Year |
Citation |
Score |
2018 |
Schneider FB. Putting trust in security engineering Communications of the Acm. 61: 37-39. DOI: 10.1145/3199601 |
0.336 |
|
2015 |
Kvalnes Å, Johansen D, Van Renesse R, Schneider FB, Valvåg SV. Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling Ieee Transactions On Parallel and Distributed Systems. 26: 2849-2862. DOI: 10.1109/Tpds.2014.2362540 |
0.315 |
|
2015 |
Van Renesse R, Schiper N, Schneider FB. Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab Ieee Transactions On Dependable and Secure Computing. 12: 472-484. DOI: 10.1109/Tdsc.2014.2355848 |
0.375 |
|
2012 |
Roeder T, Pass R, Schneider FB. Multi-verifier signatures Journal of Cryptology. 25: 310-348. DOI: 10.1007/S00145-010-9096-4 |
0.384 |
|
2011 |
Schneider FB, Walsh K, Sirer EG. Nexus authorization logic (NAL): Design rationale and applications Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952990 |
0.342 |
|
2010 |
Roeder T, Schneider FB. Proactive obfuscation Acm Transactions On Computer Systems. 28. DOI: 10.1145/1813654.1813655 |
0.371 |
|
2007 |
Schneider FB. Mapping the security landscape: A role for language techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4703: 1. |
0.313 |
|
2006 |
Pucella R, Schneider FB. Independence from obfuscation: A semantic framework for diversity Proceedings of the Computer Security Foundations Workshop. 2006: 230-241. DOI: 10.3233/Jcs-2009-0379 |
0.38 |
|
2006 |
Hamlen KW, Morrisett G, Schneider FB. Computability classes for enforcement mechanisms Acm Transactions On Programming Languages and Systems. 28: 175-205. DOI: 10.1145/1111596.1111601 |
0.399 |
|
2006 |
Hamlen KW, Morrisett G, Schneider FB. Certified in-lined reference monitoring on .NET Plas 2006 - Proceedings of the 2006 Programming Languages and Analysis For Security Workshop. 2006: 7-16. |
0.32 |
|
2005 |
Zhou L, Schneider FB, Van Renesse R. APSS: Proactive secret sharing in asynchronous systems Acm Transactions On Information and System Security. 8: 259-286. DOI: 10.1145/1085126.1085127 |
0.593 |
|
2004 |
Marsh MA, Schneider FB. CODEX: A robust and secure secret distribution system Ieee Transactions On Dependable and Secure Computing. 1: 34-47. DOI: 10.1109/Tdsc.2004.3 |
0.412 |
|
2003 |
Schneider FB. Enforceable security policies Foundations of Intrusion Tolerant Systems, Oasis 2003. 117-137. DOI: 10.1145/353323.353382 |
0.395 |
|
2003 |
Minsky YM, Schneider FB. Tolerating malicious gossip Distributed Computing. 16: 49-68. DOI: 10.1007/S00446-002-0082-4 |
0.617 |
|
2002 |
Zhou L, Schneider FB, Van Renesse R. COCA: A Secure Distributed Online Certification Authority Acm Transactions On Computer Systems. 20: 329-368. DOI: 10.1145/571637.571638 |
0.607 |
|
2002 |
Schneider FB. Secure systems conundrum Communications of the Acm. 45: 160. DOI: 10.1145/570907.570949 |
0.364 |
|
2002 |
Johansen D, Lauvset KJ, Van Renesse R, Schneider FB, Sudmann NP, Jacobsen K. A TACOMA retrospective Software - Practice and Experience. 32: 605-619. DOI: 10.1002/Spe.451 |
0.314 |
|
2001 |
Schneider FB, Morrisett JG, Harper R. A Language-Based Approach to Security Lecture Notes in Computer Science. 86-101. DOI: 10.1007/3-540-44577-3_6 |
0.393 |
|
2000 |
Erlingsson U, Schneider FB. SASI enforcement of security policies: A retrospective Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 287-295. DOI: 10.1109/DISCEX.2000.821527 |
0.676 |
|
1999 |
Schneider FB, Bellovin SM, Inouye AS. Building trustworthy systems: Lessons from the PTN and Internet Ieee Internet Computing. 3: 64-72. DOI: 10.1109/4236.807013 |
0.312 |
|
1998 |
Gries D, Schneider FB. Adding the everywhere operator to propositional logic Journal of Logic and Computation. 8: 119-129. DOI: 10.1093/Logcom/8.1.119 |
0.31 |
|
1998 |
Stoller SD, Schneider FB. Automated stream-based analysis of fault-tolerance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1486: 113-122. DOI: 10.1007/Bfb0055341 |
0.344 |
|
1996 |
Bressoud TC, Schneider FB. Hypervisor-based fault tolerance Acm Transactions On Computer Systems. 14: 80-107. DOI: 10.1145/225535.225538 |
0.363 |
|
1992 |
Widom J, Gries D, Schneider FB. Trace-Based Network Proof Systems: Expressiveness and Completeness Acm Transactions On Programming Languages and Systems (Toplas). 14: 396-416. DOI: 10.1145/129393.129396 |
0.34 |
|
1990 |
Schneider FB. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial Acm Computing Surveys (Csur). 22: 299-319. DOI: 10.1145/98163.98167 |
0.328 |
|
1989 |
Alpern B, Schneider FB. Verifying temporal properties without temporal logic Acm Transactions On Programming Languages and Systems (Toplas). 11: 147-167. DOI: 10.1145/59287.62028 |
0.315 |
|
1986 |
McCurley R, Schneider FB. Derivation of a distributed algorithm for finding paths in directed networks Science of Computer Programming. 6: 1-9. DOI: 10.1016/0167-6423(86)90016-X |
0.305 |
|
1984 |
Lamport L, Schneider FB. The “Hoare Logic'’ of CSP, and All That Acm Transactions On Programming Languages and Systems (Toplas). 6: 281-296. DOI: 10.1145/2993.357247 |
0.303 |
|
1984 |
Schneider FB. Byzantine generals in action: Implementing fail-stop processors Acm Transactions On Computer Systems (Tocs). 2: 145-154. DOI: 10.1145/190.357399 |
0.337 |
|
1984 |
Schneider FB, Gries D, Schlichting RD. Fault-tolerant broadcasts Science of Computer Programming. 4: 1-15. DOI: 10.1016/0167-6423(84)90009-1 |
0.359 |
|
1983 |
Alpern B, Schneider FB. Key exchange using 'keyless cryptography' Information Processing Letters. 16: 79-81. DOI: 10.1016/0020-0190(83)90029-7 |
0.406 |
|
1982 |
Schneider FB. Synchronization in Distributed Programs Acm Transactions On Programming Languages and Systems (Toplas). 4: 125-148. DOI: 10.1145/357162.357163 |
0.309 |
|
Show low-probability matches. |