Fred B. Schneider - Publications

Affiliations: 
Cornell University, Ithaca, NY, United States 
Area:
Computer Science

32 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Schneider FB. Putting trust in security engineering Communications of the Acm. 61: 37-39. DOI: 10.1145/3199601  0.336
2015 Kvalnes Å, Johansen D, Van Renesse R, Schneider FB, Valvåg SV. Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling Ieee Transactions On Parallel and Distributed Systems. 26: 2849-2862. DOI: 10.1109/Tpds.2014.2362540  0.315
2015 Van Renesse R, Schiper N, Schneider FB. Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab Ieee Transactions On Dependable and Secure Computing. 12: 472-484. DOI: 10.1109/Tdsc.2014.2355848  0.375
2012 Roeder T, Pass R, Schneider FB. Multi-verifier signatures Journal of Cryptology. 25: 310-348. DOI: 10.1007/S00145-010-9096-4  0.384
2011 Schneider FB, Walsh K, Sirer EG. Nexus authorization logic (NAL): Design rationale and applications Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952990  0.342
2010 Roeder T, Schneider FB. Proactive obfuscation Acm Transactions On Computer Systems. 28. DOI: 10.1145/1813654.1813655  0.371
2007 Schneider FB. Mapping the security landscape: A role for language techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4703: 1.  0.313
2006 Pucella R, Schneider FB. Independence from obfuscation: A semantic framework for diversity Proceedings of the Computer Security Foundations Workshop. 2006: 230-241. DOI: 10.3233/Jcs-2009-0379  0.38
2006 Hamlen KW, Morrisett G, Schneider FB. Computability classes for enforcement mechanisms Acm Transactions On Programming Languages and Systems. 28: 175-205. DOI: 10.1145/1111596.1111601  0.399
2006 Hamlen KW, Morrisett G, Schneider FB. Certified in-lined reference monitoring on .NET Plas 2006 - Proceedings of the 2006 Programming Languages and Analysis For Security Workshop. 2006: 7-16.  0.32
2005 Zhou L, Schneider FB, Van Renesse R. APSS: Proactive secret sharing in asynchronous systems Acm Transactions On Information and System Security. 8: 259-286. DOI: 10.1145/1085126.1085127  0.593
2004 Marsh MA, Schneider FB. CODEX: A robust and secure secret distribution system Ieee Transactions On Dependable and Secure Computing. 1: 34-47. DOI: 10.1109/Tdsc.2004.3  0.412
2003 Schneider FB. Enforceable security policies Foundations of Intrusion Tolerant Systems, Oasis 2003. 117-137. DOI: 10.1145/353323.353382  0.395
2003 Minsky YM, Schneider FB. Tolerating malicious gossip Distributed Computing. 16: 49-68. DOI: 10.1007/S00446-002-0082-4  0.617
2002 Zhou L, Schneider FB, Van Renesse R. COCA: A Secure Distributed Online Certification Authority Acm Transactions On Computer Systems. 20: 329-368. DOI: 10.1145/571637.571638  0.607
2002 Schneider FB. Secure systems conundrum Communications of the Acm. 45: 160. DOI: 10.1145/570907.570949  0.364
2002 Johansen D, Lauvset KJ, Van Renesse R, Schneider FB, Sudmann NP, Jacobsen K. A TACOMA retrospective Software - Practice and Experience. 32: 605-619. DOI: 10.1002/Spe.451  0.314
2001 Schneider FB, Morrisett JG, Harper R. A Language-Based Approach to Security Lecture Notes in Computer Science. 86-101. DOI: 10.1007/3-540-44577-3_6  0.393
2000 Erlingsson U, Schneider FB. SASI enforcement of security policies: A retrospective Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 287-295. DOI: 10.1109/DISCEX.2000.821527  0.676
1999 Schneider FB, Bellovin SM, Inouye AS. Building trustworthy systems: Lessons from the PTN and Internet Ieee Internet Computing. 3: 64-72. DOI: 10.1109/4236.807013  0.312
1998 Gries D, Schneider FB. Adding the everywhere operator to propositional logic Journal of Logic and Computation. 8: 119-129. DOI: 10.1093/Logcom/8.1.119  0.31
1998 Stoller SD, Schneider FB. Automated stream-based analysis of fault-tolerance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1486: 113-122. DOI: 10.1007/Bfb0055341  0.344
1996 Bressoud TC, Schneider FB. Hypervisor-based fault tolerance Acm Transactions On Computer Systems. 14: 80-107. DOI: 10.1145/225535.225538  0.363
1992 Widom J, Gries D, Schneider FB. Trace-Based Network Proof Systems: Expressiveness and Completeness Acm Transactions On Programming Languages and Systems (Toplas). 14: 396-416. DOI: 10.1145/129393.129396  0.34
1990 Schneider FB. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial Acm Computing Surveys (Csur). 22: 299-319. DOI: 10.1145/98163.98167  0.328
1989 Alpern B, Schneider FB. Verifying temporal properties without temporal logic Acm Transactions On Programming Languages and Systems (Toplas). 11: 147-167. DOI: 10.1145/59287.62028  0.315
1986 McCurley R, Schneider FB. Derivation of a distributed algorithm for finding paths in directed networks Science of Computer Programming. 6: 1-9. DOI: 10.1016/0167-6423(86)90016-X  0.305
1984 Lamport L, Schneider FB. The “Hoare Logic'’ of CSP, and All That Acm Transactions On Programming Languages and Systems (Toplas). 6: 281-296. DOI: 10.1145/2993.357247  0.303
1984 Schneider FB. Byzantine generals in action: Implementing fail-stop processors Acm Transactions On Computer Systems (Tocs). 2: 145-154. DOI: 10.1145/190.357399  0.337
1984 Schneider FB, Gries D, Schlichting RD. Fault-tolerant broadcasts Science of Computer Programming. 4: 1-15. DOI: 10.1016/0167-6423(84)90009-1  0.359
1983 Alpern B, Schneider FB. Key exchange using 'keyless cryptography' Information Processing Letters. 16: 79-81. DOI: 10.1016/0020-0190(83)90029-7  0.406
1982 Schneider FB. Synchronization in Distributed Programs Acm Transactions On Programming Languages and Systems (Toplas). 4: 125-148. DOI: 10.1145/357162.357163  0.309
Show low-probability matches.