Search the dblp DataBase
B. Clifford Neuman :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael F. Schwartz , Alan Emtage , Brewster Kahle , B. Clifford Neuman A Comparison of Internet Resource Discovery Approaches. [Citation Graph (6, 0)][DBLP ] Computing Systems, 1992, v:5, n:4, pp:461-493 [Journal ] Jennifer G. Steiner , B. Clifford Neuman , Jeffrey I. Schiller Kerberos: An Authentication Service for Open Network Systems. [Citation Graph (4, 0)][DBLP ] USENIX Winter, 1988, pp:191-202 [Conf ] B. Clifford Neuman The Prospero File System: A Global File System Based on the Virtual System Model. [Citation Graph (2, 0)][DBLP ] Computing Systems, 1992, v:5, n:4, pp:407-432 [Journal ] B. Clifford Neuman Condition-Driven Integration of Security Services. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:176- [Conf ] Gennady Medvinsky , Charlie Lai , B. Clifford Neuman Endorsements, Licensing, and Insurance for Distributed System Services. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:170-175 [Conf ] Gennady Medvinsky , B. Clifford Neuman NetCash: A Design for Practical Electronic Currency on the Internet. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:102-106 [Conf ] B. Clifford Neuman , Gennady Medvinsky Requirements for Network Payment: The NetCheque Perspective. [Citation Graph (0, 0)][DBLP ] COMPCON, 1995, pp:32-36 [Conf ] Eul-Gyu Im , B. Clifford Neuman A Flexible Framework for Replication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2003, pp:486-491 [Conf ] Sung-Wook Ryu , Eul-Gyu Im , B. Clifford Neuman Distributed Garbage Collection by Timeouts and Backward Inquiry. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2003, pp:426-432 [Conf ] B. Clifford Neuman Protection and Security Issues for Future Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems of the 90s and Beyond, 1991, pp:184-201 [Conf ] Tatyana Ryutov , B. Clifford Neuman , Dong-Ho Kim Dynamic Authorization and Intrusion Response in Distributed Systems. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:50-61 [Conf ] G. Gheorghiu , Tatyana Ryutov , B. Clifford Neuman Authorization for Metacomputing Applications. [Citation Graph (0, 0)][DBLP ] HPDC, 1998, pp:132-139 [Conf ] B. Clifford Neuman , Santosh Rao Resource Management for Distributed Parallel Systems. [Citation Graph (0, 0)][DBLP ] HPDC, 1993, pp:316-323 [Conf ] B. Clifford Neuman Proxy-Based Authorization and Accounting for Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 1993, pp:283-291 [Conf ] Tatyana Ryutov , B. Clifford Neuman , Dong-Ho Kim , Li Zhou Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:394-0 [Conf ] Noria Foukia , Li Zhou , Clifford Neuman Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:77-92 [Conf ] Tatyana Ryutov , B. Clifford Neuman The Set and Function Approach to Modeling Authorization in Distributed Systems. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:189-206 [Conf ] B. Clifford Neuman Implementation Issues for E-Commerce. [Citation Graph (0, 0)][DBLP ] NDSS, 1998, pp:- [Conf ] Tatyana Ryutov , B. Clifford Neuman The Specification and Enforcement of Advanced Security Policies. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:128-138 [Conf ] Tatyana Ryutov , Li Zhou , B. Clifford Neuman , Travis Leithead , Kent E. Seamons Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:139-146 [Conf ] B. Clifford Neuman , Wayne Yamamoto Adding Packet Radio to the Ultrix Kernel. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1988, pp:303-308 [Conf ] Tatyana Ryutov , G. Gheorghiu , B. Clifford Neuman An authorization framework for metacomputing applications. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 1999, v:2, n:2, pp:165-175 [Journal ] Charlie Lai , B. Clifford Neuman Endorsements, Licensing, and Insurance for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Electronic Markets, 1995, v:5, n:1, pp:- [Journal ] B. Clifford Neuman Security, Payment, and Privacy for Network Commerce (Invited Paper). [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:8, pp:1523-1531 [Journal ] B. Clifford Neuman , Stuart G. Stubblebine A Note on the Use of Timestamps as Nonces. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1993, v:27, n:2, pp:10-14 [Journal ] B. Clifford Neuman The Need for Closure in Large Distributed Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1989, v:23, n:4, pp:28-30 [Journal ] B. Clifford Neuman The Virtual System Project (Abstract). [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1992, v:26, n:2, pp:17- [Journal ] Tatyana Ryutov , B. Clifford Neuman , Dong-Ho Kim , Li Zhou Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:841-850 [Journal ] Tatyana Ryutov , Li Zhou , Clifford Neuman , Noria Foukia , Travis Leithead , Kent E. Seamons Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP ] GRID, 2005, pp:55-62 [Conf ] The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems. [Citation Graph (, )][DBLP ] Search in 0.303secs, Finished in 0.305secs