


Остановите войну!
for scientists:


default search action
Fred B. Schneider
Person information

- affiliation: Cornell University, Ithaca, USA
- award (2012): IEEE Emanuel R. Piore Award
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c63]Yunhe Liu, Nate Foster, Fred B. Schneider:
Causal network telemetry. EuroP4@CoNEXT 2022: 46-52 - [p3]Fred B. Schneider:
Evoking Whitehead's Dictum. Edsger Wybe Dijkstra 2022: 445-454 - 2021
- [j81]Eric Grosse, Fred B. Schneider, Lynette I. Millett:
Implementing insider defenses. Commun. ACM 64(5): 60-65 (2021) - [c62]Leslie Lamport, Fred B. Schneider:
Verifying Hyperproperties With TLA. CSF 2021: 1-16 - 2020
- [j80]Elisavet Kozyri, Fred B. Schneider:
RIF: Reactive information flow labels. J. Comput. Secur. 28(2): 191-228 (2020)
2010 – 2019
- 2019
- [c61]Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider:
JRIF: Reactive Information Flow Control for Java. Foundations of Security, Protocols, and Equational Reasoning 2019: 70-88 - [c60]Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais
, Nadia Tawbi
:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. CSF 2019: 351-366 - [c59]Eugene Bagdasaryan, Griffin Berlstein, Jason Waterman, Eleanor Birrell, Nate Foster, Fred B. Schneider, Deborah Estrin:
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy. WPES@CCS 2019: 111-124 - 2018
- [j79]Fred B. Schneider:
Impediments with policy interventions to foster cybersecurity. Commun. ACM 61(3): 36-38 (2018) - [j78]Fred B. Schneider:
Putting trust in security engineering. Commun. ACM 61(5): 37-39 (2018) - [j77]Fred B. Schneider:
History and Context for Defining Liveness: Winner 2018 Edsger W. Dijkstra Prize. SIGACT News 49(4): 60-63 (2018) - [c58]Eleanor Birrell, Anders T. Gjerdrum, Robbert van Renesse, Håvard D. Johansen, Dag Johansen, Fred B. Schneider:
SGX Enforcement of Use-Based Privacy. WPES@CCS 2018: 155-167 - 2017
- [j76]Fred B. Schneider:
Technical Perspective: IronFleet simplifies proving safety and liveness properties. Commun. ACM 60(7): 82 (2017) - 2015
- [j75]Michael R. Clarkson, Fred B. Schneider:
Quantification of integrity. Math. Struct. Comput. Sci. 25(2): 207-258 (2015) - [j74]Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:
Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab. IEEE Trans. Dependable Secur. Comput. 12(4): 472-484 (2015) - [j73]Åge Kvalnes, Dag Johansen, Robbert van Renesse, Fred B. Schneider, Steffen Viken Valvåg:
Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling. IEEE Trans. Parallel Distributed Syst. 26(10): 2849-2862 (2015) - [c57]Håvard D. Johansen, Eleanor Birrell, Robbert van Renesse, Fred B. Schneider, Magnus Stenhaug, Dag Johansen:
Enforcing Privacy Policies with Meta-Code. APSys 2015: 16:1-16:7 - 2014
- [c56]Mário S. Alvim
, Andre Scedrov
, Fred B. Schneider:
When Not All Bits Are Equal: Worth-Based Information Flow. POST 2014: 120-139 - 2013
- [j72]Fred B. Schneider:
Breaking-in Research. IEEE Secur. Priv. 11(2): 3-4 (2013) - [j71]Fred B. Schneider:
Cybersecurity Education in Universities. IEEE Secur. Priv. 11(4): 3-4 (2013) - [j70]Eleanor Birrell, Fred B. Schneider:
Federated Identity Management Systems: A Privacy-Based Characterization. IEEE Secur. Priv. 11(5): 36-48 (2013) - [c55]Fred B. Schneider:
Programming languages in security: keynote. PLDI 2013: 139-140 - [i2]Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:
Vive la Différence: Paxos vs. Viewstamped Replication vs. Zab. CoRR abs/1309.5671 (2013) - 2012
- [j69]Tom Roeder, Rafael Pass, Fred B. Schneider:
Multi-Verifier Signatures. J. Cryptol. 25(2): 310-348 (2012) - 2011
- [j68]Fred B. Schneider, Deirdre K. Mulligan:
A Doctrinal Thesis. IEEE Secur. Priv. 9(4): 3-4 (2011) - [j67]Fred B. Schneider, Kevin Walsh, Emin Gün Sirer:
Nexus authorization logic (NAL): Design rationale and applications. ACM Trans. Inf. Syst. Secur. 14(1): 8:1-8:28 (2011) - [c54]Fred B. Schneider:
Beyond Traces and Independence. Dependable and Historic Computing 2011: 479-485 - [c53]Alan Shieh, Emin Gün Sirer, Fred B. Schneider:
NetQuery: a knowledge plane for reasoning about network properties. SIGCOMM 2011: 278-289 - [c52]Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, Fred B. Schneider:
Logical attestation: an authorization architecture for trustworthy computing. SOSP 2011: 249-264 - [i1]Robbert van Renesse, Fred B. Schneider, Johannes Gehrke:
Nerio: Leader Election and Edict Ordering. CoRR abs/1109.5111 (2011) - 2010
- [j66]Fred B. Schneider:
Fumbling the Future, Again. IEEE Secur. Priv. 8(4): 3 (2010) - [j65]Riccardo Pucella, Fred B. Schneider:
Independence from obfuscation: A semantic framework for diversity. J. Comput. Secur. 18(5): 701-749 (2010) - [j64]Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. J. Comput. Secur. 18(6): 1157-1210 (2010) - [j63]Tom Roeder, Fred B. Schneider:
Proactive obfuscation. ACM Trans. Comput. Syst. 28(2): 4:1-4:54 (2010) - [c51]Alan Shieh, Emin Gün Sirer, Fred B. Schneider:
NetQuery: a knowledge plane for reasoning about network properties. StudentWorkshop@CoNEXT 2010: 23:1-23:2 - [c50]Michael R. Clarkson, Fred B. Schneider:
Quantification of Integrity. CSF 2010: 28-43 - [c49]Fred B. Schneider:
Beyond hacking: an SOS! ICSE (1) 2010: 2 - [c48]Fred B. Schneider, Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines. Replication 2010: 151-167
2000 – 2009
- 2009
- [j62]Ken Birman, Fred B. Schneider:
Viewpoint - Program committee overload in systems. Commun. ACM 52(5): 34-37 (2009) - [j61]Jaynarayan H. Lala, Fred B. Schneider:
IT Monoculture Security Risks and Defenses. IEEE Secur. Priv. 7(1): 12-13 (2009) - [j60]Kenneth P. Birman, Fred B. Schneider:
The Monoculture Risk Put into Context. IEEE Secur. Priv. 7(1): 14-17 (2009) - [j59]Fred B. Schneider:
Accountability for Perfection. IEEE Secur. Priv. 7(2): 3-4 (2009) - [j58]Fred B. Schneider:
Labeling-in Security. IEEE Secur. Priv. 7(6): 3 (2009) - [j57]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Quantifying information flow with beliefs. J. Comput. Secur. 17(5): 655-701 (2009) - 2008
- [j56]Fred B. Schneider:
Network Neutrality versus Internet Trustworthiness? IEEE Secur. Priv. 6(4): 3-4 (2008) - [c47]Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. CSF 2008: 51-65 - [c46]Yee Jiun Song, Robbert van Renesse, Fred B. Schneider, Danny Dolev:
The Building Blocks of Consensus. ICDCN 2008: 54-72 - [c45]Dan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, Fred B. Schneider:
Device Driver Safety Through a Reference Validation Mechanism. OSDI 2008: 241-254 - 2007
- [j55]Fred B. Schneider:
Trusted Computing in Context. IEEE Secur. Priv. 5(2): 4-5 (2007) - [j54]Fred B. Schneider:
Technology Scapegoats and Policy Saviors. IEEE Secur. Priv. 5(5): 3-4 (2007) - [c44]Fred B. Schneider:
Mapping the Security Landscape: A Role for Language Techniques. CONCUR 2007: 1 - [c43]Fred B. Schneider:
Credentials-Based Authorization: Evaluation and Implementation. ICALP 2007: 12-14 - 2006
- [j53]Fred B. Schneider:
Here Be Dragons. IEEE Secur. Priv. 4(3): 3 (2006) - [j52]Kevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider:
Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006) - [c42]Riccardo Pucella, Fred B. Schneider:
Independence From Obfuscation: A Semantic Framework for Dive. CSFW 2006: 230-241 - [c41]Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider:
Certified In-lined Reference Monitoring on .NET. PLAS 2006: 7-16 - 2005
- [j51]Scott D. Stoller, Fred B. Schneider:
Automated Analysis of Fault-Tolerance in Distributed Systems. Formal Methods Syst. Des. 26(2): 183-196 (2005) - [j50]Fred B. Schneider:
It Depends on What You Pay. IEEE Secur. Priv. 3(3): 3 (2005) - [j49]Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization. IEEE Secur. Priv. 3(3): 9-11 (2005) - [j48]Fred B. Schneider, Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines. IEEE Secur. Priv. 3(5): 34-43 (2005) - [j47]Lidong Zhou, Fred B. Schneider, Robbert van Renesse:
APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) - [c40]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Belief in Information Flow. CSFW 2005: 31-45 - [c39]Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz:
Distributed Blinding for Distributed ElGamal Re-Encryption. ICDCS 2005: 815-824 - 2004
- [j46]Fred B. Schneider:
From the Editors: The Next Digital Divide. IEEE Secur. Priv. 2(1): 5 (2004) - [j45]Fred B. Schneider:
Time Out for Station Identification. IEEE Secur. Priv. 2(5): 5 (2004) - [j44]Michael A. Marsh, Fred B. Schneider:
CODEX: A Robust and Secure Secret Distribution System. IEEE Trans. Dependable Secur. Comput. 1(1): 34-47 (2004) - [c38]William K. Josephson, Emin Gün Sirer, Fred B. Schneider:
Peer-to-Peer Authentication with a Distributed Single Sign-On Service. IPTPS 2004: 250-258 - [c37]Robbert van Renesse, Fred B. Schneider:
Chain Replication for Supporting High Throughput and Availability. OSDI 2004: 91-104 - 2003
- [j43]Yaron Minsky, Fred B. Schneider:
Tolerating malicious gossip. Distributed Comput. 16(1): 49-68 (2003) - [j42]Fred B. Schneider:
Least Privilege and More. IEEE Secur. Priv. 1(5): 55-59 (2003) - [c36]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
WAIF: Web of Asynchronous Information Filters. Future Directions in Distributed Computing 2003: 81-86 - 2002
- [j41]Fred B. Schneider:
Secure systems conundrum. Commun. ACM 45(10): 160 (2002) - [j40]Dag Johansen, Kåre J. Lauvset, Robbert van Renesse, Fred B. Schneider, Nils P. Sudmann, Kjetil Jacobsen:
A TACOMA retrospective. Softw. Pract. Exp. 32(6): 605-619 (2002) - [j39]Lidong Zhou, Fred B. Schneider, Robbert van Renesse:
COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4): 329-368 (2002) - [c35]Fred B. Schneider:
Lifting Reference Monitors from the Kernel. FASec 2002: 1-2 - 2001
- [c34]Fred B. Schneider, J. Gregory Morrisett, Robert Harper:
A Language-Based Approach to Security. Informatics 2001: 86-101 - [c33]Fred B. Schneider:
Language-Based Security: What's Needed and Why. SAS 2001: 374 - 2000
- [j38]Dejan S. Milojicic, Fred B. Schneider:
Interview - Fred B. Schneider on Distributed Computing. IEEE Distributed Syst. Online 1(1) (2000) - [j37]Fred B. Schneider:
Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1): 30-50 (2000) - [c32]Fred B. Schneider:
Open Source in Security: Visiting the Bizarre. IEEE Symposium on Security and Privacy 2000: 126-127 - [c31]Úlfar Erlingsson, Fred B. Schneider:
IRM Enforcement of Java Stack Inspection. IEEE Symposium on Security and Privacy 2000: 246-255
1990 – 1999
- 1999
- [j36]Fred B. Schneider, Steven M. Bellovin:
Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999) - [j35]Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye:
Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Comput. 3(6): 64-72 (1999) - [c30]Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, Dmitrii Zagorodnov:
NAP: Practical Fault-Tolerance for Itinerant Computations. ICDCS 1999: 180-189 - [c29]Úlfar Erlingsson, Fred B. Schneider:
SASI enforcement of security policies: a retrospective. NSPW 1999: 87-95 - 1998
- [j34]Fred B. Schneider:
On Concurrent Programming. Commun. ACM 41(4): 128 (1998) - [j33]Fred B. Schneider:
Toward Trustworthy Networked Information Systems. Commun. ACM 41(11): 144 (1998) - [j32]Fred B. Schneider, Reinhard Möller:
On Concurrent Programming [Book Review]. IEEE Concurr. 6(1): 85-86 (1998) - [j31]David Gries
, Fred B. Schneider:
Adding the Everywhere Operator to Propositional Logic. J. Log. Comput. 8(1): 119-129 (1998) - [c28]Scott D. Stoller, Fred B. Schneider:
Automated Stream-Based Analysis of Fault-Tolerance. FTRTFT 1998: 113-122 - 1997
- [b2]Fred B. Schneider:
On Concurrent Programming. Graduate Texts in Computer Science, Springer 1997, ISBN 978-1-4612-7303-5, pp. i-xix, 473 - [j30]Danny Dolev, Rüdiger Reischuk, Fred B. Schneider, H. Raymond Strong:
Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. Real Time Syst. 12(3): 329-345 (1997) - [c27]Fred B. Schneider:
Towards Fault-Tolerant and Secure Agentry. WDAG 1997: 1-14 - 1996
- [j29]Thomas C. Bressoud, Fred B. Schneider:
Hypervisor-Based Fault Tolerance. ACM Trans. Comput. Syst. 14(1): 80-107 (1996) - [c26]Fred B. Schneider:
On traditions in Marktoberdorf. NATO ASI DPD 1996: 1-4 - [c25]Fred B. Schneider:
Notes on proof outline logic. NATO ASI DPD 1996: 351-394 - [c24]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
Supporting broad internet access to TACOMA. ACM SIGOPS European Workshop 1996: 55-58 - [c23]Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller:
Cryptographic support for fault-tolerant distributed computing. ACM SIGOPS European Workshop 1996: 109-114 - 1995
- [j28]David Gries
, Fred B. Schneider:
Equational Propositional Logic. Inf. Process. Lett. 53(3): 145-152 (1995) - [j27]Scott D. Stoller, Fred B. Schneider:
Verifying Programs That Use Causally-Ordered Message-Passing. Sci. Comput. Program. 24(2): 105-128 (1995) - [c22]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
Operating system support for mobile agents. HotOS 1995: 42-45 - [c21]David Gries
, Fred B. Schneider, Joan Krone, J. Stanley Warford, J. Peter Weston:
Teaching as a logic tool (abstract). SIGCSE 1995: 384-385 - [c20]Thomas C. Bressoud, Fred B. Schneider:
Hypervisor-based Fault-tolerance. SOSP 1995: 1-11 - [c19]Scott D. Stoller, Fred B. Schneider:
Faster Possibility Detection by Combining Two Approaches. WDAG 1995: 318-332 - [p2]David Gries, Fred B. Schneider:
Avoiding the Undefined by Underspecification. Computer Science Today 1995: 366-373 - 1994
- [c18]David Gries, Fred B. Schneider:
Teaching Logic as a Tool. CSEE 1994: 599-599 - [c17]Limor Fix, Fred B. Schneider:
Hybrid Verification by Exploiting the Environment. FTRTFT 1994: 1-18 - [c16]Limor Fix, Fred B. Schneider:
Reasoning about Programs by Exploiting the Environment. ICALP 1994: 328-339 - 1993
- [b1]David Gries, Fred B. Schneider:
A Logical Approach to Discrete Math. Texts and Monographs in Computer Science, Springer 1993, ISBN 0-387-94115-0 - [j26]Nils Klarlund, Fred B. Schneider:
Proving Nondeterministically Specified Safety Properties Using Progress Measures. Inf. Comput. 107(1): 151-170 (1993) - [j25]Özalp Babaoglu
, Keith Marzullo, Fred B. Schneider:
A Formalization of Priority Inversion. Real Time Syst. 5(4): 285-303 (1993) - 1992
- [j24]Fred B. Schneider:
Introduction. Distributed Comput. 6(1): 1-3 (1992) - [j23]Jennifer Widom, David Gries
, Fred B. Schneider:
Trace-Based Network Proof Systems: Expressiveness and Completeness. ACM Trans. Program. Lang. Syst. 14(3): 396-416 (1992) - [c15]Navin Budhiraja, Keith Marzullo, Fred B. Schneider, Sam Toueg:
Optimal Primary-Backup Protocols. WDAG 1992: 362-378 - 1991
- [j22]Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider:
Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View". Inf. Process. Lett. 40(3): 141-142 (1991) - [c14]Fred B. Schneider, Bard Bloom, Keith Marzullo:
Putting Time into Proof Outlines. REX Workshop 1991: 618-639 - 1990
- [j21]Fred B. Schneider:
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Comput. Surv. 22(4): 299-319 (1990)
1980 – 1989
- 1989
- [j20]Bowen Alpern, Fred B. Schneider:
Verifying Temporal Properties without Temporal Logic. ACM Trans. Program. Lang. Syst. 11(1): 147-167 (1989) - 1988
- [j19]Fred B. Schneider, Leslie Lamport:
On E. W. Dijkstra's position paper on "fairness: ". ACM SIGSOFT Softw. Eng. Notes 13(3): 18-19 (1988) - 1987
- [j18]Bowen Alpern, Fred B. Schneider:
Recognizing Safety and Liveness. Distributed Comput. 2(3): 117-126 (1987) - [c13]Bowen Alpern, Fred B. Schneider:
Proving Boolean Combinations of Deterministic Properties. LICS 1987: 131-137 - [c12]Jennifer Widom, David Gries
, Fred B. Schneider:
Completeness and Incompleteness of Trace-Based Network Proof Systems. POPL 1987: 27-38 - [e2]Fred B. Schneider:
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, Vancouver, British Columbia, Canada, August 10-12, 1987. ACM 1987, ISBN 0-89791-239-X [contents] - 1986