Implementing fault-tolerant services using the state machine approach: A tutorial FB Schneider ACM Computing Surveys (CSUR) 22 (4), 299-319, 1990 | 3581 | 1990 |
Enforceable security policies FB Schneider ACM Transactions on Information and System Security (TISSEC) 3 (1), 30-50, 2000 | 1912 | 2000 |
Defining liveness B Alpern, FB Schneider Information processing letters 21 (4), 181-185, 1985 | 1825 | 1985 |
Fail-stop processors: An approach to designing fault-tolerant computing systems RD Schlichting, FB Schneider ACM Transactions on Computer Systems (TOCS) 1 (3), 222-238, 1983 | 1139 | 1983 |
Concepts and notations for concurrent programming GR Andrews, FB Schneider ACM Computing Surveys (CSUR) 15 (1), 3-43, 1983 | 1015 | 1983 |
Hyperproperties MR Clarkson, FB Schneider Journal of Computer Security 18 (6), 1157-1210, 2010 | 935 | 2010 |
Recognizing safety and liveness B Alpern, FB Schneider Distributed computing 2 (3), 117-126, 1987 | 893 | 1987 |
Monographs in Computer Science D Gries, FB Schneider | 798 | 2008 |
Chain Replication for Supporting High Throughput and Availability. R Van Renesse, FB Schneider OSDI 4 (91–104), 2004 | 701 | 2004 |
A logical approach to discrete math D Gries, FB Schneider Springer Science & Business Media, 2013 | 679 | 2013 |
The primary-backup approach N Budhiraja, K Marzullo, FB Schneider, S Toueg Distributed systems 2, 199-216, 1993 | 610 | 1993 |
COCA: A secure distributed online certification authority L Zhou, FB Schneider, R Van Renesse ACM Transactions on Computer Systems (TOCS) 20 (4), 329-368, 2002 | 585 | 2002 |
SASI enforcement of security policies: A retrospective U Erlingsson, FB Schneider Proceedings of the 1999 workshop on New security paradigms, 87-95, 1999 | 549 | 1999 |
Trust in cyberspace FB Schneider National Academies Press, 1999 | 515 | 1999 |
Replication management using the state-machine approach FB Schneider Distributed systems 2, 169-198, 1993 | 462 | 1993 |
Byzantine generals in action: Implementing fail-stop processors FB Schneider ACM Transactions on Computer Systems (TOCS) 2 (2), 145-154, 1984 | 435 | 1984 |
IRM enforcement of Java stack inspection U Erlingsson, FB Schneider Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 246-255, 2000 | 422 | 2000 |
Hypervisor-based fault tolerance TC Bressoud, FB Schneider ACM Transactions on Computer Systems (TOCS) 14 (1), 80-107, 1996 | 389 | 1996 |
Operating system support for mobile agents D Johansen, R Van Renesse, FB Schneider Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 42-45, 1995 | 344 | 1995 |
Hypervisor-based fault tolerance TC Bressoud, FB Schneider Proceedings of the fifteenth ACM symposium on Operating systems principles, 1-11, 1995 | 342 | 1995 |