2008 | ||
---|---|---|
99 | EE | Michael R. Clarkson, Fred B. Schneider: Hyperproperties. CSF 2008: 51-65 |
98 | EE | Yee Jiun Song, Robbert van Renesse, Fred B. Schneider, Danny Dolev: The Building Blocks of Consensus. ICDCN 2008: 54-72 |
97 | EE | Dan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, Fred B. Schneider: Device Driver Safety Through a Reference Validation Mechanism. OSDI 2008: 241-254 |
2007 | ||
96 | EE | Fred B. Schneider: Mapping the Security Landscape: A Role for Language Techniques. CONCUR 2007: 1 |
95 | EE | Fred B. Schneider: Credentials-Based Authorization: Evaluation and Implementation. ICALP 2007: 12-14 |
2006 | ||
94 | EE | Riccardo Pucella, Fred B. Schneider: Independence From Obfuscation: A Semantic Framework for Dive. CSFW 2006: 230-241 |
93 | EE | Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider: Certified In-lined Reference Monitoring on .NET. PLAS 2006: 7-16 |
92 | EE | Kevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006) |
2005 | ||
91 | EE | Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider: Belief in Information Flow. CSFW 2005: 31-45 |
90 | EE | Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz: Distributed Blinding for Distributed ElGamal Re-Encryption. ICDCS 2005: 815-824 |
89 | EE | Lidong Zhou, Fred B. Schneider, Robbert van Renesse: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) |
88 | EE | Scott D. Stoller, Fred B. Schneider: Automated Analysis of Fault-Tolerance in Distributed Systems. Formal Methods in System Design 26(2): 183-196 (2005) |
87 | EE | Fred B. Schneider: It Depends on What You Pay. IEEE Security & Privacy 3(3): 3 (2005) |
86 | EE | Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security & Privacy 3(3): 9-11 (2005) |
85 | EE | Fred B. Schneider, Lidong Zhou: Implementing Trustworthy Services Using Replicated State Machines. IEEE Security & Privacy 3(5): 34-43 (2005) |
2004 | ||
84 | EE | William K. Josephson, Emin Gün Sirer, Fred B. Schneider: Peer-to-Peer Authentication with a Distributed Single Sign-On Service. IPTPS 2004: 250-258 |
83 | EE | Robbert van Renesse, Fred B. Schneider: Chain Replication for Supporting High Throughput and Availability. OSDI 2004: 91-104 |
82 | EE | Fred B. Schneider: From the Editors: The Next Digital Divide. IEEE Security & Privacy 2(1): 5 (2004) |
81 | EE | Fred B. Schneider: Time Out for Station Identification. IEEE Security & Privacy 2(5): 5 (2004) |
80 | EE | Michael A. Marsh, Fred B. Schneider: CODEX: A Robust and Secure Secret Distribution System. IEEE Trans. Dependable Sec. Comput. 1(1): 34-47 (2004) |
2003 | ||
79 | EE | Dag Johansen, Robbert van Renesse, Fred B. Schneider: WAIF: Web of Asynchronous Information Filters. Future Directions in Distributed Computing 2003: 81-86 |
78 | EE | Yaron Minsky, Fred B. Schneider: Tolerating malicious gossip. Distributed Computing 16(1): 49-68 (2003) |
77 | EE | Fred B. Schneider: Least Privilege and More. IEEE Security & Privacy 1(5): 55-59 (2003) |
2002 | ||
76 | EE | Fred B. Schneider: Lifting Reference Monitors from the Kernel. FASec 2002: 1-2 |
75 | EE | Lidong Zhou, Fred B. Schneider, Robbert van Renesse: COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4): 329-368 (2002) |
74 | EE | Fred B. Schneider: Secure systems conundrum. Commun. ACM 45(10): 160 (2002) |
73 | Dag Johansen, Kåre J. Lauvset, Robbert van Renesse, Fred B. Schneider, Nils P. Sudmann, Kjetil Jacobsen: A TACOMA retrospective. Softw., Pract. Exper. 32(6): 605-619 (2002) | |
2001 | ||
72 | EE | Fred B. Schneider, J. Gregory Morrisett, Robert Harper: A Language-Based Approach to Security. Informatics 2001: 86-101 |
71 | EE | Fred B. Schneider: Language-Based Security: What's Needed and Why. SAS 2001: 374 |
2000 | ||
70 | EE | Fred B. Schneider: Open Source in Security: Visiting the Bizarre. IEEE Symposium on Security and Privacy 2000: 126-127 |
69 | EE | Úlfar Erlingsson, Fred B. Schneider: IRM Enforcement of Java Stack Inspection. IEEE Symposium on Security and Privacy 2000: 246-255 |
68 | EE | Fred B. Schneider: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1): 30-50 (2000) |
67 | EE | Dejan S. Milojicic, Fred B. Schneider: Interview - Fred B. Schneider on Distributed Computing. IEEE Distributed Systems Online 1(1): (2000) |
1999 | ||
66 | EE | Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, Dmitrii Zagorodnov: NAP: Practical Fault-Tolerance for Itinerant Computations. ICDCS 1999: 180-189 |
65 | EE | Fred B. Schneider, Steven M. Bellovin: Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999) |
64 | Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye: Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Computing 3(6): 64-72 (1999) | |
1998 | ||
63 | EE | Scott D. Stoller, Fred B. Schneider: Automated Stream-Based Analysis of Fault-Tolerance. FTRTFT 1998: 113-122 |
62 | Fred B. Schneider: Toward Trustworthy Networked Information Systems. Commun. ACM 41(11): 144 (1998) | |
61 | Fred B. Schneider: On Concurrent Programming. Commun. ACM 41(4): 128 (1998) | |
60 | David Gries, Fred B. Schneider: Adding the Everywhere Operator to Propositional Logic. J. Log. Comput. 8(1): 119-129 (1998) | |
1997 | ||
59 | Fred B. Schneider: Towards Fault-Tolerant and Secure Agentry. WDAG 1997: 1-14 | |
58 | Danny Dolev, Rüdiger Reischuk, Fred B. Schneider, H. Raymond Strong: Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. Real-Time Systems 12(3): 329-345 (1997) | |
1996 | ||
57 | EE | Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller: Cryptographic support for fault-tolerant distributed computing. ACM SIGOPS European Workshop 1996: 109-114 |
56 | EE | Dag Johansen, Robbert van Renesse, Fred B. Schneider: Supporting broad internet access to TACOMA. ACM SIGOPS European Workshop 1996: 55-58 |
55 | Fred B. Schneider: On traditions in Marktoberdorf. NATO ASI DPD 1996: 1-4 | |
54 | Fred B. Schneider: Notes on proof outline logic. NATO ASI DPD 1996: 351-394 | |
53 | EE | Thomas C. Bressoud, Fred B. Schneider: Hypervisor-Based Fault Tolerance. ACM Trans. Comput. Syst. 14(1): 80-107 (1996) |
1995 | ||
52 | EE | David Gries, Fred B. Schneider, Joan Krone, J. Stanley Warford, J. Peter Weston: Teaching as a logic tool (abstract). SIGCSE 1995: 384-385 |
51 | Thomas C. Bressoud, Fred B. Schneider: Hypervisor-based Fault-tolerance. SOSP 1995: 1-11 | |
50 | Scott D. Stoller, Fred B. Schneider: Faster Possibility Detection by Combining Two Approaches. WDAG 1995: 318-332 | |
49 | David Gries, Fred B. Schneider: Avoiding the Undefined by Underspecification. Computer Science Today 1995: 366-373 | |
48 | EE | David Gries, Fred B. Schneider: Equational Propositional Logic. Inf. Process. Lett. 53(3): 145-152 (1995) |
47 | Scott D. Stoller, Fred B. Schneider: Verifying Programs That Use Causally-Ordered Message-Passing. Sci. Comput. Program. 24(2): 105-128 (1995) | |
1994 | ||
46 | David Gries, Fred B. Schneider: Teaching Logic as a Tool. CSEE 1994: 599-599 | |
45 | Limor Fix, Fred B. Schneider: Hybrid Verification by Exploiting the Environment. FTRTFT 1994: 1-18 | |
44 | Limor Fix, Fred B. Schneider: Reasoning about Programs by Exploiting the Environment. ICALP 1994: 328-339 | |
1993 | ||
43 | David Gries, Fred B. Schneider: A Logical Approach to Discrete Math. Springer 1993 | |
42 | Nils Klarlund, Fred B. Schneider: Proving Nondeterministically Specified Safety Properties Using Progress Measures Inf. Comput. 107(1): 151-170 (1993) | |
41 | Özalp Babaoglu, Keith Marzullo, Fred B. Schneider: A Formalization of Priority Inversion. Real-Time Systems 5(4): 285-303 (1993) | |
1992 | ||
40 | Navin Budhiraja, Keith Marzullo, Fred B. Schneider, Sam Toueg: Optimal Primary-Backup Protocols. WDAG 1992: 362-378 | |
39 | EE | Jennifer Widom, David Gries, Fred B. Schneider: Trace-Based Network Proof Systems: Expressiveness and Completeness. ACM Trans. Program. Lang. Syst. 14(3): 396-416 (1992) |
38 | Fred B. Schneider: Introduction. Distributed Computing 6(1): 1-3 (1992) | |
1991 | ||
37 | Fred B. Schneider, Bard Bloom, Keith Marzullo: Putting Time into Proof Outlines. REX Workshop 1991: 618-639 | |
36 | Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider: Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. Inf. Process. Lett. 40(3): 141-142 (1991) | |
1990 | ||
35 | Fred B. Schneider: Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Comput. Surv. 22(4): 299-319 (1990) | |
1989 | ||
34 | EE | Bowen Alpern, Fred B. Schneider: Verifying Temporal Properties without Temporal Logic. ACM Trans. Program. Lang. Syst. 11(1): 147-167 (1989) |
1987 | ||
33 | Bowen Alpern, Fred B. Schneider: Proving Boolean Combinations of Deterministic Properties LICS 1987: 131-137 | |
32 | Jennifer Widom, David Gries, Fred B. Schneider: Completeness and Incompleteness of Trace-Based Network Proof Systems. POPL 1987: 27-38 | |
31 | Bowen Alpern, Fred B. Schneider: Recognizing Safety and Liveness. Distributed Computing 2(3): 117-126 (1987) | |
1986 | ||
30 | Fred B. Schneider: The State Machine Approach: A Tutorial. Fault-Tolerant Distributed Computing 1986: 18-41 | |
29 | Fred B. Schneider: Abstractions for Fault Tolerance in Distributed Systems (Invited Paper). IFIP Congress 1986: 727-734 | |
28 | Fred B. Schneider, Gregory R. Andrews: Concepts for Concurrent Programming. Current Trends in Concurrency 1986: 669-716 | |
27 | Bowen Alpern, Alan J. Demers, Fred B. Schneider: Safety Without Stuttering. Inf. Process. Lett. 23(4): 177-180 (1986) | |
26 | Robert McCurley, Fred B. Schneider: Derivation of a Distributed Algorithm for Finding Paths in Directed Networks. Sci. Comput. Program. 6(1): 1-9 (1986) | |
1985 | ||
25 | Mack W. Alford, Jean-Pierre Ansart, Günter Hommel, Leslie Lamport, Barbara Liskov, Geoff P. Mullery, Fred B. Schneider: Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3-12, 1984 and April 16-25, 1985 Munich Springer 1985 | |
24 | Ralph E. Johnson, Fred B. Schneider: Symmetry and Similarity in Distributed Systems. PODC 1985: 13-22 | |
23 | Stephen R. Mahaney, Fred B. Schneider: Inexact Agreement: Accuracy, Precision, and Graceful Degradation. PODC 1985: 237-249 | |
22 | Leslie Lamport, Fred B. Schneider: Constraints: A Uniform Approach to Aliasing and Typing. POPL 1985: 205-216 | |
21 | Fred B. Schneider, Richard Conway, Dale Skeen: Thrifty Execution of Task Pipelines. Acta Inf. 22(1): 35-45 (1985) | |
20 | Bowen Alpern, Fred B. Schneider: Defining Liveness. Inf. Process. Lett. 21(4): 181-185 (1985) | |
1984 | ||
19 | Leslie Lamport, Fred B. Schneider: Formal Foundation for Specification and Verification. Advanced Course: Distributed Systems 1984: 203-285 | |
18 | Fred B. Schneider, Leslie Lamport: Paradigms for Distributed Programs. Advanced Course: Distributed Systems 1984: 431-480 | |
17 | EE | Fred B. Schneider: Byzantine Generals in Action: Implementing Fail-Stop Processors ACM Trans. Comput. Syst. 2(2): 145-154 (1984) |
16 | EE | James E. Archer Jr., Richard Conway, Fred B. Schneider: User Recovery and Reversal in Interactive Systems. ACM Trans. Program. Lang. Syst. 6(1): 1-19 (1984) |
15 | EE | Leslie Lamport, Fred B. Schneider: The ``Hoare Logic'' of CSP, and All That. ACM Trans. Program. Lang. Syst. 6(2): 281-296 (1984) |
14 | EE | Richard D. Schlichting, Fred B. Schneider: Using Message Passing for Distributed Programming: Proof Rules, Disciplines. ACM Trans. Program. Lang. Syst. 6(3): 402-431 (1984) |
13 | Fred B. Schneider, David Gries, Richard D. Schlichting: Fault-Tolerant Broadcasts. Sci. Comput. Program. 4(1): 1-15 (1984) | |
1983 | ||
12 | Gregory R. Andrews, Fred B. Schneider: Concepts and Notations for Concurrent Programming. ACM Comput. Surv. 15(1): 3-43 (1983) | |
11 | EE | Richard D. Schlichting, Fred B. Schneider: Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems ACM Trans. Comput. Syst. 1(3): 222-238 (1983) |
10 | Bowen Alpern, Fred B. Schneider: Key Exchange Using `Keyless Cryptography'. Inf. Process. Lett. 16(2): 79-81 (1983) | |
1982 | ||
9 | Richard D. Schlichting, Fred B. Schneider: Understanding and Using Asynchronous Message Passing (Preliminary Version). PODC 1982: 141-147 | |
8 | EE | Fred B. Schneider: Synchronization in Distributed Programs. ACM Trans. Program. Lang. Syst. 4(2): 125-148 (1982) |
1981 | ||
7 | Dorothy E. Denning, Fred B. Schneider: Master Keys for Group Sharing. Inf. Process. Lett. 12(1): 23-25 (1981) | |
6 | Dorothy E. Denning, Henk Meijer, Fred B. Schneider: More on Master Keys for Group Sharing. Inf. Process. Lett. 13(3): 125-126 (1981) | |
1980 | ||
5 | Fred B. Schneider: Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores. DDB 1980: 183-189 | |
4 | Dorothy E. Denning, Fred B. Schneider: The Master Key Problem. IEEE Symposium on Security and Privacy 1980: 103-107 | |
1978 | ||
3 | Arthur J. Bernstein, Fred B. Schneider: On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems. Jerusalem Conference on Information Technology 1978: 537-541 | |
2 | Eralp A. Akkoyunlu, Arthur J. Bernstein, Fred B. Schneider, Abraham Silberschatz: Conditions for the Equivalence of Synchronous and Asynchronous Systems. IEEE Trans. Software Eng. 4(6): 507-516 (1978) | |
1 | Fred B. Schneider, Arthur J. Bernstein: Scheduling in Concurrent Pascal. Operating Systems Review 12(2): 15-20 (1978) |