Fred B. Schneider

Affiliations: 
Cornell University, Ithaca, NY, United States 
Area:
Computer Science
Google:
"Fred Schneider"

Children

Sign in to add trainee
Lidong Zhou grad student 2001 Cornell
Yaron M. Minsky grad student 2002 Cornell
Ulfar Erlingsson grad student 2004 Cornell
Thomas M. Roeder grad student 2010 Cornell
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Schneider FB. (2018) Putting trust in security engineering Communications of the Acm. 61: 37-39
Kvalnes Å, Johansen D, Van Renesse R, et al. (2015) Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling Ieee Transactions On Parallel and Distributed Systems. 26: 2849-2862
Van Renesse R, Schiper N, Schneider FB. (2015) Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab Ieee Transactions On Dependable and Secure Computing. 12: 472-484
Roeder T, Pass R, Schneider FB. (2012) Multi-verifier signatures Journal of Cryptology. 25: 310-348
Schneider FB, Walsh K, Sirer EG. (2011) Nexus authorization logic (NAL): Design rationale and applications Acm Transactions On Information and System Security. 14
Roeder T, Schneider FB. (2010) Proactive obfuscation Acm Transactions On Computer Systems. 28
Schneider FB. (2007) Mapping the security landscape: A role for language techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4703: 1
Pucella R, Schneider FB. (2006) Independence from obfuscation: A semantic framework for diversity Proceedings of the Computer Security Foundations Workshop. 2006: 230-241
Hamlen KW, Morrisett G, Schneider FB. (2006) Computability classes for enforcement mechanisms Acm Transactions On Programming Languages and Systems. 28: 175-205
Hamlen KW, Morrisett G, Schneider FB. (2006) Certified in-lined reference monitoring on .NET Plas 2006 - Proceedings of the 2006 Programming Languages and Analysis For Security Workshop. 2006: 7-16
See more...