Fred B. Schneider

Results: 85



#Item
81Software licenses / Computer law / Open-source software / Software bug / Vulnerability / Computer security / Open source software development / Software development process / Debian / Computing / Software / Security

Open Source in Security: Visiting the Bizarre∗ Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York[removed]removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:00:46
82Information theory / Principle of least privilege / Ring / Trusted computing base / Authorization / Operating system / Reference monitor / Privilege / Security / Computer security / Access control

Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-07-02 11:18:02
83Computer science / Keith Marzullo / Fred B. Schneider / Support / Orc / Association for Computing Machinery / ACM SIGACT / Mobile Transaction Models / Dale Skeen / Year of birth missing / Computing / Concurrent computing

VITA FRED B. SCHNEIDER August 6, 2012 Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-08-06 17:20:19
84Information theory / Principle of least privilege / Ring / Privilege / Group extension / Security / Computer security / Access control

Least Privilege and More1 Fred B. Schneider Cornell University, Ithaca, New York, USA

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-02-27 17:59:56
85Academia / Turing Award laureates / Edward J. McCluskey / Yale Patt / David DeWitt / Fred B. Schneider / IEEE Emanuel R. Piore Award / Allen Newell / Lawrence Rabiner / Year of birth missing / Science / Computing

PDF Document

Add to Reading List

Source URL: www.ieee.org

Language: English
UPDATE