default search action
B. Clifford Neuman
Person information
- affiliation: University of Southern California, Los Angeles, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j15]Anas AlMajali, Yatin Wadhawan, Mahmood S. Saadeh, Laith Shalalfeh, Clifford Neuman:
Risk assessment of smart grids under cyber-physical attacks using Bayesian networks. Int. J. Electron. Secur. Digit. Forensics 12(4): 357-385 (2020)
2010 – 2019
- 2017
- [c38]Yatin Wadhawan, Clifford Neuman:
BAGS: A Tool to Quantify Smart Grid Resilience. FedCSIS (Communication Papers) 2017: 323-332 - 2016
- [c37]Yatin Wadhawan, Clifford Neuman:
Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology. CPS-SPC@CCS 2016: 71-80 - [c36]Yatin Wadhawan, Clifford Neuman:
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach. PrAISe@ECAI 2016: 7:1-7:8 - 2013
- [c35]Hashem Alayed, Fotos Frangoudes, Clifford Neuman:
Behavioral-based cheating detection in online first person shooters using machine learning techniques. CIG 2013: 1-8 - [c34]Arun Viswanathan, Kymie Tan, Clifford Neuman:
Deconstructing the Assessment of Anomaly-based Intrusion Detectors. RAID 2013: 286-306 - [c33]Anas AlMajali, Eric B. Rice, Arun Viswanathan, Kymie Tan, Clifford Neuman:
A systems approach to analysing cyber-physical threats in the Smart Grid. SmartGridComm 2013: 456-461 - 2012
- [c32]Anas AlMajali, Arun Viswanathan, Clifford Neuman:
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack. CSET 2012 - 2011
- [c31]Clifford Neuman, Kymie Tan:
Mediating cyber and physical threat propagation in secure smart grid architectures. SmartGridComm 2011: 238-243 - 2010
- [j14]B. Clifford Neuman:
Prospero: a tool for organizing Internet resources. Internet Res. 20(4): 408-419 (2010)
2000 – 2009
- 2007
- [c30]Tatyana Ryutov, B. Clifford Neuman:
Trust based Approach for Improving Data Reliability in Industrial Sensor Networks. IFIPTM 2007: 349-365 - [c29]Terry Benzel, Robert Braden, Dongho Kim, Anthony D. Joseph, B. Clifford Neuman, Ron Ostrenga, Stephen Schwab, Keith Sklower:
Design, Deployment, and Use of the DETER Testbed. DETER 2007 - 2006
- [c28]Ho Chung, Clifford Neuman:
Modelling the relative strength of security protocols. QoP 2006: 45-48 - [c27]Noria Foukia, Li Zhou, B. Clifford Neuman:
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. iTrust 2006: 77-92 - [c26]Sukumal Kitisin, Clifford Neuman:
Reputation-based Trust-Aware Recommender System. SecureComm 2006: 1-7 - [c25]Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony D. Joseph, Keith Sklower:
Experience with deter: A testbed for security research. TRIDENTCOM 2006 - 2005
- [c24]Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons:
Adaptive trust negotiation and access control for grids. GRID 2005: 55-62 - [c23]Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons:
Adaptive trust negotiation and access control. SACMAT 2005: 139-146 - [c22]Sultan Almuhammadi, Clifford Neuman:
Security and Privacy Using One-Round Zero-Knowledge Proofs. CEC 2005: 435-438 - [i3]Clifford Neuman, Tom Yu, Sam Hartman, Kenneth Raeburn:
The Kerberos Network Authentication Service (V5). RFC 4120: 1-138 (2005) - 2004
- [j13]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [p1]Frank Siebenlist, Nataraj Nagaratnam, Von Welch, Clifford Neuman:
Security for Virtual Organizations. The Grid 2, 2nd Edition 2004: 353-387 - 2003
- [j12]Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers. IEEE Trans. Parallel Distributed Syst. 14(9): 841-850 (2003) - [c21]Sung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman:
Distributed Garbage Collection by Timeouts and Backward Inquiry. COMPSAC 2003: 426-432 - [c20]Eul-Gyu Im, B. Clifford Neuman:
A Flexible Framework for Replication in Distributed Systems. COMPSAC 2003: 486-491 - [c19]Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim:
Dynamic Authorization and Intrusion Response in Distributed Systems. DISCEX (1) 2003: 50-61 - [c18]Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou:
Integrated Access Control and Intrusion Detection for Web Servers. ICDCS 2003: 394- - 2002
- [c17]Tatyana Ryutov, B. Clifford Neuman:
The Specification and Enforcement of Advanced Security Policies. POLICY 2002: 128-138 - 2001
- [c16]B. Clifford Neuman:
Condition-Driven Integration of Security Services. ACISP 2001: 176 - [c15]Tatyana Ryutov, B. Clifford Neuman:
The Set and Function Approach to Modeling Authorization in Distributed Systems. MMM-ACNS 2001: 189-206
1990 – 1999
- 1999
- [j11]Tatyana Ryutov, Grig Gheorghiu, B. Clifford Neuman:
An authorization framework for metacomputing applications. Clust. Comput. 2(2): 165-175 (1999) - [c14]Nader Salehi, Katia Obraczka, Clifford Neuman:
The Performance of a Reliable, Request-Response Transport Protocol. ISCC 1999: 102-108 - 1998
- [c13]Grig Gheorghiu, Tatyana Ryutov, B. Clifford Neuman:
Authorization for Metacomputing Applications. HPDC 1998: 132-139 - [c12]B. Clifford Neuman:
Implementation Issues for E-Commerce. NDSS 1998 - 1997
- [e2]Richard Graveman, Philippe A. Janson, Clifford Neuman, Li Gong:
CCS '97, Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997. ACM 1997, ISBN 0-89791-912-2 [contents] - 1996
- [c11]Jonathan T. Trostle, B. Clifford Neuman:
A flexible distributed authorization protocol. NDSS 1996: 43-52 - [e1]James T. Ellis, B. Clifford Neuman, David M. Balenson:
1996 Symposium on Network and Distributed System Security, (S)NDSS '96, San Diego, CA, USA, February 22-23, 1996. IEEE Computer Society 1996, ISBN 0-8186-7222-6 [contents] - 1995
- [j10]Charlie Lai, B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Electronic Commerce. Electron. Mark. 5(1): 19-20 (1995) - [j9]B. Clifford Neuman:
Security, Payment, and Privacy for Network Commerce (Invited Paper). IEEE J. Sel. Areas Commun. 13(8): 1523-1531 (1995) - [c10]B. Clifford Neuman, Gennady Medvinsky:
Requirements for Network Payment: The NetCheque Perspective. COMPCON 1995: 32-36 - 1994
- [j8]B. Clifford Neuman, Theodore Y. Ts'o:
Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9): 33-38 (1994) - [j7]B. Clifford Neuman, Santosh Rao:
The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems. Concurr. Pract. Exp. 6(4): 339-355 (1994) - [c9]Gennady Medvinsky, Charlie Lai, B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services. CCS 1994: 170-175 - 1993
- [j6]Gennady Medvinsky, B. Clifford Neuman:
Electronic Currency for the Internet. Electron. Mark. 3(3): 23-24 (1993) - [j5]B. Clifford Neuman, Stuart G. Stubblebine:
A Note on the Use of Timestamps as Nonces. ACM SIGOPS Oper. Syst. Rev. 27(2): 10-14 (1993) - [c8]Gennady Medvinsky, B. Clifford Neuman:
NetCash: A Design for Practical Electronic Currency on the Internet. CCS 1993: 102-106 - [c7]B. Clifford Neuman, Santosh Rao:
Resource Management for Distributed Parallel Systems. HPDC 1993: 316-323 - [c6]B. Clifford Neuman:
Proxy-Based Authorization and Accounting for Distributed Systems. ICDCS 1993: 283-291 - [c5]B. Clifford Neuman, Shantaprasad Upasani, Steven Seger Augart:
Using Prospero to Support Integrated Location-Independent Computing. Symposium on Mobile and Location-Independent Computing 1993 - [i2]John T. Kohl, B. Clifford Neuman:
The Kerberos Network Authentication Service (V5). RFC 1510: 1-112 (1993) - [i1]Anant Kumar, Jon Postel, B. Clifford Neuman, Peter B. Danzig, Steve Miller:
Common DNS Implementation Errors and Suggested Fixes. RFC 1536: 1-12 (1993) - 1992
- [j4]B. Clifford Neuman:
The Prospero File System: A Global File System Based on the Virtual System Model. Comput. Syst. 5(4): 407-432 (1992) - [j3]Michael F. Schwartz, Alan Emtage, Brewster Kahle, B. Clifford Neuman:
A Comparison of Internet Resource Discovery Approaches. Comput. Syst. 5(4): 461-493 (1992) - [j2]B. Clifford Neuman:
The Virtual System Project (Abstract). ACM SIGOPS Oper. Syst. Rev. 26(2): 17 (1992) - 1991
- [c4]B. Clifford Neuman:
Protection and Security Issues for Future Systems. Operating Systems of the 90s and Beyond 1991: 184-201
1980 – 1989
- 1989
- [j1]B. Clifford Neuman:
The Need for Closure in Large Distributed Systems. ACM SIGOPS Oper. Syst. Rev. 23(4): 28-30 (1989) - [c3]B. Clifford Neuman:
Workstations and the virtual system model. WWOS 1989: 91-95 - 1988
- [c2]Jennifer G. Steiner, B. Clifford Neuman, Jeffrey I. Schiller:
Kerberos: An Authentication Service for Open Network Systems. USENIX Winter 1988: 191-202 - [c1]B. Clifford Neuman, Wayne Yamamoto:
Adding Packet Radio to the Ultrix Kernel. USENIX Winter 1988: 303-308
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-30 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint