEEE Symposium on Security and Privacy 2000: 122-123
90EEPeter G. Neumann: A Tale of Two Thousands. Commun. ACM 43(3): 144 (2000)
89EEPeter G. Neumann: Denial-of-Service Attacks. Commun. ACM 43(4): 136 (2000)
88EELauren Weinstein, Peter G. Neumann: Internet Risks. Commun. ACM 43(5): 144 (2000)
87EEPeter G. Neumann: Risks in retrospect. Commun. ACM 43(7): 144 (2000)
86EEPeter G. Neumann: Missile defense. Commun. ACM 43(9): 128 (2000)
1999
85EEPeter G. Neumann, Phillip A. Porras: Experience with EMERALD to Date. Workshop on Intrusion Detection and Network Monitoring 1999: 73-80
84EEPeter G. Neumann, Lauren Weinstein: Risks of Content Filtering. Commun. ACM 42(11): 152 (1999)
83EEPeter G. Neumann: Risks of Insiders. Commun. ACM 42(12): 160 (1999)
82EEPeter G. Neumann: Robust Open-Source Software. Commun. ACM 42(2): 128 (1999)
81EEPeter G. Neumann, Declan McCullagh: Risks of Y2K. Commun. ACM 42(6): 144 (1999)
80EEPeter G. Neumann: Information is a Double-Edged Sword. Commun. ACM 42(7): 120 (1999)
79 Peter G. Neumann: IC Online Exclusive Interview: Internet Security - Beyond Cryptography. IEEE Internet Computing 3(2): 100 (1999)
1998
78EEPeter G. Neumann: Protecting the Infrastructures. Commun. ACM 41(1): 128 (1998)
77 Peter G. Neumann: Risks of E-Education. Commun. ACM 41(10): 136 (1998)
76 Peter G. Neumann: Internet Gambling. Commun. ACM 41(2): 112 (1998)
75 Peter G. Neumann: Are Computers Addictive? Commun. ACM 41(3): 128 (1998)
74EEPeter G. Neumann: Laptops in Congress? Commun. ACM 41(7): 128 (1998)
73 Peter G. Neumann: Y2K Update. Commun. ACM 41(9): 128 (1998)
1997
72 Peter G. Neumann: Security and Privacy Issues in Computer and Communication Systems. The Computer Science and Engineering Handbook 1997: 1910-1913
71 Peter G. Neumann: Integrity in Software Development. Commun. ACM 40(10): 144 (1997)
70 Peter G. Neumann: System Development Woes. Commun. ACM 40(12): 160 (1997)
69 Peter G. Neumann: Hopes for Fewer Risks? Commun. ACM 40(2): 170 (1997)
68 Peter G. Neumann: The Big Picture. Commun. ACM 40(5): 136 (1997)
67 Peter G. Neumann, Lauren Weinstein: Spam, Spam, Spam! Commun. ACM 40(6): 112 (1997)
66 Peter G. Neumann: Identity-Ralated Misuse. Commun. ACM 40(7): 112 (1997)
65 Peter G. Neumann: Crypto Key Management. Commun. ACM 40(8): 136 (1997)
1996
64 Peter G. Neumann: Risks in Digital Commerce. Commun. ACM 39(1): 154 (1996)
63 Peter G. Neumann: Disinformation Theory. Commun. ACM 39(10): 138 (1996)
62 Peter G. Neumann: Distributed Systems have Distributed Risks. Commun. ACM 39(11): 130 (1996)
61 Peter G. Neumann: Risks of Anonymity. Commun. ACM 39(12): 162 (1996)
60 Peter G. Neumann, Peter J. Denning: W(h)ither Research and Education? Commun. ACM 39(2): 154 (1996)
59 Peter G. Neumann: A Risks-related Bookshelf. Commun. ACM 39(4): 122 (1996)
58 Peter G. Neumann: Linguistic Risks. Commun. ACM 39(5): 154 (1996)
57 Peter G. Neumann: Using Formal Methods to Reduce Risks. Commun. ACM 39(7): 114 (1996)
1995
56EEPeter G. Neumann: Risks, Responsibilities, and the Future: Walking the Tightwire. ACM Conference on Computer Science 1995: 257
55 Peter G. Neumann: Reviewing the Risks Archives. Commun. ACM 38(12): 138 (1995)
54 Peter G. Neumann: Reassessing the Crypto Debate. Commun. ACM 38(3): 138 (1995)
53 Peter G. Neumann: Computer Vulnerabilities: Exploitation or Avoidance. Commun. ACM 38(6): 138 (1995)
52 Peter G. Neumann: Risks of Easy Answers. Commun. ACM 38(9): 130 (1995)
1994
51 Peter G. Neumann: Inside "Inside Risks". Commun. ACM 37(12): 154 (1994)
50 Peter G. Neumann: Technology, Laws, and Society. Commun. ACM 37(3): 138 (1994)
49 Peter G. Neumann: Risks of Passwords. Commun. ACM 37(4): 126 (1994)
48 Peter G. Neumann: Alternative Passwords. Commun. ACM 37(5): 146 (1994)
47 Peter G. Neumann: Risks on the Information Superhighway. Commun. ACM 37(6): 114 (1994)
46 Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel: Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994)
45 Peter G. Neumann: Friendly Fire. Commun. ACM 37(8): 138 (1994)
44 Peter G. Neumann: Expectations of Security and Privacy. Commun. ACM 37(9): 138 (1994)
1993
43 Peter G. Neumann: Risks Considered Global(ly). Commun. ACM 36(1): 154 (1993)
42 Peter G. Neumann: System Development Woes. Commun. ACM 36(10): 146 (1993)
41 Peter G. Neumann: Are Dependable Systems Feasible? Commun. ACM 36(2): 146 (1993)
40 Peter G. Neumann: Risks of Technology. Commun. ACM 36(3): 130 (1993)
39 Peter G. Neumann: Using Names as Identifiers. Commun. ACM 36(4): 154 (1993)
38 Peter G. Neumann: The Role of Software Engineering. Commun. ACM 36(5): 114 (1993)
37 Peter G. Neumann: Modeling and Simulation. Commun. ACM 36(6): 124 (1993)
36 Peter G. Neumann: Risks on the Rails. Commun. ACM 36(7): 130 (1993)
35 Peter G. Neumann: Risks of Surveillance. Commun. ACM 36(8): 122 (1993)
34 Peter G. Neumann: Animal Crackers. Commun. ACM 36(9): 162 (1993)
33EENancy G. Leveson, Peter G. Neumann: Introduction to Special Issue on Software for Critical Systems. IEEE Trans. Software Eng. 19(1): 1-2 (1993)
1992
32 Peter G. Neumann: Developing Complex Software for Critical Systems. GI Jahrestagung 1992: 117-131
31 Peter G. Neumann: What's in a Name? Commun. ACM 35(1): 186 (1992)
30 Peter G. Neumann: Where to Place Trust. Commun. ACM 35(10): 138 (1992)
29 Peter G. Neumann: Avoiding Weak Links. Commun. ACM 35(12): 146 (1992)
28 Peter G. Neumann: Inside "Risks of Risks". Commun. ACM 35(3): 160 (1992)
27 Peter G. Neumann: Survivable Systems. Commun. ACM 35(5): 130 (1992)
26 Peter G. Neumann: Leap-Year Problems. Commun. ACM 35(6): 162 (1992)
25 Peter G. Neumann: Aggravation by Computer: Life, Death, and Taxes. Commun. ACM 35(7): 122 (1992)
24 Peter G. Neumann: Fraud by Computer. Commun. ACM 35(8): 154 (1992)
23 Peter G. Neumann: Accidental Financial Losses. Commun. ACM 35(9): 194 (1992)
1991
22 Peter G. Neumann: The Clock Grows at Midnight. Commun. ACM 34(1): 170 (1991)
21 Peter G. Neumann: The Human Element. Commun. ACM 34(11): 150 (1991)
20 Peter G. Neumann: Collaborative Effords. Commun. ACM 34(12): 162 (1991)
19 Peter G. Neumann: Certifying Professionals. Commun. ACM 34(2): 130 (1991)
18 Peter G. Neumann: Putting on Your Best Interface. Commun. ACM 34(3): 138 (1991)
17 Peter G. Neumann: Interpreting (Mis)information. Commun. ACM 34(4): 144 (1991)
16 Peter G. Neumann: Expecting the Unexpected Mayday. Commun. ACM 34(5): 128 (1991)
15 Peter G. Neumann: Computers, Ethics, and Values. Commun. ACM 34(7): 106 (1991)
14 Peter G. Neumann: The Not-So-Accidental Holist. Commun. ACM 34(9): 122 (1991)
1990
13 Peter G. Neumann: Ghosts, Mysteries and Uncertainty. Commun. ACM 33(10): 170 (1990)
12 Peter G. Neumann: Risks in Computerized Elections. Commun. ACM 33(11): 170 (1990)
11 Peter G. Neumann: Some Reflections on a Telephone Switching Problem. Commun. ACM 33(7): 154 (1990)
10 Peter G. Neumann: Insecurity about Security? Commun. ACM 33(8): 170 (1990)
9 Peter G. Neumann: A Few Old Coincidences. Commun. ACM 33(9): 202 (1990)
1987
8 Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell: Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987)
1986
7 Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman: Views for Multilevel Database Security. IEEE Symposium on Security and Privacy 1986: 156-172
6 Peter G. Neumann: On Hierarchical Design of Computer Systems for Critical Applications. IEEE Trans. Software Eng. 12(9): 905-920 (1986)
1984
5 Peter G. Neumann: A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. Commun. ACM 27(4): 343 (1984)
1976
4 Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson: Software Development and Proofs of Multi-Level Security. ICSE 1976: 421-428
1975
3 Peter G. Neumann, T. R. N. Rao: Error-Correcting Codes for Byte-Organized Arithmetic Processors. IEEE Trans. Computers 24(3): 226-232 (1975)
1974
2 Peter G. Neumann: Toward a Methodology for Designing Large Systems and Verifying Their Properties. GI Jahrestagung 1974: 52-67
1962
1 Peter G. Neumann: A Note on Cyclic Permutation Error-Correcting Codes Information and Control 5(1): 72-86 (1962)

Coauthor Index

1Selim G. Akl [7] [8]
2Steven M. Bellovin [142]
3Matt Blaze [142]
4Clint Brooks [46]
5Michael D. Byrne [118]
6Scott Charney [46]
7Dorothy E. Denning [7] [8] [46]
8Peter J. Denning [60]
9Whitfield Diffie [46] [142]
10Richard J. Feiertag [4] [110]
11Steven Fraser [137]
12Seymour E. Goodman [143]
13Mark Heckman [7] [8]
14James J. Horning (Jim Horning) [151]
15Stephen T. Kent [46]
16Gregor Kiczales [137]
17Susan Landau [46] [142]
18Anthony Lauck [46]
19Nancy G. Leveson [33]
20Karl N. Levitt [4]
21Herbert S. Lin [143]
22Ricardo Lopez [137]
23Teresa F. Lunt [8]
24Declan McCullagh [81]
25Rebecca T. Mercuri (Rebecca Mercuri) [98] [102]
26Douglas Miller [46]
27Matthew Morgenstern [7] [8]
28Linda M. Northrop [137]
29David Lorge Parnas [94]
30Phillip A. Porras [85]
31T. R. N. Rao (Thammavarapu R. N. Rao) [3]
32Jennifer Rexford [142]
33Martin C. Rinard [137]
34Lawrence Robinson [4]
35Roger R. Schell [7] [8]
36Douglas C. Schmidt [137]
37David Sobel [46]
38Alfred Z. Spector [143]
39Kevin Sullivan [137]
40Lauren Weinstein [67] [84] [88] [96] [97] [129]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)