| 2008 |
| 99 | EE | Michael R. Clarkson,
Fred B. Schneider:
Hyperproperties.
CSF 2008: 51-65 |
| 98 | EE | Yee Jiun Song,
Robbert van Renesse,
Fred B. Schneider,
Danny Dolev:
The Building Blocks of Consensus.
ICDCN 2008: 54-72 |
| 97 | EE | Dan Williams,
Patrick Reynolds,
Kevin Walsh,
Emin Gün Sirer,
Fred B. Schneider:
Device Driver Safety Through a Reference Validation Mechanism.
OSDI 2008: 241-254 |
| 2007 |
| 96 | EE | Fred B. Schneider:
Mapping the Security Landscape: A Role for Language Techniques.
CONCUR 2007: 1 |
| 95 | EE | Fred B. Schneider:
Credentials-Based Authorization: Evaluation and Implementation.
ICALP 2007: 12-14 |
| 2006 |
| 94 | EE | Riccardo Pucella,
Fred B. Schneider:
Independence From Obfuscation: A Semantic Framework for Dive.
CSFW 2006: 230-241 |
| 93 | EE | Kevin W. Hamlen,
Greg Morrisett,
Fred B. Schneider:
Certified In-lined Reference Monitoring on .NET.
PLAS 2006: 7-16 |
| 92 | EE | Kevin W. Hamlen,
J. Gregory Morrisett,
Fred B. Schneider:
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006) |
| 2005 |
| 91 | EE | Michael R. Clarkson,
Andrew C. Myers,
Fred B. Schneider:
Belief in Information Flow.
CSFW 2005: 31-45 |
| 90 | EE | Lidong Zhou,
Michael A. Marsh,
Fred B. Schneider,
Anna Redz:
Distributed Blinding for Distributed ElGamal Re-Encryption.
ICDCS 2005: 815-824 |
| 89 | EE | Lidong Zhou,
Fred B. Schneider,
Robbert van Renesse:
APSS: proactive secret sharing in asynchronous systems.
ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) |
| 88 | EE | Scott D. Stoller,
Fred B. Schneider:
Automated Analysis of Fault-Tolerance in Distributed Systems.
Formal Methods in System Design 26(2): 183-196 (2005) |
| 87 | EE | Fred B. Schneider:
It Depends on What You Pay.
IEEE Security & Privacy 3(3): 3 (2005) |
| 86 | EE | Susan Landau,
Martin R. Stytz,
Carl E. Landwehr,
Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization.
IEEE Security & Privacy 3(3): 9-11 (2005) |
| 85 | EE | Fred B. Schneider,
Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines.
IEEE Security & Privacy 3(5): 34-43 (2005) |
| 2004 |
| 84 | EE | William K. Josephson,
Emin Gün Sirer,
Fred B. Schneider:
Peer-to-Peer Authentication with a Distributed Single Sign-On Service.
IPTPS 2004: 250-258 |
| 83 | EE | Robbert van Renesse,
Fred B. Schneider:
Chain Replication for Supporting High Throughput and Availability.
OSDI 2004: 91-104 |
| 82 | EE | Fred B. Schneider:
From the Editors: The Next Digital Divide.
IEEE Security & Privacy 2(1): 5 (2004) |
| 81 | EE | Fred B. Schneider:
Time Out for Station Identification.
IEEE Security & Privacy 2(5): 5 (2004) |
| 80 | EE | Michael A. Marsh,
Fred B. Schneider:
CODEX: A Robust and Secure Secret Distribution System.
IEEE Trans. Dependable Sec. Comput. 1(1): 34-47 (2004) |
| 2003 |
| 79 | EE | Dag Johansen,
Robbert van Renesse,
Fred B. Schneider:
WAIF: Web of Asynchronous Information Filters.
Future Directions in Distributed Computing 2003: 81-86 |
| 78 | EE | Yaron Minsky,
Fred B. Schneider:
Tolerating malicious gossip.
Distributed Computing 16(1): 49-68 (2003) |
| 77 | EE | Fred B. Schneider:
Least Privilege and More.
IEEE Security & Privacy 1(5): 55-59 (2003) |
| 2002 |
| 76 | EE | Fred B. Schneider:
Lifting Reference Monitors from the Kernel.
FASec 2002: 1-2 |
| 75 | EE | Lidong Zhou,
Fred B. Schneider,
Robbert van Renesse:
COCA: A secure distributed online certification authority.
ACM Trans. Comput. Syst. 20(4): 329-368 (2002) |
| 74 | EE | Fred B. Schneider:
Secure systems conundrum.
Commun. ACM 45(10): 160 (2002) |
| 73 | | Dag Johansen,
Kåre J. Lauvset,
Robbert van Renesse,
Fred B. Schneider,
Nils P. Sudmann,
Kjetil Jacobsen:
A TACOMA retrospective.
Softw., Pract. Exper. 32(6): 605-619 (2002) |
| 2001 |
| 72 | EE | Fred B. Schneider,
J. Gregory Morrisett,
Robert Harper:
A Language-Based Approach to Security.
Informatics 2001: 86-101 |
| 71 | EE | Fred B. Schneider:
Language-Based Security: What's Needed and Why.
SAS 2001: 374 |
| 2000 |
| 70 | EE | Fred B. Schneider:
Open Source in Security: Visiting the Bizarre.
IEEE Symposium on Security and Privacy 2000: 126-127 |
| 69 | EE | Úlfar Erlingsson,
Fred B. Schneider:
IRM Enforcement of Java Stack Inspection.
IEEE Symposium on Security and Privacy 2000: 246-255 |
| 68 | EE | Fred B. Schneider:
Enforceable security policies.
ACM Trans. Inf. Syst. Secur. 3(1): 30-50 (2000) |
| 67 | EE | Dejan S. Milojicic,
Fred B. Schneider:
Interview - Fred B. Schneider on Distributed Computing.
IEEE Distributed Systems Online 1(1): (2000) |
| 1999 |
| 66 | EE | Dag Johansen,
Keith Marzullo,
Fred B. Schneider,
Kjetil Jacobsen,
Dmitrii Zagorodnov:
NAP: Practical Fault-Tolerance for Itinerant Computations.
ICDCS 1999: 180-189 |
| 65 | EE | Fred B. Schneider,
Steven M. Bellovin:
Evolving Telephone Networks.
Commun. ACM 42(1): 160 (1999) |
| 64 | | Fred B. Schneider,
Steven M. Bellovin,
Alan S. Inouye:
Building Trustworthy Systems: Lessons from the PTN and Internet.
IEEE Internet Computing 3(6): 64-72 (1999) |
| 1998 |
| 63 | EE | Scott D. Stoller,
Fred B. Schneider:
Automated Stream-Based Analysis of Fault-Tolerance.
FTRTFT 1998: 113-122 |
| 62 | | Fred B. Schneider:
Toward Trustworthy Networked Information Systems.
Commun. ACM 41(11): 144 (1998) |
| 61 | | Fred B. Schneider:
On Concurrent Programming.
Commun. ACM 41(4): 128 (1998) |
| 60 | | David Gries,
Fred B. Schneider:
Adding the Everywhere Operator to Propositional Logic.
J. Log. Comput. 8(1): 119-129 (1998) |
| 1997 |
| 59 | | Fred B. Schneider:
Towards Fault-Tolerant and Secure Agentry.
WDAG 1997: 1-14 |
| 58 | | Danny Dolev,
Rüdiger Reischuk,
Fred B. Schneider,
H. Raymond Strong:
Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996.
Real-Time Systems 12(3): 329-345 (1997) |
| 1996 |
| 57 | EE | Yaron Minsky,
Robbert van Renesse,
Fred B. Schneider,
Scott D. Stoller:
Cryptographic support for fault-tolerant distributed computing.
ACM SIGOPS European Workshop 1996: 109-114 |
| 56 | EE | Dag Johansen,
Robbert van Renesse,
Fred B. Schneider:
Supporting broad internet access to TACOMA.
ACM SIGOPS European Workshop 1996: 55-58 |
| 55 | | Fred B. Schneider:
On traditions in Marktoberdorf.
NATO ASI DPD 1996: 1-4 |
| 54 | | Fred B. Schneider:
Notes on proof outline logic.
NATO ASI DPD 1996: 351-394 |
| 53 | EE | Thomas C. Bressoud,
Fred B. Schneider:
Hypervisor-Based Fault Tolerance.
ACM Trans. Comput. Syst. 14(1): 80-107 (1996) |
| 1995 |
| 52 | EE | David Gries,
Fred B. Schneider,
Joan Krone,
J. Stanley Warford,
J. Peter Weston:
Teaching as a logic tool (abstract).
SIGCSE 1995: 384-385 |
| 51 | | Thomas C. Bressoud,
Fred B. Schneider:
Hypervisor-based Fault-tolerance.
SOSP 1995: 1-11 |
| 50 | | Scott D. Stoller,
Fred B. Schneider:
Faster Possibility Detection by Combining Two Approaches.
WDAG 1995: 318-332 |
| 49 | | David Gries,
Fred B. Schneider:
Avoiding the Undefined by Underspecification.
Computer Science Today 1995: 366-373 |
| 48 | EE | David Gries,
Fred B. Schneider:
Equational Propositional Logic.
Inf. Process. Lett. 53(3): 145-152 (1995) |
| 47 | | Scott D. Stoller,
Fred B. Schneider:
Verifying Programs That Use Causally-Ordered Message-Passing.
Sci. Comput. Program. 24(2): 105-128 (1995) |
| 1994 |
| 46 | | David Gries,
Fred B. Schneider:
Teaching Logic as a Tool.
CSEE 1994: 599-599 |
| 45 | | Limor Fix,
Fred B. Schneider:
Hybrid Verification by Exploiting the Environment.
FTRTFT 1994: 1-18 |
| 44 | | Limor Fix,
Fred B. Schneider:
Reasoning about Programs by Exploiting the Environment.
ICALP 1994: 328-339 |
| 1993 |
| 43 | | David Gries,
Fred B. Schneider:
A Logical Approach to Discrete Math.
Springer 1993 |
| 42 | | Nils Klarlund,
Fred B. Schneider:
Proving Nondeterministically Specified Safety Properties Using Progress Measures
Inf. Comput. 107(1): 151-170 (1993) |
| 41 | | Özalp Babaoglu,
Keith Marzullo,
Fred B. Schneider:
A Formalization of Priority Inversion.
Real-Time Systems 5(4): 285-303 (1993) |
| 1992 |
| 40 | | Navin Budhiraja,
Keith Marzullo,
Fred B. Schneider,
Sam Toueg:
Optimal Primary-Backup Protocols.
WDAG 1992: 362-378 |
| 39 | EE | Jennifer Widom,
David Gries,
Fred B. Schneider:
Trace-Based Network Proof Systems: Expressiveness and Completeness.
ACM Trans. Program. Lang. Syst. 14(3): 396-416 (1992) |
| 38 | | Fred B. Schneider:
Introduction.
Distributed Computing 6(1): 1-3 (1992) |
| 1991 |
| 37 | | Fred B. Schneider,
Bard Bloom,
Keith Marzullo:
Putting Time into Proof Outlines.
REX Workshop 1991: 618-639 |
| 36 | | Martín Abadi,
Bowen Alpern,
Krzysztof R. Apt,
Nissim Francez,
Shmuel Katz,
Leslie Lamport,
Fred B. Schneider:
Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''.
Inf. Process. Lett. 40(3): 141-142 (1991) |
| 1990 |
| 35 | | Fred B. Schneider:
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial.
ACM Comput. Surv. 22(4): 299-319 (1990) |
| 1989 |
| 34 | EE | Bowen Alpern,
Fred B. Schneider:
Verifying Temporal Properties without Temporal Logic.
ACM Trans. Program. Lang. Syst. 11(1): 147-167 (1989) |
| 1987 |
| 33 | | Bowen Alpern,
Fred B. Schneider:
Proving Boolean Combinations of Deterministic Properties
LICS 1987: 131-137 |
| 32 | | Jennifer Widom,
David Gries,
Fred B. Schneider:
Completeness and Incompleteness of Trace-Based Network Proof Systems.
POPL 1987: 27-38 |
| 31 | | Bowen Alpern,
Fred B. Schneider:
Recognizing Safety and Liveness.
Distributed Computing 2(3): 117-126 (1987) |
| 1986 |
| 30 | | Fred B. Schneider:
The State Machine Approach: A Tutorial.
Fault-Tolerant Distributed Computing 1986: 18-41 |
| 29 | | Fred B. Schneider:
Abstractions for Fault Tolerance in Distributed Systems (Invited Paper).
IFIP Congress 1986: 727-734 |
| 28 | | Fred B. Schneider,
Gregory R. Andrews:
Concepts for Concurrent Programming.
Current Trends in Concurrency 1986: 669-716 |
| 27 | | Bowen Alpern,
Alan J. Demers,
Fred B. Schneider:
Safety Without Stuttering.
Inf. Process. Lett. 23(4): 177-180 (1986) |
| 26 | | Robert McCurley,
Fred B. Schneider:
Derivation of a Distributed Algorithm for Finding Paths in Directed Networks.
Sci. Comput. Program. 6(1): 1-9 (1986) |
| 1985 |
| 25 | | Mack W. Alford,
Jean-Pierre Ansart,
Günter Hommel,
Leslie Lamport,
Barbara Liskov,
Geoff P. Mullery,
Fred B. Schneider:
Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3-12, 1984 and April 16-25, 1985 Munich
Springer 1985 |
| 24 | | Ralph E. Johnson,
Fred B. Schneider:
Symmetry and Similarity in Distributed Systems.
PODC 1985: 13-22 |
| 23 | | Stephen R. Mahaney,
Fred B. Schneider:
Inexact Agreement: Accuracy, Precision, and Graceful Degradation.
PODC 1985: 237-249 |
| 22 | | Leslie Lamport,
Fred B. Schneider:
Constraints: A Uniform Approach to Aliasing and Typing.
POPL 1985: 205-216 |
| 21 | | Fred B. Schneider,
Richard Conway,
Dale Skeen:
Thrifty Execution of Task Pipelines.
Acta Inf. 22(1): 35-45 (1985) |
| 20 | | Bowen Alpern,
Fred B. Schneider:
Defining Liveness.
Inf. Process. Lett. 21(4): 181-185 (1985) |
| 1984 |
| 19 | | Leslie Lamport,
Fred B. Schneider:
Formal Foundation for Specification and Verification.
Advanced Course: Distributed Systems 1984: 203-285 |
| 18 | | Fred B. Schneider,
Leslie Lamport:
Paradigms for Distributed Programs.
Advanced Course: Distributed Systems 1984: 431-480 |
| 17 | EE | Fred B. Schneider:
Byzantine Generals in Action: Implementing Fail-Stop Processors
ACM Trans. Comput. Syst. 2(2): 145-154 (1984) |
| 16 | EE | James E. Archer Jr.,
Richard Conway,
Fred B. Schneider:
User Recovery and Reversal in Interactive Systems.
ACM Trans. Program. Lang. Syst. 6(1): 1-19 (1984) |
| 15 | EE | Leslie Lamport,
Fred B. Schneider:
The ``Hoare Logic'' of CSP, and All That.
ACM Trans. Program. Lang. Syst. 6(2): 281-296 (1984) |
| 14 | EE | Richard D. Schlichting,
Fred B. Schneider:
Using Message Passing for Distributed Programming: Proof Rules, Disciplines.
ACM Trans. Program. Lang. Syst. 6(3): 402-431 (1984) |
| 13 | | Fred B. Schneider,
David Gries,
Richard D. Schlichting:
Fault-Tolerant Broadcasts.
Sci. Comput. Program. 4(1): 1-15 (1984) |
| 1983 |
| 12 | | Gregory R. Andrews,
Fred B. Schneider:
Concepts and Notations for Concurrent Programming.
ACM Comput. Surv. 15(1): 3-43 (1983) |
| 11 | EE | Richard D. Schlichting,
Fred B. Schneider:
Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems
ACM Trans. Comput. Syst. 1(3): 222-238 (1983) |
| 10 | | Bowen Alpern,
Fred B. Schneider:
Key Exchange Using `Keyless Cryptography'.
Inf. Process. Lett. 16(2): 79-81 (1983) |
| 1982 |
| 9 | | Richard D. Schlichting,
Fred B. Schneider:
Understanding and Using Asynchronous Message Passing (Preliminary Version).
PODC 1982: 141-147 |
| 8 | EE | Fred B. Schneider:
Synchronization in Distributed Programs.
ACM Trans. Program. Lang. Syst. 4(2): 125-148 (1982) |
| 1981 |
| 7 | | Dorothy E. Denning,
Fred B. Schneider:
Master Keys for Group Sharing.
Inf. Process. Lett. 12(1): 23-25 (1981) |
| 6 | | Dorothy E. Denning,
Henk Meijer,
Fred B. Schneider:
More on Master Keys for Group Sharing.
Inf. Process. Lett. 13(3): 125-126 (1981) |
| 1980 |
| 5 | | Fred B. Schneider:
Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores.
DDB 1980: 183-189 |
| 4 | | Dorothy E. Denning,
Fred B. Schneider:
The Master Key Problem.
IEEE Symposium on Security and Privacy 1980: 103-107 |
| 1978 |
| 3 | | Arthur J. Bernstein,
Fred B. Schneider:
On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems.
Jerusalem Conference on Information Technology 1978: 537-541 |
| 2 | | Eralp A. Akkoyunlu,
Arthur J. Bernstein,
Fred B. Schneider,
Abraham Silberschatz:
Conditions for the Equivalence of Synchronous and Asynchronous Systems.
IEEE Trans. Software Eng. 4(6): 507-516 (1978) |
| 1 | | Fred B. Schneider,
Arthur J. Bernstein:
Scheduling in Concurrent Pascal.
Operating Systems Review 12(2): 15-20 (1978) |