B. Clifford Neuman

Orcid: 0000-0002-4318-0721

Affiliations:
  • University of Southern California, Los Angeles, CA, USA


According to our database1, B. Clifford Neuman authored at least 56 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Risk assessment of smart grids under cyber-physical attacks using Bayesian networks.
Int. J. Electron. Secur. Digit. Forensics, 2020

2017
BAGS: A Tool to Quantify Smart Grid Resilience.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2013
A systems approach to analysing cyber-physical threats in the Smart Grid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Deconstructing the Assessment of Anomaly-based Intrusion Detectors.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Behavioral-based cheating detection in online first person shooters using machine learning techniques.
Proceedings of the 2013 IEEE Conference on Computational Inteligence in Games (CIG), 2013

2012
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

2011
Mediating cyber and physical threat propagation in secure smart grid architectures.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

2010
Prospero: a tool for organizing Internet resources.
Internet Res., 2010

2007
Design, Deployment, and Use of the DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Trust based Approach for Improving Data Reliability in Industrial Sensor Networks.
Proceedings of the Trust Management, 2007

2006
Experience with deter: A testbed for security research.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

Reputation-based Trust-Aware Recommender System.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.
Proceedings of the Trust Management, 4th International Conference, 2006

Modelling the relative strength of security protocols.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
The Kerberos Network Authentication Service (V5).
RFC, July, 2005

Security and Privacy Using One-Round Zero-Knowledge Proofs.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Adaptive trust negotiation and access control.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Adaptive trust negotiation and access control for grids.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Security for Virtual Organizations.
Proceedings of the Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition, 2004

2003
Integrated Access Control and Intrusion Detection for Web Servers.
IEEE Trans. Parallel Distributed Syst., 2003

Dynamic Authorization and Intrusion Response in Distributed Systems.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Distributed Garbage Collection by Timeouts and Backward Inquiry.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

A Flexible Framework for Replication in Distributed Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
The Specification and Enforcement of Advanced Security Policies.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
The Set and Function Approach to Modeling Authorization in Distributed Systems.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Condition-Driven Integration of Security Services.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1999
An authorization framework for metacomputing applications.
Clust. Comput., 1999

The Performance of a Reliable, Request-Response Transport Protocol.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1998
Implementation Issues for E-Commerce.
Proceedings of the Network and Distributed System Security Symposium, 1998

Authorization for Metacomputing Applications.
Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998

1996
A flexible distributed authorization protocol.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

1995
Security, Payment, and Privacy for Network Commerce (Invited Paper).
IEEE J. Sel. Areas Commun., 1995

Endorsements, Licensing, and Insurance for Electronic Commerce.
Electron. Mark., 1995

Requirements for Network Payment: The NetCheque Perspective.
Proceedings of the COMPCON '95: Technologies for the Information Superhighway, 1995

1994
The Prospero Resource Manager: A scalable framework for processor allocation in distributed systems.
Concurr. Pract. Exp., 1994

Kerberos: an authentication service for computer networks.
IEEE Commun. Mag., 1994

Endorsements, Licensing, and Insurance for Distributed System Services.
Proceedings of the CCS '94, 1994

1993
Common DNS Implementation Errors and Suggested Fixes.
RFC, October, 1993

The Kerberos Network Authentication Service (V5).
RFC, September, 1993

A Note on the Use of Timestamps as Nonces.
ACM SIGOPS Oper. Syst. Rev., 1993

Electronic Currency for the Internet.
Electron. Mark., 1993

Using Prospero to Support Integrated Location-Independent Computing.
Proceedings of the USENIX Mobile & Location-Independent Computing Symposium, 1993

Proxy-Based Authorization and Accounting for Distributed Systems.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

Resource Management for Distributed Parallel Systems.
Proceedings of the Second International Symposium on High Performance Distributed Computing, 1993

NetCash: A Design for Practical Electronic Currency on the Internet.
Proceedings of the CCS '93, 1993

1992
The Virtual System Project (Abstract).
ACM SIGOPS Oper. Syst. Rev., 1992

A Comparison of Internet Resource Discovery Approaches.
Comput. Syst., 1992

The Prospero File System: A Global File System Based on the Virtual System Model.
Comput. Syst., 1992

1991
Protection and Security Issues for Future Systems.
Proceedings of the Operating Systems of the 90s and Beyond, International Workshop, 1991

1989
The Need for Closure in Large Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1989

Workstations and the virtual system model.
Proceedings of the Second Workshop On Workstation Operating Systems, 1989

1988
Kerberos: An Authentication Service for Open Network Systems.
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988

Adding Packet Radio to the Ultrix Kernel.
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988


  Loading...