Fred B. Schneider

According to our database1, Fred B. Schneider
  • authored at least 136 papers between 1978 and 2015.
  • has a "Dijkstra number"2 of two.

Awards

ACM Fellow

ACM Fellow 1995, "For work in semantics, methodology, and algorithms to support programming concurrent and distributed systems, particularly those intended for mission-critical settings.".

IEEE Fellow

IEEE Fellow 2009, "For contributions to trustworthy computing, fault-tolerance and formal methods".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2015
Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling.
IEEE Trans. Parallel Distrib. Syst., 2015

Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab.
IEEE Trans. Dependable Sec. Comput., 2015

Quantification of integrity.
Mathematical Structures in Computer Science, 2015

Enforcing Privacy Policies with Meta-Code.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
When Not All Bits Are Equal: Worth-Based Information Flow.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2013
Cybersecurity Education in Universities.
IEEE Security & Privacy, 2013

Breaking-in Research.
IEEE Security & Privacy, 2013

Federated Identity Management Systems: A Privacy-Based Characterization.
IEEE Security & Privacy, 2013

Vive la Différence: Paxos vs. Viewstamped Replication vs. Zab.
CoRR, 2013

Programming languages in security: keynote.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

2012
Multi-Verifier Signatures.
J. Cryptology, 2012

2011
Nexus authorization logic (NAL): Design rationale and applications.
ACM Trans. Inf. Syst. Secur., 2011

A Doctrinal Thesis.
IEEE Security & Privacy, 2011

Nerio: Leader Election and Edict Ordering
CoRR, 2011

Logical attestation: an authorization architecture for trustworthy computing.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetQuery: a knowledge plane for reasoning about network properties.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Beyond Traces and Independence.
Proceedings of the Dependable and Historic Computing, 2011

2010
Proactive obfuscation.
ACM Trans. Comput. Syst., 2010

Independence from obfuscation: A semantic framework for diversity.
Journal of Computer Security, 2010

Hyperproperties.
Journal of Computer Security, 2010

Fumbling the Future, Again.
IEEE Security & Privacy, 2010

Implementing Trustworthy Services Using Replicated State Machines.
Proceedings of the Replication: Theory and Practice, 2010

Beyond hacking: an SOS!
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Quantification of Integrity.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Quantifying information flow with beliefs.
Journal of Computer Security, 2009

Labeling-in Security.
IEEE Security & Privacy, 2009

Accountability for Perfection.
IEEE Security & Privacy, 2009

IT Monoculture Security Risks and Defenses.
IEEE Security & Privacy, 2009

The Monoculture Risk Put into Context.
IEEE Security & Privacy, 2009

Viewpoint - Program committee overload in systems.
Commun. ACM, 2009

2008
Network Neutrality versus Internet Trustworthiness?
IEEE Security & Privacy, 2008

Device Driver Safety Through a Reference Validation Mechanism.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

The Building Blocks of Consensus.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Hyperproperties.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Technology Scapegoats and Policy Saviors.
IEEE Security & Privacy, 2007

Trusted Computing in Context.
IEEE Security & Privacy, 2007

Credentials-Based Authorization: Evaluation and Implementation.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Mapping the Security Landscape: A Role for Language Techniques.
Proceedings of the CONCUR 2007 - Concurrency Theory, 18th International Conference, 2007

2006
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 2006

Here Be Dragons.
IEEE Security & Privacy, 2006

Certified In-lined Reference Monitoring on .NET.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Independence From Obfuscation: A Semantic Framework for Dive.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
APSS: proactive secret sharing in asynchronous systems.
ACM Trans. Inf. Syst. Secur., 2005

Implementing Trustworthy Services Using Replicated State Machines.
IEEE Security & Privacy, 2005

It Depends on What You Pay.
IEEE Security & Privacy, 2005

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Security & Privacy, 2005

Automated Analysis of Fault-Tolerance in Distributed Systems.
Formal Methods in System Design, 2005

Distributed Blinding for Distributed ElGamal Re-Encryption.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Belief in Information Flow.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
CODEX: A Robust and Secure Secret Distribution System.
IEEE Trans. Dependable Sec. Comput., 2004

Time Out for Station Identification.
IEEE Security & Privacy, 2004

From the Editors: The Next Digital Divide.
IEEE Security & Privacy, 2004

Chain Replication for Supporting High Throughput and Availability.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Peer-to-Peer Authentication with a Distributed Single Sign-On Service.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Least Privilege and More.
IEEE Security & Privacy, 2003

Tolerating malicious gossip.
Distributed Computing, 2003

WAIF: Web of Asynchronous Information Filters.
Proceedings of the Future Directions in Distributed Computing, 2003

2002
COCA: A secure distributed online certification authority.
ACM Trans. Comput. Syst., 2002

A TACOMA retrospective.
Softw., Pract. Exper., 2002

Secure systems conundrum.
Commun. ACM, 2002

Lifting Reference Monitors from the Kernel.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

2001
Language-Based Security: What's Needed and Why.
Proceedings of the Static Analysis, 8th International Symposium, 2001

A Language-Based Approach to Security.
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001

2000
Enforceable security policies.
ACM Trans. Inf. Syst. Secur., 2000

Interview - Fred B. Schneider on Distributed Computing.
IEEE Distributed Systems Online, 2000

Open Source in Security: Visiting the Bizarre.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

IRM Enforcement of Java Stack Inspection.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Building Trustworthy Systems: Lessons from the PTN and Internet.
IEEE Internet Computing, 1999

Evolving Telephone Networks.
Commun. ACM, 1999

SASI enforcement of security policies: a retrospective.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

NAP: Practical Fault-Tolerance for Itinerant Computations.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1998
Adding the Everywhere Operator to Propositional Logic.
J. Log. Comput., 1998

On Concurrent Programming [Book Review].
IEEE Concurrency, 1998

Toward Trustworthy Networked Information Systems.
Commun. ACM, 1998

On Concurrent Programming.
Commun. ACM, 1998

Automated Stream-Based Analysis of Fault-Tolerance.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998

1997
On Concurrent Programming.
Graduate Texts in Computer Science, Springer, ISBN: 978-1-4612-1830-2, 1997

Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996.
Real-Time Systems, 1997

Towards Fault-Tolerant and Secure Agentry.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

1996
Hypervisor-Based Fault Tolerance.
ACM Trans. Comput. Syst., 1996

Cryptographic support for fault-tolerant distributed computing.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Supporting broad internet access to TACOMA.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Notes on proof outline logic.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

On traditions in Marktoberdorf.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

1995
Verifying Programs That Use Causally-Ordered Message-Passing.
Sci. Comput. Program., 1995

Equational Propositional Logic.
Inf. Process. Lett., 1995

Faster Possibility Detection by Combining Two Approaches.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

Hypervisor-based Fault-tolerance.
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995

Teaching as a logic tool (abstract).
Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, 1995

Operating system support for mobile agents.
Proceedings of the Fifth Workshop on Hot Topics in Operating Systems, 1995

Avoiding the Undefined by Underspecification.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
Reasoning about Programs by Exploiting the Environment.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

Hybrid Verification by Exploiting the Environment.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994

Teaching Logic as a Tool.
Proceedings of the Software Engineering Education, 1994

1993
Proving Nondeterministically Specified Safety Properties Using Progress Measures
Inf. Comput., November, 1993

A Formalization of Priority Inversion.
Real-Time Systems, 1993

A Logical Approach to Discrete Math.
Texts and Monographs in Computer Science, Springer, ISBN: 978-1-4757-3837-7, 1993

1992
Trace-Based Network Proof Systems: Expressiveness and Completeness.
ACM Trans. Program. Lang. Syst., 1992

Introduction.
Distributed Computing, 1992

Optimal Primary-Backup Protocols.
Proceedings of the Distributed Algorithms, 6th International Workshop, 1992

1991
Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View".
Inf. Process. Lett., 1991

Putting Time into Proof Outlines.
Proceedings of the Real-Time: Theory in Practice, 1991

1990
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial.
ACM Comput. Surv., 1990

1989
Verifying Temporal Properties without Temporal Logic.
ACM Trans. Program. Lang. Syst., 1989

1987
Recognizing Safety and Liveness.
Distributed Computing, 1987

Completeness and Incompleteness of Trace-Based Network Proof Systems.
Proceedings of the Conference Record of the Fourteenth Annual ACM Symposium on Principles of Programming Languages, 1987

Proving Boolean Combinations of Deterministic Properties
Proceedings of the Symposium on Logic in Computer Science (LICS '87), 1987

1986
Derivation of a Distributed Algorithm for Finding Paths in Directed Networks.
Sci. Comput. Program., 1986

Safety Without Stuttering.
Inf. Process. Lett., 1986

Abstractions for Fault Tolerance in Distributed Systems (Invited Paper).
IFIP Congress, 1986

The State Machine Approach: A Tutorial.
Proceedings of the Fault-Tolerant Distributed Computing [Asilomar Workshop 1986], 1986

Concepts for Concurrent Programming.
Proceedings of the Current Trends in Concurrency, Overviews and Tutorials, 1986

1985
Defining Liveness.
Inf. Process. Lett., 1985

Thrifty Execution of Task Pipelines.
Acta Inf., 1985

Constraints: A Uniform Approach to Aliasing and Typing.
Proceedings of the Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, 1985

Inexact Agreement: Accuracy, Precision, and Graceful Degradation.
Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, 1985

Symmetry and Similarity in Distributed Systems.
Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, 1985

1984
Using Message Passing for Distributed Programming: Proof Rules, Disciplines.
ACM Trans. Program. Lang. Syst., 1984

The "Hoare Logic" of CSP, and All That.
ACM Trans. Program. Lang. Syst., 1984

User Recovery and Reversal in Interactive Systems.
ACM Trans. Program. Lang. Syst., 1984

Byzantine Generals in Action: Implementing Fail-Stop Processors
ACM Trans. Comput. Syst., 1984

Fault-Tolerant Broadcasts.
Sci. Comput. Program., 1984

Paradigms for Distributed Programs.
Proceedings of the Distributed Systems: Methods and Tools for Specification, 1984

Formal Foundation for Specification and Verification.
Proceedings of the Distributed Systems: Methods and Tools for Specification, 1984

1983
Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems
ACM Trans. Comput. Syst., 1983

Key Exchange Using 'Keyless Cryptography'.
Inf. Process. Lett., 1983

Concepts and Notations for Concurrent Programming.
ACM Comput. Surv., 1983

1982
Synchronization in Distributed Programs.
ACM Trans. Program. Lang. Syst., 1982

Understanding and Using Asynchronous Message Passing (Preliminary Version).
Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, 1982

1981
Master Keys for Group Sharing.
Inf. Process. Lett., 1981

More on Master Keys for Group Sharing.
Inf. Process. Lett., 1981

1980
The Master Key Problem.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores.
DDB, 1980

1978
Conditions for the Equivalence of Synchronous and Asynchronous Systems.
IEEE Trans. Software Eng., 1978

Scheduling in Concurrent Pascal.
Operating Systems Review, 1978

On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems.
Proceedings of the Information Technology '78: Proceedings of the 3rd Jerusalem Conference on Information Technology (JCIT3), 1978


  Loading...