Implementing fault-tolerant services using the state machine approach: A tutorial FB Schneider ACM Computing Surveys (CSUR) 22 (4), 299-319, 1990 | 2865 | 1990 |
Enforceable security policies FB Schneider ACM Transactions on Information and System Security (TISSEC) 3 (1), 30-50, 2000 | 1659 | 2000 |
Defining liveness B Alpern, FB Schneider Information processing letters 21 (4), 181-185, 1985 | 1536 | 1985 |
Fail-stop processors: an approach to designing fault-tolerant computing systems RD Schlichting, FB Schneider ACM Transactions on Computer Systems (TOCS) 1 (3), 222-238, 1983 | 1067 | 1983 |
Concepts and notations for concurrent programming GR Andrews, FB Schneider ACM Computing Surveys (CSUR) 15 (1), 3-43, 1983 | 925 | 1983 |
Recognizing safety and liveness B Alpern, FB Schneider Distributed computing 2 (3), 117-126, 1987 | 704 | 1987 |
Monographs in Computer Science D Gries, FB Schneider | 697 | 2008 |
A logical approach to discrete math D Gries, FB Schneider Springer Science & Business Media, 2013 | 611 | 2013 |
COCA: A secure distributed online certification authority L Zhou, FB Schneider, R Van Renesse ACM Transactions on Computer Systems (TOCS) 20 (4), 329-368, 2002 | 539 | 2002 |
Hyperproperties MR Clarkson, FB Schneider Journal of Computer Security 18 (6), 1157-1210, 2010 | 528 | 2010 |
The primary-backup approach N Budhiraja, K Marzullo, FB Schneider, S Toueg Distributed systems 2, 199-216, 1993 | 526 | 1993 |
SASI enforcement of security policies: A retrospective U Erlingsson, FB Schneider Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 494 | 2000 |
Chain Replication for Supporting High Throughput and Availability. R Van Renesse, FB Schneider OSDI 4 (91–104), 2004 | 481 | 2004 |
Understanding concurrent systems AW Roscoe Springer Science & Business Media, 2010 | 435 | 2010 |
Replication management using the state-machine approach, Distributed systems FB Schneider | 434 | 1993 |
Trust in cyberspace FB Schneider, Committee on Information Systems Trustworthiness National Academy Press, 1999 | 428 | 1999 |
IRM enforcement of Java stack inspection U Erlingsson, FB Schneider Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 246-255, 2000 | 404 | 2000 |
Hypervisor-based fault tolerance TC Bressoud, FB Schneider ACM Transactions on Computer Systems (TOCS) 14 (1), 80-107, 1996 | 345 | 1996 |
Byzantine generals in action: Implementing fail-stop processors FB Schneider ACM Transactions on Computer Systems (TOCS) 2 (2), 145-154, 1984 | 345 | 1984 |
Operating system support for mobile agents D Johansen, R Van Renesse, FB Schneider Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V), 42-45, 1995 | 328 | 1995 |