Fred B. Schneider

Results: 85



#Item
71X86 architecture / Assembly languages / Models of computation / X86 assembly language / Trusted computing base / Memory protection / X86 / GNU Compiler Collection / State / Software / Computing / Programming language implementation

SASI Enforcement of Security Policies: A Retrospective∗ ´ Ulfar Erlingsson Fred B. Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 20:34:42
72Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
73Metalogic / Mathematical logic / First-order logic / Predicate logic / Well-formed formula / Logic programming / Interpretation / Logic / Model theory / Formal languages

Nexus Authorization Logic (NAL): Design Rationale and Applications ¨ SIRER, Cornell University FRED B. SCHNEIDER, KEVIN WALSH, and EMIN GUN Nexus Authorization Logic (NAL) provides a principled basis for specifying and

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-07-01 15:42:58
74Propositional calculus / Predicate logic / Model theory / Quantification / First-order logic / Function / Constructible universe / Generalization / Universal quantification / Logic / Mathematical logic / Mathematics

Formalizations Of Substitution Of Equals For Equals David Gries 1,2  and Fred B. Schneider 1  1 Computer Science, Univ. of Georgia

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-31 13:46:38
75Disk file systems / File system API / Virtual file system / Kernel / Filesystem in Userspace / Linux kernel / Microkernel / File system / Ext2 / System software / Software / Computer architecture

1 Trust in a Principled Filesystem Kevin Walsh and Fred B. Schneider Abstract—Users typically have little reason to trust that systems will protect user data against unauthorized access. A prototype filesystem stack w

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-06-13 22:37:28
76Computing / Dc / cross-platform software / Computer arithmetic

Inexact Agreement: Accuracy, Precision, and Graceful Degradation Stephen R. Mahaney AT&T Bell Laboratories Fred B. Schneider + Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 13:24:04
77Public safety / Prevention / Computer network security / Computer security / Electronic commerce / Trusted computing base / Programming language / Security policy / Security engineering / Security / Crime prevention / National security

Mapping the Security Landscape: A Role for Language Techniques Abstract of Invited Lecture Fred B. Schneider Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-09-25 14:39:00
78Procedural programming languages / Algebra / Logical syntax / Variables / Parallel computing / FO / Static single assignment form / Free variables and bound variables / Environment variable / Mathematics / Computing / Software engineering

Hybrid Verification by Exploiting the Environment* Limor Fix** and Fred B. Schneider Department of Computer Science, CorneU University, Ithaca, New York[removed]A b s t r a c t . A method for verifying hybrid systems is g

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 00:16:30
79Measurement / Central processing unit / Time / Synchronization / Horology / Clocks

A Paradigm for Reliable Clock Synchronization* Fred B. Schneider Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 20:24:28
80System software / Computing / Verifiable secret sharing / Server hardware / Secret sharing / Server / Proactive secret sharing / X Window System / Cryptographic protocols / Software / Cryptography

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
UPDATE