Fred Schneider
Fred Schneider
Verified email at cs.cornell.edu - Homepage
Title
Cited by
Cited by
Year
Implementing fault-tolerant services using the state machine approach: A tutorial
FB Schneider
ACM Computing Surveys (CSUR) 22 (4), 299-319, 1990
31371990
Enforceable security policies
FB Schneider
ACM Transactions on Information and System Security (TISSEC) 3 (1), 30-50, 2000
17462000
Defining liveness
B Alpern, FB Schneider
Information processing letters 21 (4), 181-185, 1985
16021985
Fail-stop processors: An approach to designing fault-tolerant computing systems
RD Schlichting, FB Schneider
ACM Transactions on Computer Systems (TOCS) 1 (3), 222-238, 1983
10971983
Concepts and notations for concurrent programming
GR Andrews, FB Schneider
ACM Computing Surveys (CSUR) 15 (1), 3-43, 1983
9601983
Recognizing safety and liveness
B Alpern, FB Schneider
Distributed computing 2 (3), 117-126, 1987
7601987
Monographs in Computer Science
D Gries, FB Schneider
7222008
Hyperproperties
MR Clarkson, FB Schneider
Journal of Computer Security 18 (6), 1157-1210, 2010
6192010
A logical approach to discrete math
D Gries, FB Schneider
Springer Science & Business Media, 2013
6152013
COCA: A secure distributed online certification authority
L Zhou, FB Schneider, R Van Renesse
ACM Transactions on Computer Systems (TOCS) 20 (4), 329-368, 2002
5542002
Chain Replication for Supporting High Throughput and Availability.
R Van Renesse, FB Schneider
OSDI 4 (91–104), 2004
5462004
The primary-backup approach
N Budhiraja, K Marzullo, FB Schneider, S Toueg
Distributed systems 2, 199-216, 1993
5461993
SASI enforcement of security policies: A retrospective
U Erlingsson, FB Schneider
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
5172000
Understanding concurrent systems
AW Roscoe
Springer Science & Business Media, 2010
4612010
Trust in cyberspace
FB Schneider, National Research Council
National Academy Press, 1999
4521999
Replication management using the state-machine approach, distributed systems
FB Schneider
4271993
IRM enforcement of Java stack inspection
U Erlingsson, FB Schneider
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 246-255, 2000
4112000
Byzantine generals in action: Implementing fail-stop processors
FB Schneider
ACM Transactions on Computer Systems (TOCS) 2 (2), 145-154, 1984
3771984
Hypervisor-based fault tolerance
TC Bressoud, FB Schneider
ACM Transactions on Computer Systems (TOCS) 14 (1), 80-107, 1996
3611996
Operating system support for mobile agents
D Johansen, R Van Renesse, FB Schneider
Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 42-45, 1995
3411995
The system can't perform the operation now. Try again later.
Articles 1–20