Fred B. Schneider

Affiliations:
  • Cornell University, Ithaca, USA


According to our database1, Fred B. Schneider authored at least 145 papers between 1978 and 2022.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

ACM Fellow

ACM Fellow 1995, "For work in semantics, methodology, and algorithms to support programming concurrent and distributed systems, particularly those intended for mission-critical settings.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Causal network telemetry.
Proceedings of the 5th International Workshop on P4 in Europe, 2022

Evoking Whitehead's Dictum.
Proceedings of the Edsger Wybe Dijkstra: His Life, Work, and Legacy, 2022

2021
Implementing insider defenses.
Commun. ACM, 2021

Verifying Hyperproperties With TLA.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
RIF: Reactive information flow labels.
J. Comput. Secur., 2020

2019
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

JRIF: Reactive Information Flow Control for Java.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
History and Context for Defining Liveness: Winner 2018 Edsger W. Dijkstra Prize.
SIGACT News, 2018

Putting trust in security engineering.
Commun. ACM, 2018

Impediments with policy interventions to foster cybersecurity.
Commun. ACM, 2018

SGX Enforcement of Use-Based Privacy.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
Technical Perspective: IronFleet simplifies proving safety and liveness properties.
Commun. ACM, 2017

2015
Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling.
IEEE Trans. Parallel Distributed Syst., 2015

Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab.
IEEE Trans. Dependable Secur. Comput., 2015

Quantification of integrity.
Math. Struct. Comput. Sci., 2015

Enforcing Privacy Policies with Meta-Code.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
When Not All Bits Are Equal: Worth-Based Information Flow.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2013
Cybersecurity Education in Universities.
IEEE Secur. Priv., 2013

Breaking-in Research.
IEEE Secur. Priv., 2013

Federated Identity Management Systems: A Privacy-Based Characterization.
IEEE Secur. Priv., 2013

Programming languages in security: keynote.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

2012
Multi-Verifier Signatures.
J. Cryptol., 2012

2011
Nexus authorization logic (NAL): Design rationale and applications.
ACM Trans. Inf. Syst. Secur., 2011

A Doctrinal Thesis.
IEEE Secur. Priv., 2011

Nerio: Leader Election and Edict Ordering
CoRR, 2011

Logical attestation: an authorization architecture for trustworthy computing.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetQuery: a knowledge plane for reasoning about network properties.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Beyond Traces and Independence.
Proceedings of the Dependable and Historic Computing, 2011

2010
Proactive obfuscation.
ACM Trans. Comput. Syst., 2010

Independence from obfuscation: A semantic framework for diversity.
J. Comput. Secur., 2010

Hyperproperties.
J. Comput. Secur., 2010

Fumbling the Future, Again.
IEEE Secur. Priv., 2010

Beyond hacking: an SOS!
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Quantifying information flow with beliefs.
J. Comput. Secur., 2009

Labeling-in Security.
IEEE Secur. Priv., 2009

Accountability for Perfection.
IEEE Secur. Priv., 2009

IT Monoculture Security Risks and Defenses.
IEEE Secur. Priv., 2009

The Monoculture Risk Put into Context.
IEEE Secur. Priv., 2009

Viewpoint - Program committee overload in systems.
Commun. ACM, 2009

2008
Network Neutrality versus Internet Trustworthiness?
IEEE Secur. Priv., 2008

Device Driver Safety Through a Reference Validation Mechanism.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

The Building Blocks of Consensus.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

2007
Technology Scapegoats and Policy Saviors.
IEEE Secur. Priv., 2007

Trusted Computing in Context.
IEEE Secur. Priv., 2007

Credentials-Based Authorization: Evaluation and Implementation.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Mapping the Security Landscape: A Role for Language Techniques.
Proceedings of the CONCUR 2007 - Concurrency Theory, 18th International Conference, 2007

2006
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 2006

Here Be Dragons.
IEEE Secur. Priv., 2006

Certified In-lined Reference Monitoring on .NET.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Independence From Obfuscation: A Semantic Framework for Dive.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
APSS: proactive secret sharing in asynchronous systems.
ACM Trans. Inf. Syst. Secur., 2005

Implementing Trustworthy Services Using Replicated State Machines.
IEEE Secur. Priv., 2005

It Depends on What You Pay.
IEEE Secur. Priv., 2005

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Secur. Priv., 2005

Automated Analysis of Fault-Tolerance in Distributed Systems.
Formal Methods Syst. Des., 2005

Distributed Blinding for Distributed ElGamal Re-Encryption.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Belief in Information Flow.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
CODEX: A Robust and Secure Secret Distribution System.
IEEE Trans. Dependable Secur. Comput., 2004

Time Out for Station Identification.
IEEE Secur. Priv., 2004

From the Editors: The Next Digital Divide.
IEEE Secur. Priv., 2004

Chain Replication for Supporting High Throughput and Availability.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Peer-to-Peer Authentication with a Distributed Single Sign-On Service.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Least Privilege and More.
IEEE Secur. Priv., 2003

Tolerating malicious gossip.
Distributed Comput., 2003

WAIF: Web of Asynchronous Information Filters.
Proceedings of the Future Directions in Distributed Computing, 2003

2002
COCA: A secure distributed online certification authority.
ACM Trans. Comput. Syst., 2002

A TACOMA retrospective.
Softw. Pract. Exp., 2002

Secure systems conundrum.
Commun. ACM, 2002

Lifting Reference Monitors from the Kernel.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

2001
Language-Based Security: What's Needed and Why.
Proceedings of the Static Analysis, 8th International Symposium, 2001

A Language-Based Approach to Security.
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001

2000
Enforceable security policies.
ACM Trans. Inf. Syst. Secur., 2000

Interview - Fred B. Schneider on Distributed Computing.
IEEE Distributed Syst. Online, 2000

Open Source in Security: Visiting the Bizarre.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

IRM Enforcement of Java Stack Inspection.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Building Trustworthy Systems: Lessons from the PTN and Internet.
IEEE Internet Comput., 1999

Evolving Telephone Networks.
Commun. ACM, 1999

SASI enforcement of security policies: a retrospective.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

NAP: Practical Fault-Tolerance for Itinerant Computations.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1998
Adding the Everywhere Operator to Propositional Logic.
J. Log. Comput., 1998

On Concurrent Programming [Book Review].
IEEE Concurr., 1998

Toward Trustworthy Networked Information Systems.
Commun. ACM, 1998

On Concurrent Programming.
Commun. ACM, 1998

Automated Stream-Based Analysis of Fault-Tolerance.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998

1997
On Concurrent Programming.
Graduate Texts in Computer Science, Springer, ISBN: 978-1-4612-1830-2, 1997

Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996.
Real Time Syst., 1997

Towards Fault-Tolerant and Secure Agentry.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

1996
Hypervisor-Based Fault Tolerance.
ACM Trans. Comput. Syst., 1996

Cryptographic support for fault-tolerant distributed computing.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Supporting broad internet access to TACOMA.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Notes on proof outline logic.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

On traditions in Marktoberdorf.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

1995
Verifying Programs That Use Causally-Ordered Message-Passing.
Sci. Comput. Program., 1995

Equational Propositional Logic.
Inf. Process. Lett., 1995

Faster Possibility Detection by Combining Two Approaches.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

Teaching as a logic tool (abstract).
Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, 1995

Operating system support for mobile agents.
Proceedings of the Fifth Workshop on Hot Topics in Operating Systems, 1995

Avoiding the Undefined by Underspecification.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
Reasoning about Programs by Exploiting the Environment.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

Hybrid Verification by Exploiting the Environment.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994

Teaching Logic as a Tool.
Proceedings of the Software Engineering Education, 1994

1993
Proving Nondeterministically Specified Safety Properties Using Progress Measures
Inf. Comput., November, 1993

A Formalization of Priority Inversion.
Real Time Syst., 1993

A Logical Approach to Discrete Math.
Texts and Monographs in Computer Science, Springer, ISBN: 978-1-4757-3837-7, 1993

1992
Trace-Based Network Proof Systems: Expressiveness and Completeness.
ACM Trans. Program. Lang. Syst., 1992

Introduction.
Distributed Comput., 1992

Optimal Primary-Backup Protocols.
Proceedings of the Distributed Algorithms, 6th International Workshop, 1992

1991
Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View".
Inf. Process. Lett., 1991

Putting Time into Proof Outlines.
Proceedings of the Real-Time: Theory in Practice, 1991

1990
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial.
ACM Comput. Surv., 1990

1989
Verifying Temporal Properties without Temporal Logic.
ACM Trans. Program. Lang. Syst., 1989

1988
On E. W. Dijkstra's position paper on "fairness: ".
ACM SIGSOFT Softw. Eng. Notes, 1988

1987
Recognizing Safety and Liveness.
Distributed Comput., 1987

Completeness and Incompleteness of Trace-Based Network Proof Systems.
Proceedings of the Conference Record of the Fourteenth Annual ACM Symposium on Principles of Programming Languages, 1987

Proving Boolean Combinations of Deterministic Properties
Proceedings of the Symposium on Logic in Computer Science (LICS '87), 1987

1986
Derivation of a Distributed Algorithm for Finding Paths in Directed Networks.
Sci. Comput. Program., 1986

Safety Without Stuttering.
Inf. Process. Lett., 1986

Abstractions for Fault Tolerance in Distributed Systems (Invited Paper).
Proceedings of the Information Processing 86, 1986

The State Machine Approach: A Tutorial.
Proceedings of the Fault-Tolerant Distributed Computing [Asilomar Workshop 1986], 1986

Concepts for Concurrent Programming.
Proceedings of the Current Trends in Concurrency, Overviews and Tutorials, 1986

1985
Defining Liveness.
Inf. Process. Lett., 1985

Thrifty Execution of Task Pipelines.
Acta Informatica, 1985

Constraints: A Uniform Approach to Aliasing and Typing.
Proceedings of the Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, 1985

Inexact Agreement: Accuracy, Precision, and Graceful Degradation.
Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, 1985

Symmetry and Similarity in Distributed Systems.
Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, 1985

1984
Using Message Passing for Distributed Programming: Proof Rules, Disciplines.
ACM Trans. Program. Lang. Syst., 1984

The "Hoare Logic" of CSP, and All That.
ACM Trans. Program. Lang. Syst., 1984

User Recovery and Reversal in Interactive Systems.
ACM Trans. Program. Lang. Syst., 1984

Byzantine Generals in Action: Implementing Fail-Stop Processors
ACM Trans. Comput. Syst., 1984

Fault-Tolerant Broadcasts.
Sci. Comput. Program., 1984

Paradigms for Distributed Programs.
Proceedings of the Distributed Systems: Methods and Tools for Specification, 1984

Formal Foundation for Specification and Verification.
Proceedings of the Distributed Systems: Methods and Tools for Specification, 1984

1983
Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems
ACM Trans. Comput. Syst., 1983

Key Exchange Using 'Keyless Cryptography'.
Inf. Process. Lett., 1983

Concepts and Notations for Concurrent Programming.
ACM Comput. Surv., 1983

1982
Synchronization in Distributed Programs.
ACM Trans. Program. Lang. Syst., 1982

Understanding and Using Asynchronous Message Passing (Preliminary Version).
Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, 1982

1981
Master Keys for Group Sharing.
Inf. Process. Lett., 1981

More on Master Keys for Group Sharing.
Inf. Process. Lett., 1981

1980
The Master Key Problem.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores.
Proceedings of the International Symposium on Distributed Data Bases, 1980

1978
Conditions for the Equivalence of Synchronous and Asynchronous Systems.
IEEE Trans. Software Eng., 1978

Scheduling in Concurrent Pascal.
ACM SIGOPS Oper. Syst. Rev., 1978

On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems.
Proceedings of the Information Technology '78: Proceedings of the 3rd Jerusalem Conference on Information Technology (JCIT3), 1978


  Loading...