Peter Honeyman

According to our database1, Peter Honeyman
  • authored at least 48 papers between 1980 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 





WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A brief chronology of medical device security.
Commun. ACM, 2016

A replicated file system for Grid computing.
Concurrency and Computation: Practice and Experience, 2008

Performance and Availability Tradeoffs in Replicated File Systems.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

Interdependence of Reliability and Security.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Direct-pNFS: scalable, transparent, and versatile access to parallel file systems.
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007

Hierarchical Replication Control in a Global File System.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

High performance NFS - High performance NFS: facts and fictions.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

NFSv4 replication for grid storage middleware.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

Large files, small writes, and pNFS.
Proceedings of the 20th Annual International Conference on Supercomputing, 2006

Exporting Storage Systems in a Scalable Manner with pNFS.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005

Scaling NFSv4 with parallel file systems.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Hide and Seek: An Introduction to Steganography.
IEEE Security & Privacy, 2003

Preventing Privilege Escalation.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Linux NFS Client Write Performance.
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002

Detecting Steganographic Content on the Internet.
Proceedings of the Network and Distributed System Security Symposium, 2002

Welcome to CARDIS 02.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

Kerberized Credential Translation: A Solution to Web Access Control.
Proceedings of the 10th USENIX Security Symposium, 2001

Scalable Linux Scheduling.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

ScanSSH: Scanning the Internet for SSH Servers.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

Secure Internet Smartcards.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

Webcard: a Java Card Web Server.
Proceedings of the Smart Card Research and Advanced Applications, 2000

Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

SCFS: A UNIX Filesystem for Smartcards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Smartcard Integration with Kerberos V5.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

The Packet Vault: Secure Storage of Network Data.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

Practical Security Systems with Smartcards.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Secure Videoconferencing.
Proceedings of the 7th USENIX Security Symposium, 1998

Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Communications and consistency in mobile file systems.
IEEE Personal Commun., 1995

Partially Connected Operation.
Computing Systems, 1995

Joining Security Realms: A Single Login for NetWare and Kerberos.
Proceedings of the 5th USENIX Security Symposium, 1995

Partially Connected Operation.
Proceedings of the 2nd Symposium on Mobile and Location-Independent Computing (MLICS'95), 1995

Nonmonotonic Cryptographic Protocols.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

Long Running Jobs in an Authenticated Environment.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993

Integrating mass storage and file systems.
Proceedings of the Twelfth IEEE Symposium on Mass Storage Systems, 1993

Disconnected Operation for AFS.
Proceedings of the USENIX Mobile & Location-Independent Computing Symposium, 1993

Parsing Ambiguous Addresses for Electronic Services.
Softw., Pract. Exper., 1987

A Database-Driven VLSI Design System.
IEEE Trans. on CAD of Integrated Circuits and Systems, 1986

PATHALIAS or The Care and Feeding of Relative Addresses.
Proceedings of the USENIX Summer Conference, Altanta, GA, USA, June 1986, 1986

A New Characterization of Independence.
Proceedings of the SIGMOD'83, 1983

Vdd - A VLSI Design Database System.
Engineering Design Applications, 1983

Testing satisfaction of functional dependencies.
J. ACM, 1982

Preserving Functional Dependencies.
SIAM J. Comput., 1981

Testing the Universal Instance Assumption.
Inf. Process. Lett., 1980

Testing Satisfaction of Functional Dependencies.
Proceedings of the XP1 Workshop on Relational Database Theory, 30 June, 1980

Losslessly Joining Relations in Polynomial Time.
Proceedings of the XP1 Workshop on Relational Database Theory, 30 June, 1980

Extension Joins.
Proceedings of the Sixth International Conference on Very Large Data Bases, 1980