Author image not provided
 Fred Barry Schneider

Authors:
Add personal information
ACM Fellow badge
  Affiliation history
Bibliometrics: publication history
Average citations per article18.26
Citation Count3,268
Publication count179
Publication years1978-2017
Available for download43
Average downloads per article989.12
Downloads (cumulative)42,532
Downloads (12 Months)1,983
Downloads (6 Weeks)195
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


182 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 182
Result page: 1 2 3 4 5 6 7 8 9 10

Sort by:

1 published by ACM
April 2018 Communications of the ACM: Volume 61 Issue 5, May 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 305,   Downloads (Overall): 305

Full text available: HtmlHtml  PDFPDF
Proposing a stronger foundation for an engineering discipline to support the design of secure systems.

2 published by ACM
February 2018 Communications of the ACM: Volume 61 Issue 3, March 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 240,   Downloads (Overall): 240

Full text available: HtmlHtml  PDFPDF
A call for discussion of governmental investment and intervention in support of cybersecurity.

3 published by ACM
June 2017 Communications of the ACM: Volume 60 Issue 7, July 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 34,   Downloads (Overall): 223

Full text available: HtmlHtml  PDFPDF

4
October 2015 IEEE Transactions on Parallel and Distributed Systems: Volume 26 Issue 10, October 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The omni-kernel architecture is designed around pervasive monitoring and scheduling. Motivated by new requirements in virtualized environments, this architecture ensures that all resource consumption is measured, that resource consumption resulting from a scheduling decision is attributable to an activity, and that scheduling decisions are fine-grained. Vortex , implemented for multi-core ...

5 published by ACM
July 2015 APSys '15: Proceedings of the 6th Asia-Pacific Workshop on Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 32,   Downloads (Overall): 71

Full text available: PDFPDF
This paper proposes a mechanism for expressing and enforcing security policies for shared data. Security policies are expressed as stateful meta-code operations; meta-code can express a broad class of policies, including access-based policies, use-based policies, obligations, and sticky policies with declassification. The meta-code is interposed in the filesystem access path ...

6 published by ACM
June 2013 PLDI '13: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 19,   Downloads (Overall): 252

Full text available: PDFPDF
Keywords: science of security
Also published in:
June 2013  ACM SIGPLAN Notices - PLDI '13: Volume 48 Issue 6, June 2013

7
April 2012 Journal of Cryptology: Volume 25 Issue 2, April 2012
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Multi-verifier signatures generalize public-key signatures to a secret-key setting. Just like public-key signatures, these signatures are both transferable and secure under arbitrary (unbounded) adaptive chosen-message attacks. In contrast to public-key signature schemes, however, we exhibit practical constructions of multi-verifier signature schemes that are provably secure and are based only on ...
Keywords: Message authentication codes, Multi-verifier signatures

8 published by ACM
October 2011 SOSP '11: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Publisher: ACM
Bibliometrics:
Citation Count: 31
Downloads (6 Weeks): 2,   Downloads (12 Months): 40,   Downloads (Overall): 660

Full text available: PDFPDF
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation , this architecture provides a sound framework for reasoning about run time behavior of applications. Logical attestation is based on attributable, unforgeable statements about program properties, expressed in a ...
Keywords: credentials-based authorization, logic, trusted platform module

9 published by ACM
August 2011 SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 2,   Downloads (12 Months): 30,   Downloads (Overall): 664

Full text available: PDFPDF
This paper presents the design and implementation of NetQuery, a knowledge plane for federated networks such as the Internet. In such networks, not all administrative domains will generate information that an application can trust and many administrative domains may have restrictive policies on disclosing network information. Thus, both the trustworthiness ...
Keywords: knowledge plane, tpm, trustworthy computing
Also published in:
October 2011  ACM SIGCOMM Computer Communication Review - SIGCOMM '11: Volume 41 Issue 4, August 2011

10
July 2011 IEEE Security and Privacy: Volume 9 Issue 4, July 2011
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Policy proposals are best made relative to a cybersecurity doctrine rather than suggested piecemeal as is being done today. A doctrine of deterrence through accountability, for example, would be a basis for rationalizing proposals that equate attacks with crimes and focus on network-wide authentication and identification mechanisms. A new doctrine ...
Keywords: cybersecurity policy, public cybersecurity, deterrence through accountability.

11 published by ACM
June 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 1, May 2011
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 349

Full text available: PDFPDF
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics that are based on “says” and “speaks for” operators. NAL enables authorization of access requests to depend on (i) the source or pedigree of the requester, (ii) ...
Keywords: Authorization logic, CDD, credentials-based authorization

12
January 2011 Dependable and Historic Computing: essays dedicated to Brian Randell on the occasion of his 75th birthday
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

The formal methods, fault-tolerance, and cyber-security research communities explore models that differ from each other. The differences frustrate efforts at cross-community collaboration. Moreover, ignorance about these differences means the status quo is likely to persist. This paper discusses two of the key differences: (i) the trace-based semantic foundation for formal ...

13
December 2010
Bibliometrics:
Citation Count: 0

Here, the authors strive to change the way logic and discrete math are taught in computer science and mathematics: while many books treat logic simply as another topic of study, this one is unique in its willingness to go one step further. The book traets logic as a basic tool ...

14 published by ACM
November 2010 CoNEXT '10 Student Workshop: Proceedings of the ACM CoNEXT Student Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 79

Full text available: PDFPDF
Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect against denial of service attacks [1, 2]. Yet the standard IP interface masks these differences; every network appears to provide ...

15
September 2010 Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07): Volume 18 Issue 6, September 2010
Publisher: IOS Press
Bibliometrics:
Citation Count: 35

Trace properties, which have long been used for reasoning about systems, are sets of execution traces. Hyperproperties, introduced here, are sets of trace properties. Hyperproperties can express security policies, such as secure information flow and service level agreements, that trace properties cannot. Safety and liveness are generalized to hyperproperties, and ...
Keywords: information flow, Security policies, liveness, safety

16
September 2010 Journal of Computer Security: Volume 18 Issue 5, September 2010
Publisher: IOS Press
Bibliometrics:
Citation Count: 4

A set of replicas is diverse to the extent that they implement the same functionality but differ in their implementation details. Diverse replicas are less likely to succumb to the same attacks, when attacks depend on memory layout and/or other implementation details. Recent work advocates using mechanical means, such as ...
Keywords: Obfuscation, imperative languages, replication, type systems, mechanical-generated diversity

17 published by ACM
July 2010 ACM Transactions on Computer Systems (TOCS): Volume 28 Issue 2, July 2010
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 2,   Downloads (12 Months): 24,   Downloads (Overall): 852

Full text available: PDFPDF
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions. The periodic restarts help bound the number of compromised replicas that a service ever concurrently runs, ...
Keywords: distributed systems, quorum systems, state machine approach, proactive recovery, Byzantine fault tolerance

18
July 2010 CSF '10: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Two kinds of integrity measures—contamination and suppression—are introduced. Contamination measures how much untrusted information reaches trusted outputs; it is the dual of information-flow confidentiality. Suppression measures how much information is lost from outputs; it does not have a confidentiality dual. Two forms of suppression are considered: programs and channels. Program ...
Keywords: Integrity, quantitative information flow, information theory, database privacy

19
July 2010 IEEE Security and Privacy: Volume 8 Issue 4, July 2010
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

With more than 4 billion cell phones in the world, with growth that exceeds that of desktops and laptops, and with a total cost of ownership that makes cell phones affordable to more of the world than a PC will ever be, the market is responding. Yet the cell phone ...
Keywords: Cell phone security, mobile security, Cell phone security, mobile security

20 published by ACM
May 2010 ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Publisher: ACM
Bibliometrics:
Citation Count: 0

Cyber-security today is focused largely on defending against known attacks. We learn about the latest attack and find a hack to defend against it. So our defenses improve only after they have been successfully penetrated. This is a recipe to ensure some attackers succeed---not a recipe for achieving system trustworthiness. ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us