Fred B. Schneider

Results: 85



#Item
1

IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson† Fred B. Schneider

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2003-11-23 23:38:35
    2

    Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2011-10-27 11:53:48
      3

      Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

      Add to Reading List

      Source URL: www.cs.cornell.edu

      - Date: 2009-12-11 23:31:04
        4

        Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

        Add to Reading List

        Source URL: www.sigops.org

        - Date: 2011-09-18 14:34:30
          5

          Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

          Add to Reading List

          Source URL: www.sigops.org

          - Date: 2011-09-20 03:37:00
            6

            Quantifying Information Flow with Beliefs Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

            Add to Reading List

            Source URL: www.cs.cornell.edu

            Language: English - Date: 2013-01-07 14:07:10
              7

              Belief in Information Flow Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract

              Add to Reading List

              Source URL: www.cs.cornell.edu

              Language: English - Date: 2013-01-07 14:08:26
                8

                Device Driver Safety Through a Reference Validation Mechanism ∗ Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G¨un Sirer, Fred B. Schneider Cornell University Abstract Device drivers typically execute in superviso

                Add to Reading List

                Source URL: piki.org

                Language: English - Date: 2008-12-13 13:45:10
                  9Metalogic / Mathematical logic / First-order logic / Predicate logic / Well-formed formula / Logic programming / Interpretation / Logic / Model theory / Formal languages

                  Nexus Authorization Logic (NAL): Design Rationale and Applications ¨ SIRER, Cornell University FRED B. SCHNEIDER, KEVIN WALSH, and EMIN GUN Nexus Authorization Logic (NAL) provides a principled basis for specifying and

                  Add to Reading List

                  Source URL: www.cs.cornell.edu

                  Language: English - Date: 2011-08-20 15:34:11
                  UPDATE