dblp.uni-trier.dewww.uni-trier.de

Fred B. Schneider

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
99EEMichael R. Clarkson, Fred B. Schneider: Hyperproperties. CSF 2008: 51-65
98EEYee Jiun Song, Robbert van Renesse, Fred B. Schneider, Danny Dolev: The Building Blocks of Consensus. ICDCN 2008: 54-72
97EEDan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, Fred B. Schneider: Device Driver Safety Through a Reference Validation Mechanism. OSDI 2008: 241-254
2007
96EEFred B. Schneider: Mapping the Security Landscape: A Role for Language Techniques. CONCUR 2007: 1
95EEFred B. Schneider: Credentials-Based Authorization: Evaluation and Implementation. ICALP 2007: 12-14
2006
94EERiccardo Pucella, Fred B. Schneider: Independence From Obfuscation: A Semantic Framework for Dive. CSFW 2006: 230-241
93EEKevin W. Hamlen, Greg Morrisett, Fred B. Schneider: Certified In-lined Reference Monitoring on .NET. PLAS 2006: 7-16
92EEKevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006)
2005
91EEMichael R. Clarkson, Andrew C. Myers, Fred B. Schneider: Belief in Information Flow. CSFW 2005: 31-45
90EELidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz: Distributed Blinding for Distributed ElGamal Re-Encryption. ICDCS 2005: 815-824
89EELidong Zhou, Fred B. Schneider, Robbert van Renesse: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005)
88EEScott D. Stoller, Fred B. Schneider: Automated Analysis of Fault-Tolerance in Distributed Systems. Formal Methods in System Design 26(2): 183-196 (2005)
87EEFred B. Schneider: It Depends on What You Pay. IEEE Security & Privacy 3(3): 3 (2005)
86EESusan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security & Privacy 3(3): 9-11 (2005)
85EEFred B. Schneider, Lidong Zhou: Implementing Trustworthy Services Using Replicated State Machines. IEEE Security & Privacy 3(5): 34-43 (2005)
2004
84EEWilliam K. Josephson, Emin Gün Sirer, Fred B. Schneider: Peer-to-Peer Authentication with a Distributed Single Sign-On Service. IPTPS 2004: 250-258
83EERobbert van Renesse, Fred B. Schneider: Chain Replication for Supporting High Throughput and Availability. OSDI 2004: 91-104
82EEFred B. Schneider: From the Editors: The Next Digital Divide. IEEE Security & Privacy 2(1): 5 (2004)
81EEFred B. Schneider: Time Out for Station Identification. IEEE Security & Privacy 2(5): 5 (2004)
80EEMichael A. Marsh, Fred B. Schneider: CODEX: A Robust and Secure Secret Distribution System. IEEE Trans. Dependable Sec. Comput. 1(1): 34-47 (2004)
2003
79EEDag Johansen, Robbert van Renesse, Fred B. Schneider: WAIF: Web of Asynchronous Information Filters. Future Directions in Distributed Computing 2003: 81-86
78EEYaron Minsky, Fred B. Schneider: Tolerating malicious gossip. Distributed Computing 16(1): 49-68 (2003)
77EEFred B. Schneider: Least Privilege and More. IEEE Security & Privacy 1(5): 55-59 (2003)
2002
76EEFred B. Schneider: Lifting Reference Monitors from the Kernel. FASec 2002: 1-2
75EELidong Zhou, Fred B. Schneider, Robbert van Renesse: COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4): 329-368 (2002)
74EEFred B. Schneider: Secure systems conundrum. Commun. ACM 45(10): 160 (2002)
73 Dag Johansen, Kåre J. Lauvset, Robbert van Renesse, Fred B. Schneider, Nils P. Sudmann, Kjetil Jacobsen: A TACOMA retrospective. Softw., Pract. Exper. 32(6): 605-619 (2002)
2001
72EEFred B. Schneider, J. Gregory Morrisett, Robert Harper: A Language-Based Approach to Security. Informatics 2001: 86-101
71EEFred B. Schneider: Language-Based Security: What's Needed and Why. SAS 2001: 374
2000
70EEFred B. Schneider: Open Source in Security: Visiting the Bizarre. IEEE Symposium on Security and Privacy 2000: 126-127
69EEÚlfar Erlingsson, Fred B. Schneider: IRM Enforcement of Java Stack Inspection. IEEE Symposium on Security and Privacy 2000: 246-255
68EEFred B. Schneider: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1): 30-50 (2000)
67EEDejan S. Milojicic, Fred B. Schneider: Interview - Fred B. Schneider on Distributed Computing. IEEE Distributed Systems Online 1(1): (2000)
1999
66EEDag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, Dmitrii Zagorodnov: NAP: Practical Fault-Tolerance for Itinerant Computations. ICDCS 1999: 180-189
65EEFred B. Schneider, Steven M. Bellovin: Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999)
64 Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye: Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Computing 3(6): 64-72 (1999)
1998
63EEScott D. Stoller, Fred B. Schneider: Automated Stream-Based Analysis of Fault-Tolerance. FTRTFT 1998: 113-122
62 Fred B. Schneider: Toward Trustworthy Networked Information Systems. Commun. ACM 41(11): 144 (1998)
61 Fred B. Schneider: On Concurrent Programming. Commun. ACM 41(4): 128 (1998)
60 David Gries, Fred B. Schneider: Adding the Everywhere Operator to Propositional Logic. J. Log. Comput. 8(1): 119-129 (1998)
1997
59 Fred B. Schneider: Towards Fault-Tolerant and Secure Agentry. WDAG 1997: 1-14
58 Danny Dolev, Rüdiger Reischuk, Fred B. Schneider, H. Raymond Strong: Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. Real-Time Systems 12(3): 329-345 (1997)
1996
57EEYaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller: Cryptographic support for fault-tolerant distributed computing. ACM SIGOPS European Workshop 1996: 109-114
56EEDag Johansen, Robbert van Renesse, Fred B. Schneider: Supporting broad internet access to TACOMA. ACM SIGOPS European Workshop 1996: 55-58
55 Fred B. Schneider: On traditions in Marktoberdorf. NATO ASI DPD 1996: 1-4
54 Fred B. Schneider: Notes on proof outline logic. NATO ASI DPD 1996: 351-394
53EEThomas C. Bressoud, Fred B. Schneider: Hypervisor-Based Fault Tolerance. ACM Trans. Comput. Syst. 14(1): 80-107 (1996)
1995
52EEDavid Gries, Fred B. Schneider, Joan Krone, J. Stanley Warford, J. Peter Weston: Teaching as a logic tool (abstract). SIGCSE 1995: 384-385
51 Thomas C. Bressoud, Fred B. Schneider: Hypervisor-based Fault-tolerance. SOSP 1995: 1-11
50 Scott D. Stoller, Fred B. Schneider: Faster Possibility Detection by Combining Two Approaches. WDAG 1995: 318-332
49 David Gries, Fred B. Schneider: Avoiding the Undefined by Underspecification. Computer Science Today 1995: 366-373
48EEDavid Gries, Fred B. Schneider: Equational Propositional Logic. Inf. Process. Lett. 53(3): 145-152 (1995)
47 Scott D. Stoller, Fred B. Schneider: Verifying Programs That Use Causally-Ordered Message-Passing. Sci. Comput. Program. 24(2): 105-128 (1995)
1994
46 David Gries, Fred B. Schneider: Teaching Logic as a Tool. CSEE 1994: 599-599
45 Limor Fix, Fred B. Schneider: Hybrid Verification by Exploiting the Environment. FTRTFT 1994: 1-18
44 Limor Fix, Fred B. Schneider: Reasoning about Programs by Exploiting the Environment. ICALP 1994: 328-339
1993
43 David Gries, Fred B. Schneider: A Logical Approach to Discrete Math. Springer 1993
42 Nils Klarlund, Fred B. Schneider: Proving Nondeterministically Specified Safety Properties Using Progress Measures Inf. Comput. 107(1): 151-170 (1993)
41 Özalp Babaoglu, Keith Marzullo, Fred B. Schneider: A Formalization of Priority Inversion. Real-Time Systems 5(4): 285-303 (1993)
1992
40 Navin Budhiraja, Keith Marzullo, Fred B. Schneider, Sam Toueg: Optimal Primary-Backup Protocols. WDAG 1992: 362-378
39EEJennifer Widom, David Gries, Fred B. Schneider: Trace-Based Network Proof Systems: Expressiveness and Completeness. ACM Trans. Program. Lang. Syst. 14(3): 396-416 (1992)
38 Fred B. Schneider: Introduction. Distributed Computing 6(1): 1-3 (1992)
1991
37 Fred B. Schneider, Bard Bloom, Keith Marzullo: Putting Time into Proof Outlines. REX Workshop 1991: 618-639
36 Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider: Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. Inf. Process. Lett. 40(3): 141-142 (1991)
1990
35 Fred B. Schneider: Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Comput. Surv. 22(4): 299-319 (1990)
1989
34EEBowen Alpern, Fred B. Schneider: Verifying Temporal Properties without Temporal Logic. ACM Trans. Program. Lang. Syst. 11(1): 147-167 (1989)
1987
33 Bowen Alpern, Fred B. Schneider: Proving Boolean Combinations of Deterministic Properties LICS 1987: 131-137
32 Jennifer Widom, David Gries, Fred B. Schneider: Completeness and Incompleteness of Trace-Based Network Proof Systems. POPL 1987: 27-38
31 Bowen Alpern, Fred B. Schneider: Recognizing Safety and Liveness. Distributed Computing 2(3): 117-126 (1987)
1986
30 Fred B. Schneider: The State Machine Approach: A Tutorial. Fault-Tolerant Distributed Computing 1986: 18-41
29 Fred B. Schneider: Abstractions for Fault Tolerance in Distributed Systems (Invited Paper). IFIP Congress 1986: 727-734
28 Fred B. Schneider, Gregory R. Andrews: Concepts for Concurrent Programming. Current Trends in Concurrency 1986: 669-716
27 Bowen Alpern, Alan J. Demers, Fred B. Schneider: Safety Without Stuttering. Inf. Process. Lett. 23(4): 177-180 (1986)
26 Robert McCurley, Fred B. Schneider: Derivation of a Distributed Algorithm for Finding Paths in Directed Networks. Sci. Comput. Program. 6(1): 1-9 (1986)
1985
25 Mack W. Alford, Jean-Pierre Ansart, Günter Hommel, Leslie Lamport, Barbara Liskov, Geoff P. Mullery, Fred B. Schneider: Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3-12, 1984 and April 16-25, 1985 Munich Springer 1985
24 Ralph E. Johnson, Fred B. Schneider: Symmetry and Similarity in Distributed Systems. PODC 1985: 13-22
23 Stephen R. Mahaney, Fred B. Schneider: Inexact Agreement: Accuracy, Precision, and Graceful Degradation. PODC 1985: 237-249
22 Leslie Lamport, Fred B. Schneider: Constraints: A Uniform Approach to Aliasing and Typing. POPL 1985: 205-216
21 Fred B. Schneider, Richard Conway, Dale Skeen: Thrifty Execution of Task Pipelines. Acta Inf. 22(1): 35-45 (1985)
20 Bowen Alpern, Fred B. Schneider: Defining Liveness. Inf. Process. Lett. 21(4): 181-185 (1985)
1984
19 Leslie Lamport, Fred B. Schneider: Formal Foundation for Specification and Verification. Advanced Course: Distributed Systems 1984: 203-285
18 Fred B. Schneider, Leslie Lamport: Paradigms for Distributed Programs. Advanced Course: Distributed Systems 1984: 431-480
17EEFred B. Schneider: Byzantine Generals in Action: Implementing Fail-Stop Processors ACM Trans. Comput. Syst. 2(2): 145-154 (1984)
16EEJames E. Archer Jr., Richard Conway, Fred B. Schneider: User Recovery and Reversal in Interactive Systems. ACM Trans. Program. Lang. Syst. 6(1): 1-19 (1984)
15EELeslie Lamport, Fred B. Schneider: The ``Hoare Logic'' of CSP, and All That. ACM Trans. Program. Lang. Syst. 6(2): 281-296 (1984)
14EERichard D. Schlichting, Fred B. Schneider: Using Message Passing for Distributed Programming: Proof Rules, Disciplines. ACM Trans. Program. Lang. Syst. 6(3): 402-431 (1984)
13 Fred B. Schneider, David Gries, Richard D. Schlichting: Fault-Tolerant Broadcasts. Sci. Comput. Program. 4(1): 1-15 (1984)
1983
12 Gregory R. Andrews, Fred B. Schneider: Concepts and Notations for Concurrent Programming. ACM Comput. Surv. 15(1): 3-43 (1983)
11EERichard D. Schlichting, Fred B. Schneider: Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems ACM Trans. Comput. Syst. 1(3): 222-238 (1983)
10 Bowen Alpern, Fred B. Schneider: Key Exchange Using `Keyless Cryptography'. Inf. Process. Lett. 16(2): 79-81 (1983)
1982
9 Richard D. Schlichting, Fred B. Schneider: Understanding and Using Asynchronous Message Passing (Preliminary Version). PODC 1982: 141-147
8EEFred B. Schneider: Synchronization in Distributed Programs. ACM Trans. Program. Lang. Syst. 4(2): 125-148 (1982)
1981
7 Dorothy E. Denning, Fred B. Schneider: Master Keys for Group Sharing. Inf. Process. Lett. 12(1): 23-25 (1981)
6 Dorothy E. Denning, Henk Meijer, Fred B. Schneider: More on Master Keys for Group Sharing. Inf. Process. Lett. 13(3): 125-126 (1981)
1980
5 Fred B. Schneider: Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores. DDB 1980: 183-189
4 Dorothy E. Denning, Fred B. Schneider: The Master Key Problem. IEEE Symposium on Security and Privacy 1980: 103-107
1978
3 Arthur J. Bernstein, Fred B. Schneider: On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems. Jerusalem Conference on Information Technology 1978: 537-541
2 Eralp A. Akkoyunlu, Arthur J. Bernstein, Fred B. Schneider, Abraham Silberschatz: Conditions for the Equivalence of Synchronous and Asynchronous Systems. IEEE Trans. Software Eng. 4(6): 507-516 (1978)
1 Fred B. Schneider, Arthur J. Bernstein: Scheduling in Concurrent Pascal. Operating Systems Review 12(2): 15-20 (1978)

Coauthor Index

1Martín Abadi [36]
2Eralp A. Akkoyunlu [2]
3Mack W. Alford [25]
4Bowen Alpern [10] [20] [27] [31] [33] [34] [36]
5Gregory R. Andrews [12] [28]
6Jean-Pierre Ansart [25]
7Krzysztof R. Apt [36]
8James E. Archer Jr. [16]
9Özalp Babaoglu [41]
10Steven M. Bellovin [64] [65]
11Arthur J. Bernstein [1] [2] [3]
12Bard Bloom [37]
13Thomas C. Bressoud [51] [53]
14Navin Budhiraja [40]
15Michael R. Clarkson [91] [99]
16Richard Conway [16] [21]
17Alan J. Demers [27]
18Dorothy E. Denning [4] [6] [7]
19Danny Dolev [58] [98]
20Úlfar Erlingsson [69]
21Limor Fix [44] [45]
22Nissim Francez [36]
23David Gries [13] [32] [39] [43] [46] [48] [49] [52] [60]
24Kevin W. Hamlen [92] [93]
25Robert Harper [72]
26Günter Hommel [25]
27Alan S. Inouye [64]
28Kjetil Jacobsen [66] [73]
29Dag Johansen [56] [66] [73] [79]
30Ralph E. Johnson [24]
31William K. Josephson (William Josephson) [84]
32Shmuel Katz [36]
33Nils Klarlund [42]
34Joan Krone [52]
35Leslie Lamport [15] [18] [19] [22] [25] [36]
36Susan Landau [86]
37Carl E. Landwehr [86]
38Kåre J. Lauvset [73]
39Barbara Liskov [25]
40Stephen R. Mahaney [23]
41Michael A. Marsh [80] [90]
42Keith Marzullo [37] [40] [41] [66]
43Robert McCurley [26]
44Henk Meijer [6]
45Dejan S. Milojicic [67]
46Yaron Minsky [57] [78]
47J. Gregory Morrisett (Greg Morrisett) [72] [92] [93]
48Geoff P. Mullery [25]
49Andrew C. Myers [91]
50Riccardo Pucella [94]
51Anna Redz [90]
52Rüdiger Reischuk [58]
53Robbert van Renesse [56] [57] [73] [75] [79] [83] [89] [98]
54Patrick Reynolds [97]
55Richard D. Schlichting [9] [11] [13] [14]
56Abraham Silberschatz (Avi Silberschatz) [2]
57Emin Gün Sirer [84] [97]
58Dale Skeen [21]
59Yee Jiun Song [98]
60Scott D. Stoller [47] [50] [57] [63] [88]
61H. Raymond Strong [58]
62Martin R. Stytz [86]
63Nils P. Sudmann [73]
64Sam Toueg [40]
65Kevin Walsh [97]
66J. Stanley Warford [52]
67J. Peter Weston [52]
68Jennifer Widom [32] [39]
69Dan Williams [97]
70Dmitrii Zagorodnov [66]
71Lidong Zhou [75] [85] [89] [90]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)