The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

B. Clifford Neuman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael F. Schwartz, Alan Emtage, Brewster Kahle, B. Clifford Neuman
    A Comparison of Internet Resource Discovery Approaches. [Citation Graph (6, 0)][DBLP]
    Computing Systems, 1992, v:5, n:4, pp:461-493 [Journal]
  2. Jennifer G. Steiner, B. Clifford Neuman, Jeffrey I. Schiller
    Kerberos: An Authentication Service for Open Network Systems. [Citation Graph (4, 0)][DBLP]
    USENIX Winter, 1988, pp:191-202 [Conf]
  3. B. Clifford Neuman
    The Prospero File System: A Global File System Based on the Virtual System Model. [Citation Graph (2, 0)][DBLP]
    Computing Systems, 1992, v:5, n:4, pp:407-432 [Journal]
  4. B. Clifford Neuman
    Condition-Driven Integration of Security Services. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:176- [Conf]
  5. Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
    Endorsements, Licensing, and Insurance for Distributed System Services. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:170-175 [Conf]
  6. Gennady Medvinsky, B. Clifford Neuman
    NetCash: A Design for Practical Electronic Currency on the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:102-106 [Conf]
  7. B. Clifford Neuman, Gennady Medvinsky
    Requirements for Network Payment: The NetCheque Perspective. [Citation Graph (0, 0)][DBLP]
    COMPCON, 1995, pp:32-36 [Conf]
  8. Eul-Gyu Im, B. Clifford Neuman
    A Flexible Framework for Replication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:486-491 [Conf]
  9. Sung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman
    Distributed Garbage Collection by Timeouts and Backward Inquiry. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:426-432 [Conf]
  10. B. Clifford Neuman
    Protection and Security Issues for Future Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems of the 90s and Beyond, 1991, pp:184-201 [Conf]
  11. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
    Dynamic Authorization and Intrusion Response in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:50-61 [Conf]
  12. G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
    Authorization for Metacomputing Applications. [Citation Graph (0, 0)][DBLP]
    HPDC, 1998, pp:132-139 [Conf]
  13. B. Clifford Neuman, Santosh Rao
    Resource Management for Distributed Parallel Systems. [Citation Graph (0, 0)][DBLP]
    HPDC, 1993, pp:316-323 [Conf]
  14. B. Clifford Neuman
    Proxy-Based Authorization and Accounting for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1993, pp:283-291 [Conf]
  15. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou
    Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:394-0 [Conf]
  16. Noria Foukia, Li Zhou, Clifford Neuman
    Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:77-92 [Conf]
  17. Tatyana Ryutov, B. Clifford Neuman
    The Set and Function Approach to Modeling Authorization in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:189-206 [Conf]
  18. B. Clifford Neuman
    Implementation Issues for E-Commerce. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  19. Tatyana Ryutov, B. Clifford Neuman
    The Specification and Enforcement of Advanced Security Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:128-138 [Conf]
  20. Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:139-146 [Conf]
  21. B. Clifford Neuman, Wayne Yamamoto
    Adding Packet Radio to the Ultrix Kernel. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1988, pp:303-308 [Conf]
  22. Tatyana Ryutov, G. Gheorghiu, B. Clifford Neuman
    An authorization framework for metacomputing applications. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1999, v:2, n:2, pp:165-175 [Journal]
  23. Charlie Lai, B. Clifford Neuman
    Endorsements, Licensing, and Insurance for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Electronic Markets, 1995, v:5, n:1, pp:- [Journal]
  24. B. Clifford Neuman
    Security, Payment, and Privacy for Network Commerce (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:8, pp:1523-1531 [Journal]
  25. B. Clifford Neuman, Stuart G. Stubblebine
    A Note on the Use of Timestamps as Nonces. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1993, v:27, n:2, pp:10-14 [Journal]
  26. B. Clifford Neuman
    The Need for Closure in Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1989, v:23, n:4, pp:28-30 [Journal]
  27. B. Clifford Neuman
    The Virtual System Project (Abstract). [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1992, v:26, n:2, pp:17- [Journal]
  28. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou
    Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:841-850 [Journal]
  29. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:55-62 [Conf]

  30. The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002