The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fred B. Schneider: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard D. Schlichting, Fred B. Schneider
    Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems [Citation Graph (24, 0)][DBLP]
    ACM Trans. Comput. Syst., 1983, v:1, n:3, pp:222-238 [Journal]
  2. Fred B. Schneider
    Synchronization in Distributed Programs. [Citation Graph (4, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1982, v:4, n:2, pp:125-148 [Journal]
  3. Stephen R. Mahaney, Fred B. Schneider
    Inexact Agreement: Accuracy, Precision, and Graceful Degradation. [Citation Graph (2, 0)][DBLP]
    PODC, 1985, pp:237-249 [Conf]
  4. Gregory R. Andrews, Fred B. Schneider
    Concepts and Notations for Concurrent Programming. [Citation Graph (1, 0)][DBLP]
    ACM Comput. Surv., 1983, v:15, n:1, pp:3-43 [Journal]
  5. Fred B. Schneider
    Byzantine Generals in Action: Implementing Fail-Stop Processors [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1984, v:2, n:2, pp:145-154 [Journal]
  6. James E. Archer Jr., Richard Conway, Fred B. Schneider
    User Recovery and Reversal in Interactive Systems. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1984, v:6, n:1, pp:1-19 [Journal]
  7. Dag Johansen, Robbert van Renesse, Fred B. Schneider
    WAIF: Web of Asynchronous Information Filters. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:81-86 [Conf]
  8. Leslie Lamport, Fred B. Schneider
    Formal Foundation for Specification and Verification. [Citation Graph (0, 0)][DBLP]
    Advanced Course: Distributed Systems, 1984, pp:203-285 [Conf]
  9. Fred B. Schneider, Leslie Lamport
    Paradigms for Distributed Programs. [Citation Graph (0, 0)][DBLP]
    Advanced Course: Distributed Systems, 1984, pp:431-480 [Conf]
  10. David Gries, Fred B. Schneider
    Teaching Logic as a Tool. [Citation Graph (0, 0)][DBLP]
    CSEE, 1994, pp:599-599 [Conf]
  11. Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider
    Belief in Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:31-45 [Conf]
  12. Riccardo Pucella, Fred B. Schneider
    Independence From Obfuscation: A Semantic Framework for Dive. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:230-241 [Conf]
  13. Fred B. Schneider, J. Gregory Morrisett, Robert Harper
    A Language-Based Approach to Security. [Citation Graph (0, 0)][DBLP]
    Informatics, 2001, pp:86-101 [Conf]
  14. Fred B. Schneider
    Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores. [Citation Graph (0, 0)][DBLP]
    DDB, 1980, pp:183-189 [Conf]
  15. Fred B. Schneider
    Lifting Reference Monitors from the Kernel. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:1-2 [Conf]
  16. Fred B. Schneider
    The State Machine Approach: A Tutorial. [Citation Graph (0, 0)][DBLP]
    Fault-Tolerant Distributed Computing, 1986, pp:18-41 [Conf]
  17. Limor Fix, Fred B. Schneider
    Hybrid Verification by Exploiting the Environment. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1994, pp:1-18 [Conf]
  18. Scott D. Stoller, Fred B. Schneider
    Automated Stream-Based Analysis of Fault-Tolerance. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1998, pp:113-122 [Conf]
  19. Limor Fix, Fred B. Schneider
    Reasoning about Programs by Exploiting the Environment. [Citation Graph (0, 0)][DBLP]
    ICALP, 1994, pp:328-339 [Conf]
  20. Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, Dmitrii Zagorodnov
    NAP: Practical Fault-Tolerance for Itinerant Computations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1999, pp:180-189 [Conf]
  21. Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz
    Distributed Blinding for Distributed ElGamal Re-Encryption. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:815-824 [Conf]
  22. Fred B. Schneider
    Abstractions for Fault Tolerance in Distributed Systems (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1986, pp:727-734 [Conf]
  23. William K. Josephson, Emin Gün Sirer, Fred B. Schneider
    Peer-to-Peer Authentication with a Distributed Single Sign-On Service. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:250-258 [Conf]
  24. Arthur J. Bernstein, Fred B. Schneider
    On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems. [Citation Graph (0, 0)][DBLP]
    Jerusalem Conference on Information Technology, 1978, pp:537-541 [Conf]
  25. Bowen Alpern, Fred B. Schneider
    Proving Boolean Combinations of Deterministic Properties [Citation Graph (0, 0)][DBLP]
    LICS, 1987, pp:131-137 [Conf]
  26. Fred B. Schneider
    On traditions in Marktoberdorf. [Citation Graph (0, 0)][DBLP]
    NATO ASI DPD, 1996, pp:1-4 [Conf]
  27. Fred B. Schneider
    Notes on proof outline logic. [Citation Graph (0, 0)][DBLP]
    NATO ASI DPD, 1996, pp:351-394 [Conf]
  28. Robbert van Renesse, Fred B. Schneider
    Chain Replication for Supporting High Throughput and Availability. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:91-104 [Conf]
  29. Ralph E. Johnson, Fred B. Schneider
    Symmetry and Similarity in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1985, pp:13-22 [Conf]
  30. Richard D. Schlichting, Fred B. Schneider
    Understanding and Using Asynchronous Message Passing (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    PODC, 1982, pp:141-147 [Conf]
  31. Leslie Lamport, Fred B. Schneider
    Constraints: A Uniform Approach to Aliasing and Typing. [Citation Graph (0, 0)][DBLP]
    POPL, 1985, pp:205-216 [Conf]
  32. Jennifer Widom, David Gries, Fred B. Schneider
    Completeness and Incompleteness of Trace-Based Network Proof Systems. [Citation Graph (0, 0)][DBLP]
    POPL, 1987, pp:27-38 [Conf]
  33. Fred B. Schneider, Bard Bloom, Keith Marzullo
    Putting Time into Proof Outlines. [Citation Graph (0, 0)][DBLP]
    REX Workshop, 1991, pp:618-639 [Conf]
  34. Fred B. Schneider
    Language-Based Security: What's Needed and Why. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:374- [Conf]
  35. David Gries, Fred B. Schneider, Joan Krone, J. Stanley Warford, J. Peter Weston
    Teaching as a logic tool (abstract). [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1995, pp:384-385 [Conf]
  36. Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller
    Cryptographic support for fault-tolerant distributed computing. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:109-114 [Conf]
  37. Dag Johansen, Robbert van Renesse, Fred B. Schneider
    Supporting broad internet access to TACOMA. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:55-58 [Conf]
  38. Thomas C. Bressoud, Fred B. Schneider
    Hypervisor-based Fault-tolerance. [Citation Graph (0, 0)][DBLP]
    SOSP, 1995, pp:1-11 [Conf]
  39. Dorothy E. Denning, Fred B. Schneider
    The Master Key Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:103-107 [Conf]
  40. Úlfar Erlingsson, Fred B. Schneider
    IRM Enforcement of Java Stack Inspection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:246-255 [Conf]
  41. Fred B. Schneider
    Open Source in Security: Visiting the Bizarre. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:126-127 [Conf]
  42. Navin Budhiraja, Keith Marzullo, Fred B. Schneider, Sam Toueg
    Optimal Primary-Backup Protocols. [Citation Graph (0, 0)][DBLP]
    WDAG, 1992, pp:362-378 [Conf]
  43. Fred B. Schneider
    Towards Fault-Tolerant and Secure Agentry. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:1-14 [Conf]
  44. Scott D. Stoller, Fred B. Schneider
    Faster Possibility Detection by Combining Two Approaches. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:318-332 [Conf]
  45. Fred B. Schneider, Richard Conway, Dale Skeen
    Thrifty Execution of Task Pipelines. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1985, v:22, n:1, pp:35-45 [Journal]
  46. Fred B. Schneider
    Secure systems conundrum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:10, pp:160- [Journal]
  47. Fred B. Schneider
    On Concurrent Programming. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:4, pp:128- [Journal]
  48. Fred B. Schneider
    Toward Trustworthy Networked Information Systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:11, pp:144- [Journal]
  49. Fred B. Schneider, Steven M. Bellovin
    Evolving Telephone Networks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:1, pp:160- [Journal]
  50. Fred B. Schneider
    Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1990, v:22, n:4, pp:299-319 [Journal]
  51. Bowen Alpern, Fred B. Schneider
    Recognizing Safety and Liveness. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1987, v:2, n:3, pp:117-126 [Journal]
  52. Yaron Minsky, Fred B. Schneider
    Tolerating malicious gossip. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2003, v:16, n:1, pp:49-68 [Journal]
  53. Fred B. Schneider
    Introduction. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1992, v:6, n:1, pp:1-3 [Journal]
  54. Dejan S. Milojicic, Fred B. Schneider
    Interview - Fred B. Schneider on Distributed Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2000, v:1, n:1, pp:- [Journal]
  55. Scott D. Stoller, Fred B. Schneider
    Automated Analysis of Fault-Tolerance in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2005, v:26, n:2, pp:183-196 [Journal]
  56. Nils Klarlund, Fred B. Schneider
    Proving Nondeterministically Specified Safety Properties Using Progress Measures [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1993, v:107, n:1, pp:151-170 [Journal]
  57. Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
    Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal]
  58. Fred B. Schneider
    Least Privilege and More. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:55-59 [Journal]
  59. Fred B. Schneider
    From the Editors: The Next Digital Divide. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:5- [Journal]
  60. Fred B. Schneider
    Time Out for Station Identification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:5- [Journal]
  61. Fred B. Schneider
    It Depends on What You Pay. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:3- [Journal]
  62. Fred B. Schneider, Lidong Zhou
    Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:34-43 [Journal]
  63. Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye
    Building Trustworthy Systems: Lessons from the PTN and Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:6, pp:64-72 [Journal]
  64. Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider
    Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1991, v:40, n:3, pp:141-142 [Journal]
  65. Bowen Alpern, Alan J. Demers, Fred B. Schneider
    Safety Without Stuttering. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1986, v:23, n:4, pp:177-180 [Journal]
  66. Bowen Alpern, Fred B. Schneider
    Key Exchange Using `Keyless Cryptography'. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1983, v:16, n:2, pp:79-81 [Journal]
  67. Bowen Alpern, Fred B. Schneider
    Defining Liveness. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1985, v:21, n:4, pp:181-185 [Journal]
  68. Dorothy E. Denning, Henk Meijer, Fred B. Schneider
    More on Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1981, v:13, n:3, pp:125-126 [Journal]
  69. Dorothy E. Denning, Fred B. Schneider
    Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1981, v:12, n:1, pp:23-25 [Journal]
  70. David Gries, Fred B. Schneider
    Equational Propositional Logic. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:3, pp:145-152 [Journal]
  71. David Gries, Fred B. Schneider
    Adding the Everywhere Operator to Propositional Logic. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1998, v:8, n:1, pp:119-129 [Journal]
  72. Özalp Babaoglu, Keith Marzullo, Fred B. Schneider
    A Formalization of Priority Inversion. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1993, v:5, n:4, pp:285-303 [Journal]
  73. Danny Dolev, Rüdiger Reischuk, Fred B. Schneider, H. Raymond Strong
    Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1997, v:12, n:3, pp:329-345 [Journal]
  74. Robert McCurley, Fred B. Schneider
    Derivation of a Distributed Algorithm for Finding Paths in Directed Networks. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1986, v:6, n:1, pp:1-9 [Journal]
  75. Fred B. Schneider, David Gries, Richard D. Schlichting
    Fault-Tolerant Broadcasts. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1984, v:4, n:1, pp:1-15 [Journal]
  76. Scott D. Stoller, Fred B. Schneider
    Verifying Programs That Use Causally-Ordered Message-Passing. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1995, v:24, n:2, pp:105-128 [Journal]
  77. Fred B. Schneider, Arthur J. Bernstein
    Scheduling in Concurrent Pascal. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1978, v:12, n:2, pp:15-20 [Journal]
  78. Dag Johansen, Kåre J. Lauvset, Robbert van Renesse, Fred B. Schneider, Nils P. Sudmann, Kjetil Jacobsen
    A TACOMA retrospective. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2002, v:32, n:6, pp:605-619 [Journal]
  79. Michael A. Marsh, Fred B. Schneider
    CODEX: A Robust and Secure Secret Distribution System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:1, pp:34-47 [Journal]
  80. Fred B. Schneider
    Enforceable security policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:1, pp:30-50 [Journal]
  81. Lidong Zhou, Fred B. Schneider, Robbert van Renesse
    APSS: proactive secret sharing in asynchronous systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:259-286 [Journal]
  82. Thomas C. Bressoud, Fred B. Schneider
    Hypervisor-Based Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1996, v:14, n:1, pp:80-107 [Journal]
  83. Lidong Zhou, Fred B. Schneider, Robbert van Renesse
    COCA: A secure distributed online certification authority. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:4, pp:329-368 [Journal]
  84. Bowen Alpern, Fred B. Schneider
    Verifying Temporal Properties without Temporal Logic. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1989, v:11, n:1, pp:147-167 [Journal]
  85. Kevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider
    Computability classes for enforcement mechanisms. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2006, v:28, n:1, pp:175-205 [Journal]
  86. Leslie Lamport, Fred B. Schneider
    The ``Hoare Logic'' of CSP, and All That. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1984, v:6, n:2, pp:281-296 [Journal]
  87. Richard D. Schlichting, Fred B. Schneider
    Using Message Passing for Distributed Programming: Proof Rules, Disciplines. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1984, v:6, n:3, pp:402-431 [Journal]
  88. Jennifer Widom, David Gries, Fred B. Schneider
    Trace-Based Network Proof Systems: Expressiveness and Completeness. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1992, v:14, n:3, pp:396-416 [Journal]
  89. Eralp A. Akkoyunlu, Arthur J. Bernstein, Fred B. Schneider, Abraham Silberschatz
    Conditions for the Equivalence of Synchronous and Asynchronous Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1978, v:4, n:6, pp:507-516 [Journal]
  90. Fred B. Schneider
    Mapping the Security Landscape: A Role for Language Techniques. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2007, pp:1- [Conf]
  91. Fred B. Schneider
    Credentials-Based Authorization: Evaluation and Implementation. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:12-14 [Conf]

  92. Hyperproperties. [Citation Graph (, )][DBLP]


  93. Quantification of Integrity. [Citation Graph (, )][DBLP]


  94. Beyond hacking: an SOS! [Citation Graph (, )][DBLP]


  95. Device Driver Safety Through a Reference Validation Mechanism. [Citation Graph (, )][DBLP]


  96. Certified In-lined Reference Monitoring on .NET. [Citation Graph (, )][DBLP]


  97. The Building Blocks of Consensus. [Citation Graph (, )][DBLP]


  98. Implementing Trustworthy Services Using Replicated State Machines. [Citation Graph (, )][DBLP]


  99. Viewpoint - Program committee overload in systems. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.461secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002