Search the dblp DataBase
Peter G. Neumann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dorothy E. Denning , Selim G. Akl , Mark Heckman , Teresa F. Lunt , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal ] Peter G. Neumann Risks, Responsibilities, and the Future: Walking the Tightwire. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1995, pp:257- [Conf ] Peter G. Neumann , Richard J. Feiertag PSOS Revisited. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:208-216 [Conf ] Peter G. Neumann Social and Technical Implications of Nonproprietary Software. [Citation Graph (0, 0)][DBLP ] BSDCon, 2003, pp:- [Conf ] Peter G. Neumann System and network trustworthiness in perspective. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:1-5 [Conf ] Peter G. Neumann Achieving Principled Assuredly Trustworthy Composable Systems and Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:182-187 [Conf ] Peter G. Neumann Toward a Methodology for Designing Large Systems and Verifying Their Properties. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1974, pp:52-67 [Conf ] Peter G. Neumann Developing Complex Software for Critical Systems. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1992, pp:117-131 [Conf ] Peter G. Neumann When Can Formal Methods Make a Real Difference? [Citation Graph (0, 0)][DBLP ] ICFEM, 2004, pp:12- [Conf ] Peter G. Neumann Requirements-Related Risks in Critical Systems. [Citation Graph (0, 0)][DBLP ] ICRE, 2000, pp:3-0 [Conf ] Peter G. Neumann Certitude and Rectitude. [Citation Graph (0, 0)][DBLP ] ICRE, 2000, pp:153- [Conf ] Peter G. Neumann , Richard J. Feiertag , Karl N. Levitt , Lawrence Robinson Software Development and Proofs of Multi-Level Security. [Citation Graph (0, 0)][DBLP ] ICSE, 1976, pp:421-428 [Conf ] Peter G. Neumann , Phillip A. Porras Experience with EMERALD to Date. [Citation Graph (0, 0)][DBLP ] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:73-80 [Conf ] Steven Fraser , Gregor Kiczales , Ricardo Lopez , Peter G. Neumann , Linda M. Northrop , Martin C. Rinard , Douglas C. Schmidt , Kevin Sullivan The ultra challenge: software systems beyond big. [Citation Graph (0, 0)][DBLP ] OOPSLA Companion, 2006, pp:929-933 [Conf ] Dorothy E. Denning , Selim G. Akl , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell , Mark Heckman Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf ] Peter G. Neumann Robust Nonproprietary Software. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:122-123 [Conf ] Susan Landau , Stephen T. Kent , Clint Brooks , Scott Charney , Dorothy E. Denning , Whitfield Diffie , Anthony Lauck , Douglas Miller , Peter G. Neumann , David Sobel Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal ] Rebecca Mercuri , Peter G. Neumann System integrity revisited. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:1, pp:160- [Journal ] Rebecca Mercuri , Peter G. Neumann Security by obscurity. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:11, pp:160- [Journal ] Peter G. Neumann A Tale of Two Thousands. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:3, pp:144- [Journal ] Peter G. Neumann Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:4, pp:136- [Journal ] Peter G. Neumann Risks in retrospect. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:7, pp:144- [Journal ] Peter G. Neumann Missile defense. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:9, pp:128- [Journal ] Peter G. Neumann What to know about risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:136- [Journal ] Peter G. Neumann Gambling on system accountability. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:2, pp:120- [Journal ] Peter G. Neumann E-epistemology and misinformation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:5, pp:104- [Journal ] Peter G. Neumann Risks in trusting untrustworthiness. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:9, pp:120- [Journal ] Peter G. Neumann Information system security redux. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:10, pp:136- [Journal ] Peter G. Neumann Optimistic optimization. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:6, pp:112- [Journal ] Peter G. Neumann The big picture. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:9, pp:112- [Journal ] Peter G. Neumann Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:10, pp:28-30 [Journal ] Peter G. Neumann Responsibilities of technologists. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:2, pp:128- [Journal ] Peter G. Neumann Anticipating disasters. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:3, pp:128- [Journal ] Peter G. Neumann Trustworthy systems revisited. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:152- [Journal ] Peter G. Neumann A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1984, v:27, n:4, pp:343- [Journal ] Peter G. Neumann Risks in Computerized Elections. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1990, v:33, n:11, pp:170- [Journal ] Peter G. Neumann Ghosts, Mysteries and Uncertainty. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1990, v:33, n:10, pp:170- [Journal ] Peter G. Neumann A Few Old Coincidences. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1990, v:33, n:9, pp:202- [Journal ] Peter G. Neumann Insecurity about Security? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1990, v:33, n:8, pp:170- [Journal ] Peter G. Neumann Some Reflections on a Telephone Switching Problem. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1990, v:33, n:7, pp:154- [Journal ] Peter G. Neumann The Not-So-Accidental Holist. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:9, pp:122- [Journal ] Peter G. Neumann Computers, Ethics, and Values. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:7, pp:106- [Journal ] Peter G. Neumann Expecting the Unexpected Mayday. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:5, pp:128- [Journal ] Peter G. Neumann Interpreting (Mis)information. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:4, pp:144- [Journal ] Peter G. Neumann Putting on Your Best Interface. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:3, pp:138- [Journal ] Peter G. Neumann Certifying Professionals. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:2, pp:130- [Journal ] Peter G. Neumann The Clock Grows at Midnight. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:1, pp:170- [Journal ] Peter G. Neumann The Human Element. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:11, pp:150- [Journal ] Peter G. Neumann Collaborative Effords. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:12, pp:162- [Journal ] Peter G. Neumann Survivable Systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:5, pp:130- [Journal ] Peter G. Neumann Aggravation by Computer: Life, Death, and Taxes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:7, pp:122- [Journal ] Peter G. Neumann What's in a Name? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:1, pp:186- [Journal ] Peter G. Neumann Inside "Risks of Risks". [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:3, pp:160- [Journal ] Peter G. Neumann Leap-Year Problems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:6, pp:162- [Journal ] Peter G. Neumann Fraud by Computer. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:8, pp:154- [Journal ] Peter G. Neumann Accidental Financial Losses. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:9, pp:194- [Journal ] Peter G. Neumann Where to Place Trust. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:10, pp:138- [Journal ] Peter G. Neumann Avoiding Weak Links. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:12, pp:146- [Journal ] Peter G. Neumann Risks Considered Global(ly). [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:1, pp:154- [Journal ] Peter G. Neumann Are Dependable Systems Feasible? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:2, pp:146- [Journal ] Peter G. Neumann Risks of Technology. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:3, pp:130- [Journal ] Peter G. Neumann Using Names as Identifiers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:4, pp:154- [Journal ] Peter G. Neumann The Role of Software Engineering. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:5, pp:114- [Journal ] Peter G. Neumann Modeling and Simulation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:6, pp:124- [Journal ] Peter G. Neumann Risks on the Rails. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:7, pp:130- [Journal ] Peter G. Neumann Risks of Surveillance. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:8, pp:122- [Journal ] Peter G. Neumann Animal Crackers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:9, pp:162- [Journal ] Peter G. Neumann System Development Woes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:10, pp:146- [Journal ] Peter G. Neumann Technology, Laws, and Society. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:3, pp:138- [Journal ] Peter G. Neumann Risks of Passwords. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:4, pp:126- [Journal ] Peter G. Neumann Alternative Passwords. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:5, pp:146- [Journal ] Peter G. Neumann Risks on the Information Superhighway. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:6, pp:114- [Journal ] Peter G. Neumann Friendly Fire. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:8, pp:138- [Journal ] Peter G. Neumann Expectations of Security and Privacy. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:9, pp:138- [Journal ] Peter G. Neumann Inside "Inside Risks". [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:12, pp:154- [Journal ] Peter G. Neumann Reassessing the Crypto Debate. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:3, pp:138- [Journal ] Peter G. Neumann Risks of Easy Answers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:9, pp:130- [Journal ] Peter G. Neumann Reviewing the Risks Archives. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:12, pp:138- [Journal ] Peter G. Neumann Computer Vulnerabilities: Exploitation or Avoidance. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:6, pp:138- [Journal ] Peter G. Neumann Risks in Digital Commerce. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:1, pp:154- [Journal ] Peter G. Neumann Disinformation Theory. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:10, pp:138- [Journal ] Peter G. Neumann Distributed Systems have Distributed Risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:11, pp:130- [Journal ] Peter G. Neumann Risks of Anonymity. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:12, pp:162- [Journal ] Peter G. Neumann A Risks-related Bookshelf. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:4, pp:122- [Journal ] Peter G. Neumann Linguistic Risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:5, pp:154- [Journal ] Peter G. Neumann Using Formal Methods to Reduce Risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:7, pp:114- [Journal ] Peter G. Neumann Hopes for Fewer Risks? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:2, pp:170- [Journal ] Peter G. Neumann The Big Picture. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:5, pp:136- [Journal ] Peter G. Neumann Identity-Ralated Misuse. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:7, pp:112- [Journal ] Peter G. Neumann Crypto Key Management. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:8, pp:136- [Journal ] Peter G. Neumann Integrity in Software Development. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:10, pp:144- [Journal ] Peter G. Neumann System Development Woes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:12, pp:160- [Journal ] Peter G. Neumann Protecting the Infrastructures. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:1, pp:128- [Journal ] Peter G. Neumann Are Computers Addictive? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:3, pp:128- [Journal ] Peter G. Neumann Internet Gambling. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:2, pp:112- [Journal ] Peter G. Neumann Laptops in Congress? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:7, pp:128- [Journal ] Peter G. Neumann Y2K Update. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:9, pp:128- [Journal ] Peter G. Neumann Risks of E-Education. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:10, pp:136- [Journal ] Peter G. Neumann Robust Open-Source Software. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:2, pp:128- [Journal ] Peter G. Neumann Information is a Double-Edged Sword. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:120- [Journal ] Peter G. Neumann Risks of Insiders. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:12, pp:160- [Journal ] Peter G. Neumann , Michael D. Byrne Disability-related risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:144- [Journal ] Peter G. Neumann , Peter J. Denning W(h)ither Research and Education? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:2, pp:154- [Journal ] Peter G. Neumann , Declan McCullagh Risks of Y2K. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:6, pp:144- [Journal ] Peter G. Neumann , David Lorge Parnas Computers: boon or bane? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:3, pp:168- [Journal ] Peter G. Neumann , Lauren Weinstein Risks of National Identity Cards. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:12, pp:176- [Journal ] Peter G. Neumann , Lauren Weinstein Spam, Spam, Spam! [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:6, pp:112- [Journal ] Peter G. Neumann , Lauren Weinstein Risks of Content Filtering. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:11, pp:152- [Journal ] Lauren Weinstein , Peter G. Neumann Internet Risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:5, pp:144- [Journal ] Lauren Weinstein , Peter G. Neumann Inside Risks: Risks of Panic. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:11, pp:152- [Journal ] Peter G. Neumann Risks relating to system compositions. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:7, pp:120- [Journal ] Peter G. Neumann , Lauren Weinstein Risks of RFID. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:5, pp:136- [Journal ] Peter G. Neumann The foresight saga. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:112- [Journal ] Peter G. Neumann Widespread network failures. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:2, pp:112- [Journal ] Peter G. Neumann A Note on Cyclic Permutation Error-Correcting Codes [Citation Graph (0, 0)][DBLP ] Information and Control, 1962, v:5, n:1, pp:72-86 [Journal ] Peter G. Neumann IC Online Exclusive Interview: Internet Security - Beyond Cryptography. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1999, v:3, n:2, pp:100- [Journal ] Peter G. Neumann , T. R. N. Rao Error-Correcting Codes for Byte-Organized Arithmetic Processors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1975, v:24, n:3, pp:226-232 [Journal ] Nancy G. Leveson , Peter G. Neumann Introduction to Special Issue on Software for Critical Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1993, v:19, n:1, pp:1-2 [Journal ] Peter G. Neumann On Hierarchical Design of Computer Systems for Critical Applications. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:9, pp:905-920 [Journal ] Peter G. Neumann Risks of Untrustworthiness. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:321-328 [Conf ] Peter G. Neumann E-migrating risks? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:9, pp:120- [Journal ] Herbert S. Lin , Alfred Z. Spector , Peter G. Neumann , Seymour E. Goodman Toward a safer and more secure cyberspace. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:10, pp:128- [Journal ] Computer-Related Risk Futures. [Citation Graph (, )][DBLP ] Security kernels. [Citation Graph (, )][DBLP ] Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. [Citation Graph (, )][DBLP ] Reflections on systems trustworthiness. [Citation Graph (, )][DBLP ] Internal surveillance, external risks. [Citation Graph (, )][DBLP ] Reflections on computer-related risks. [Citation Graph (, )][DBLP ] Risks of neglecting infrastructure. [Citation Graph (, )][DBLP ] Inside risks - U.S. election after-math. [Citation Graph (, )][DBLP ] Search in 0.013secs, Finished in 0.017secs