Search the dblp DataBase
Fred B. Schneider :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Richard D. Schlichting , Fred B. Schneider Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems [Citation Graph (24, 0)][DBLP ] ACM Trans. Comput. Syst., 1983, v:1, n:3, pp:222-238 [Journal ] Fred B. Schneider Synchronization in Distributed Programs. [Citation Graph (4, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1982, v:4, n:2, pp:125-148 [Journal ] Stephen R. Mahaney , Fred B. Schneider Inexact Agreement: Accuracy, Precision, and Graceful Degradation. [Citation Graph (2, 0)][DBLP ] PODC, 1985, pp:237-249 [Conf ] Gregory R. Andrews , Fred B. Schneider Concepts and Notations for Concurrent Programming. [Citation Graph (1, 0)][DBLP ] ACM Comput. Surv., 1983, v:15, n:1, pp:3-43 [Journal ] Fred B. Schneider Byzantine Generals in Action: Implementing Fail-Stop Processors [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1984, v:2, n:2, pp:145-154 [Journal ] James E. Archer Jr. , Richard Conway , Fred B. Schneider User Recovery and Reversal in Interactive Systems. [Citation Graph (1, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1984, v:6, n:1, pp:1-19 [Journal ] Dag Johansen , Robbert van Renesse , Fred B. Schneider WAIF: Web of Asynchronous Information Filters. [Citation Graph (0, 0)][DBLP ] Future Directions in Distributed Computing, 2003, pp:81-86 [Conf ] Leslie Lamport , Fred B. Schneider Formal Foundation for Specification and Verification. [Citation Graph (0, 0)][DBLP ] Advanced Course: Distributed Systems, 1984, pp:203-285 [Conf ] Fred B. Schneider , Leslie Lamport Paradigms for Distributed Programs. [Citation Graph (0, 0)][DBLP ] Advanced Course: Distributed Systems, 1984, pp:431-480 [Conf ] David Gries , Fred B. Schneider Teaching Logic as a Tool. [Citation Graph (0, 0)][DBLP ] CSEE, 1994, pp:599-599 [Conf ] Michael R. Clarkson , Andrew C. Myers , Fred B. Schneider Belief in Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:31-45 [Conf ] Riccardo Pucella , Fred B. Schneider Independence From Obfuscation: A Semantic Framework for Dive. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:230-241 [Conf ] Fred B. Schneider , J. Gregory Morrisett , Robert Harper A Language-Based Approach to Security. [Citation Graph (0, 0)][DBLP ] Informatics, 2001, pp:86-101 [Conf ] Fred B. Schneider Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores. [Citation Graph (0, 0)][DBLP ] DDB, 1980, pp:183-189 [Conf ] Fred B. Schneider Lifting Reference Monitors from the Kernel. [Citation Graph (0, 0)][DBLP ] FASec, 2002, pp:1-2 [Conf ] Fred B. Schneider The State Machine Approach: A Tutorial. [Citation Graph (0, 0)][DBLP ] Fault-Tolerant Distributed Computing, 1986, pp:18-41 [Conf ] Limor Fix , Fred B. Schneider Hybrid Verification by Exploiting the Environment. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1994, pp:1-18 [Conf ] Scott D. Stoller , Fred B. Schneider Automated Stream-Based Analysis of Fault-Tolerance. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1998, pp:113-122 [Conf ] Limor Fix , Fred B. Schneider Reasoning about Programs by Exploiting the Environment. [Citation Graph (0, 0)][DBLP ] ICALP, 1994, pp:328-339 [Conf ] Dag Johansen , Keith Marzullo , Fred B. Schneider , Kjetil Jacobsen , Dmitrii Zagorodnov NAP: Practical Fault-Tolerance for Itinerant Computations. [Citation Graph (0, 0)][DBLP ] ICDCS, 1999, pp:180-189 [Conf ] Lidong Zhou , Michael A. Marsh , Fred B. Schneider , Anna Redz Distributed Blinding for Distributed ElGamal Re-Encryption. [Citation Graph (0, 0)][DBLP ] ICDCS, 2005, pp:815-824 [Conf ] Fred B. Schneider Abstractions for Fault Tolerance in Distributed Systems (Invited Paper). [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1986, pp:727-734 [Conf ] William K. Josephson , Emin Gün Sirer , Fred B. Schneider Peer-to-Peer Authentication with a Distributed Single Sign-On Service. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:250-258 [Conf ] Arthur J. Bernstein , Fred B. Schneider On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems. [Citation Graph (0, 0)][DBLP ] Jerusalem Conference on Information Technology, 1978, pp:537-541 [Conf ] Bowen Alpern , Fred B. Schneider Proving Boolean Combinations of Deterministic Properties [Citation Graph (0, 0)][DBLP ] LICS, 1987, pp:131-137 [Conf ] Fred B. Schneider On traditions in Marktoberdorf. [Citation Graph (0, 0)][DBLP ] NATO ASI DPD, 1996, pp:1-4 [Conf ] Fred B. Schneider Notes on proof outline logic. [Citation Graph (0, 0)][DBLP ] NATO ASI DPD, 1996, pp:351-394 [Conf ] Robbert van Renesse , Fred B. Schneider Chain Replication for Supporting High Throughput and Availability. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:91-104 [Conf ] Ralph E. Johnson , Fred B. Schneider Symmetry and Similarity in Distributed Systems. [Citation Graph (0, 0)][DBLP ] PODC, 1985, pp:13-22 [Conf ] Richard D. Schlichting , Fred B. Schneider Understanding and Using Asynchronous Message Passing (Preliminary Version). [Citation Graph (0, 0)][DBLP ] PODC, 1982, pp:141-147 [Conf ] Leslie Lamport , Fred B. Schneider Constraints: A Uniform Approach to Aliasing and Typing. [Citation Graph (0, 0)][DBLP ] POPL, 1985, pp:205-216 [Conf ] Jennifer Widom , David Gries , Fred B. Schneider Completeness and Incompleteness of Trace-Based Network Proof Systems. [Citation Graph (0, 0)][DBLP ] POPL, 1987, pp:27-38 [Conf ] Fred B. Schneider , Bard Bloom , Keith Marzullo Putting Time into Proof Outlines. [Citation Graph (0, 0)][DBLP ] REX Workshop, 1991, pp:618-639 [Conf ] Fred B. Schneider Language-Based Security: What's Needed and Why. [Citation Graph (0, 0)][DBLP ] SAS, 2001, pp:374- [Conf ] David Gries , Fred B. Schneider , Joan Krone , J. Stanley Warford , J. Peter Weston Teaching as a logic tool (abstract). [Citation Graph (0, 0)][DBLP ] SIGCSE, 1995, pp:384-385 [Conf ] Yaron Minsky , Robbert van Renesse , Fred B. Schneider , Scott D. Stoller Cryptographic support for fault-tolerant distributed computing. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:109-114 [Conf ] Dag Johansen , Robbert van Renesse , Fred B. Schneider Supporting broad internet access to TACOMA. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:55-58 [Conf ] Thomas C. Bressoud , Fred B. Schneider Hypervisor-based Fault-tolerance. [Citation Graph (0, 0)][DBLP ] SOSP, 1995, pp:1-11 [Conf ] Dorothy E. Denning , Fred B. Schneider The Master Key Problem. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1980, pp:103-107 [Conf ] Úlfar Erlingsson , Fred B. Schneider IRM Enforcement of Java Stack Inspection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:246-255 [Conf ] Fred B. Schneider Open Source in Security: Visiting the Bizarre. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:126-127 [Conf ] Navin Budhiraja , Keith Marzullo , Fred B. Schneider , Sam Toueg Optimal Primary-Backup Protocols. [Citation Graph (0, 0)][DBLP ] WDAG, 1992, pp:362-378 [Conf ] Fred B. Schneider Towards Fault-Tolerant and Secure Agentry. [Citation Graph (0, 0)][DBLP ] WDAG, 1997, pp:1-14 [Conf ] Scott D. Stoller , Fred B. Schneider Faster Possibility Detection by Combining Two Approaches. [Citation Graph (0, 0)][DBLP ] WDAG, 1995, pp:318-332 [Conf ] Fred B. Schneider , Richard Conway , Dale Skeen Thrifty Execution of Task Pipelines. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1985, v:22, n:1, pp:35-45 [Journal ] Fred B. Schneider Secure systems conundrum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:10, pp:160- [Journal ] Fred B. Schneider On Concurrent Programming. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:4, pp:128- [Journal ] Fred B. Schneider Toward Trustworthy Networked Information Systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:11, pp:144- [Journal ] Fred B. Schneider , Steven M. Bellovin Evolving Telephone Networks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:1, pp:160- [Journal ] Fred B. Schneider Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1990, v:22, n:4, pp:299-319 [Journal ] Bowen Alpern , Fred B. Schneider Recognizing Safety and Liveness. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1987, v:2, n:3, pp:117-126 [Journal ] Yaron Minsky , Fred B. Schneider Tolerating malicious gossip. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2003, v:16, n:1, pp:49-68 [Journal ] Fred B. Schneider Introduction. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1992, v:6, n:1, pp:1-3 [Journal ] Dejan S. Milojicic , Fred B. Schneider Interview - Fred B. Schneider on Distributed Computing. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2000, v:1, n:1, pp:- [Journal ] Scott D. Stoller , Fred B. Schneider Automated Analysis of Fault-Tolerance in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Formal Methods in System Design, 2005, v:26, n:2, pp:183-196 [Journal ] Nils Klarlund , Fred B. Schneider Proving Nondeterministically Specified Safety Properties Using Progress Measures [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1993, v:107, n:1, pp:151-170 [Journal ] Susan Landau , Martin R. Stytz , Carl E. Landwehr , Fred B. Schneider Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal ] Fred B. Schneider Least Privilege and More. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:55-59 [Journal ] Fred B. Schneider From the Editors: The Next Digital Divide. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:5- [Journal ] Fred B. Schneider Time Out for Station Identification. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:5- [Journal ] Fred B. Schneider It Depends on What You Pay. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:3- [Journal ] Fred B. Schneider , Lidong Zhou Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:5, pp:34-43 [Journal ] Fred B. Schneider , Steven M. Bellovin , Alan S. Inouye Building Trustworthy Systems: Lessons from the PTN and Internet. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1999, v:3, n:6, pp:64-72 [Journal ] Martín Abadi , Bowen Alpern , Krzysztof R. Apt , Nissim Francez , Shmuel Katz , Leslie Lamport , Fred B. Schneider Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1991, v:40, n:3, pp:141-142 [Journal ] Bowen Alpern , Alan J. Demers , Fred B. Schneider Safety Without Stuttering. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1986, v:23, n:4, pp:177-180 [Journal ] Bowen Alpern , Fred B. Schneider Key Exchange Using `Keyless Cryptography'. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1983, v:16, n:2, pp:79-81 [Journal ] Bowen Alpern , Fred B. Schneider Defining Liveness. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1985, v:21, n:4, pp:181-185 [Journal ] Dorothy E. Denning , Henk Meijer , Fred B. Schneider More on Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:13, n:3, pp:125-126 [Journal ] Dorothy E. Denning , Fred B. Schneider Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:12, n:1, pp:23-25 [Journal ] David Gries , Fred B. Schneider Equational Propositional Logic. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:53, n:3, pp:145-152 [Journal ] David Gries , Fred B. Schneider Adding the Everywhere Operator to Propositional Logic. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1998, v:8, n:1, pp:119-129 [Journal ] Özalp Babaoglu , Keith Marzullo , Fred B. Schneider A Formalization of Priority Inversion. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1993, v:5, n:4, pp:285-303 [Journal ] Danny Dolev , Rüdiger Reischuk , Fred B. Schneider , H. Raymond Strong Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1997, v:12, n:3, pp:329-345 [Journal ] Robert McCurley , Fred B. Schneider Derivation of a Distributed Algorithm for Finding Paths in Directed Networks. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1986, v:6, n:1, pp:1-9 [Journal ] Fred B. Schneider , David Gries , Richard D. Schlichting Fault-Tolerant Broadcasts. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1984, v:4, n:1, pp:1-15 [Journal ] Scott D. Stoller , Fred B. Schneider Verifying Programs That Use Causally-Ordered Message-Passing. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1995, v:24, n:2, pp:105-128 [Journal ] Fred B. Schneider , Arthur J. Bernstein Scheduling in Concurrent Pascal. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1978, v:12, n:2, pp:15-20 [Journal ] Dag Johansen , Kåre J. Lauvset , Robbert van Renesse , Fred B. Schneider , Nils P. Sudmann , Kjetil Jacobsen A TACOMA retrospective. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2002, v:32, n:6, pp:605-619 [Journal ] Michael A. Marsh , Fred B. Schneider CODEX: A Robust and Secure Secret Distribution System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:1, pp:34-47 [Journal ] Fred B. Schneider Enforceable security policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:1, pp:30-50 [Journal ] Lidong Zhou , Fred B. Schneider , Robbert van Renesse APSS: proactive secret sharing in asynchronous systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:259-286 [Journal ] Thomas C. Bressoud , Fred B. Schneider Hypervisor-Based Fault Tolerance. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1996, v:14, n:1, pp:80-107 [Journal ] Lidong Zhou , Fred B. Schneider , Robbert van Renesse COCA: A secure distributed online certification authority. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2002, v:20, n:4, pp:329-368 [Journal ] Bowen Alpern , Fred B. Schneider Verifying Temporal Properties without Temporal Logic. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1989, v:11, n:1, pp:147-167 [Journal ] Kevin W. Hamlen , J. Gregory Morrisett , Fred B. Schneider Computability classes for enforcement mechanisms. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2006, v:28, n:1, pp:175-205 [Journal ] Leslie Lamport , Fred B. Schneider The ``Hoare Logic'' of CSP, and All That. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1984, v:6, n:2, pp:281-296 [Journal ] Richard D. Schlichting , Fred B. Schneider Using Message Passing for Distributed Programming: Proof Rules, Disciplines. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1984, v:6, n:3, pp:402-431 [Journal ] Jennifer Widom , David Gries , Fred B. Schneider Trace-Based Network Proof Systems: Expressiveness and Completeness. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1992, v:14, n:3, pp:396-416 [Journal ] Eralp A. Akkoyunlu , Arthur J. Bernstein , Fred B. Schneider , Abraham Silberschatz Conditions for the Equivalence of Synchronous and Asynchronous Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1978, v:4, n:6, pp:507-516 [Journal ] Fred B. Schneider Mapping the Security Landscape: A Role for Language Techniques. [Citation Graph (0, 0)][DBLP ] CONCUR, 2007, pp:1- [Conf ] Fred B. Schneider Credentials-Based Authorization: Evaluation and Implementation. [Citation Graph (0, 0)][DBLP ] ICALP, 2007, pp:12-14 [Conf ] Hyperproperties. [Citation Graph (, )][DBLP ] Quantification of Integrity. [Citation Graph (, )][DBLP ] Beyond hacking: an SOS! [Citation Graph (, )][DBLP ] Device Driver Safety Through a Reference Validation Mechanism. [Citation Graph (, )][DBLP ] Certified In-lined Reference Monitoring on .NET. [Citation Graph (, )][DBLP ] The Building Blocks of Consensus. [Citation Graph (, )][DBLP ] Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (, )][DBLP ] Viewpoint - Program committee overload in systems. [Citation Graph (, )][DBLP ] Search in 0.032secs, Finished in 0.039secs