Verifying Hyperproperties With TLA
Lamport, Leslie, Schneider, Fred B.
Published in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) (01.06.2021)
Published in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) (01.06.2021)
Get full text
Conference Proceeding
Quantifying information flow with beliefs
Clarkson, Michael R., Myers, Andrew C., Schneider, Fred B.
Published in Journal of computer security (01.01.2009)
Published in Journal of computer security (01.01.2009)
Get full text
Journal Article
Quantification of integrity
CLARKSON, MICHAEL R., SCHNEIDER, FRED B.
Published in Mathematical structures in computer science (01.02.2015)
Published in Mathematical structures in computer science (01.02.2015)
Get full text
Journal Article
Quantification of Integrity
Clarkson, Michael R, Schneider, Fred B
Published in 2010 23rd IEEE Computer Security Foundations Symposium (01.07.2010)
Published in 2010 23rd IEEE Computer Security Foundations Symposium (01.07.2010)
Get full text
Conference Proceeding
IRM enforcement of Java stack inspection
Erlingsson, U., Schneider, F.B.
Published in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 (2000)
Published in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 (2000)
Get full text
Conference Proceeding
Journal Article
CODEX: a robust and secure secret distribution system
Marsh, M.A., Schneider, F.B.
Published in IEEE transactions on dependable and secure computing (01.01.2004)
Published in IEEE transactions on dependable and secure computing (01.01.2004)
Get full text
Journal Article
Peer-to-peer authentication with a distributed single sign-on service
JOSEPHSON, William K, SIRER, Emin Gün, SCHNEIDER, Fred B
Published in Lecture notes in computer science (2004)
Get full text
Published in Lecture notes in computer science (2004)
Conference Proceeding
A TACOMA retrospective
Johansen, Dag, Lauvset, Kåre J., van Renesse, Robbert, Schneider, Fred B., Sudmann, Nils P., Jacobsen, Kjetil
Published in Software, practice & experience (01.05.2002)
Published in Software, practice & experience (01.05.2002)
Get full text
Journal Article
Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab
van Renesse, Robbert, Schiper, Nicolas, Schneider, Fred B.
Published in IEEE transactions on dependable and secure computing (01.07.2015)
Published in IEEE transactions on dependable and secure computing (01.07.2015)
Get full text
Journal Article
Hyperproperties
Clarkson, Michael R., Schneider, Fred B.
Published in 2008 21st IEEE Computer Security Foundations Symposium (01.06.2008)
Published in 2008 21st IEEE Computer Security Foundations Symposium (01.06.2008)
Get full text
Conference Proceeding