D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 63 Citations 21,861 194 World Ranking 1703 National Ranking 933

Research.com Recognitions

Awards & Achievements

2018 - Fellow of the Royal Society, United Kingdom

2005 - Member of the National Academy of Sciences

2001 - IEEE John von Neumann Medal "For technical leadership in the creation of timesharing, distributed computing, networking security and program languages."

1994 - ACM Fellow For contributions to the development of distributed, personal computing environments and the technology for their implementation: workstations, networks, operating systems, programming systems, displays, security, and document publishing.

1993 - Fellow of the American Academy of Arts and Sciences

1992 - A. M. Turing Award For contributions to the development of distributed, personal computing environments and the technology for their implementation: workstations, networks, operating systems, programming systems, displays, security and document publishing.

1984 - Member of the National Academy of Engineering For outstanding contributions in the development, clarification, and design of computer operating systems, programming languages, and personal computers.

1984 - ACM Software System Award Butler W. Lampson, Robert W. Taylor, Charles P. Thacker

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • The Internet

Butler W. Lampson focuses on Computer security, Distributed computing, Authentication, Operating system and Principal. His Computer security research incorporates elements of Covert channel and Internet privacy. His Distributed computing study frequently draws connections between adjacent fields such as Rate-monotonic scheduling.

Butler W. Lampson has researched Authentication in several fields, including High availability, The Internet and Implementation. His research in Operating system tackles topics such as Code which are related to areas like Program code, Secrecy, Security management and Loader. His Principal course of study focuses on Access control and Identifier, Node and Certificate authority.

His most cited work include:

  • A note on the confinement problem (1154 citations)
  • Software version management system (853 citations)
  • Authentication in distributed systems: theory and practice (825 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Distributed computing, Programming language, Operating system and Software are his primary areas of study. His Computer security study which covers Security information and event management that intersects with Information security. Operating system and Identity are commonly linked in his work.

His study looks at the relationship between Security service and fields such as Security through obscurity, as well as how they intersect with chemical problems. His Authentication study necessitates a more in-depth grasp of Computer network. Butler W. Lampson regularly links together related areas like Principal in his Access control studies.

He most often published in these fields:

  • Computer security (22.34%)
  • Distributed computing (14.36%)
  • Programming language (12.77%)

What were the highlights of his more recent work (between 2004-2020)?

  • Programming language (12.77%)
  • Software (12.23%)
  • Computer security (22.34%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Programming language, Software, Computer security, Access control and Software engineering. In general Programming language study, his work on Evaluation strategy, Lazy evaluation and Haskell often relates to the realm of Variety and Mathematical proof, thereby connecting several areas of interest. His Software study combines topics from a wide range of disciplines, such as Telecommunications, Computer performance and Miniaturization.

His study in Computer security is interdisciplinary in nature, drawing from both Security information and event management and Security through obscurity. The concepts of his Access control study are interwoven with issues in Control, Computer security model and Arithmetic. In the field of Software engineering, his study on Systems design overlaps with subjects such as Perspective and Computer system design.

Between 2004 and 2020, his most popular works were:

  • A Machine Learning Framework for Programming by Example (108 citations)
  • Virtual distributed security system (108 citations)
  • System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (81 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer network

His primary areas of investigation include Computer security, Software, Security testing, Security through obscurity and Security information and event management. Butler W. Lampson has included themes like Predicate, Database and Component in his Computer security study. His biological study spans a wide range of topics, including Telecommunications, Moore's law, Computer performance and Miniaturization.

His Security testing research is multidisciplinary, incorporating elements of Security service, Software security assurance, Security engineering, Internet privacy and Asset. His studies deal with areas such as Logical security, Countermeasure and Covert channel as well as Security engineering. His Security through obscurity research includes elements of Data security, Information security, Distributed System Security Architecture, Computer security model and Security convergence.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A note on the confinement problem

Butler W. Lampson.
Communications of The ACM (1973)

1906 Citations

Software version management system

Eric E. Schmidt;Butler W. Lampson.
(1983)

1340 Citations

SPKI Certificate Theory

C. Ellison;B. Frantz;B. Lampson;R. Rivest.
RFC2693 (1999)

1262 Citations

Authentication in distributed systems: theory and practice

Butler Lampson;Martín Abadi;Michael Burrows;Edward Wobber.
ACM Transactions on Computer Systems (1992)

1165 Citations

A calculus for access control in distributed systems

Martín Abadi;Michael Burrows;Butler Lampson;Gordon Plotkin.
ACM Transactions on Programming Languages and Systems (1993)

959 Citations

SDSI - A Simple Distributed Security Infrastructure

Butler Lampson;Ronald L. Rivest.
(1996)

744 Citations

Digital rights management operating system

Paul England;John D. DeTreville;Butler W. Lampson.
(1999)

683 Citations

IP lookups using multiway and multicolumn search

Butler Lampson;Venkatachary Srinivasan;George Varghese.
IEEE ACM Transactions on Networking (1999)

618 Citations

Loading and identifying a digital rights management operating system

Paul England;John D. DeTreville;Butler W. Lampson.
(1999)

573 Citations

Access control subsystem and method for distributed computer system using locally cached authentication credentials

Edward Wobber;Martin Abadi;Andrew Birrell;Butler Lampson.
(1992)

557 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Butler W. Lampson

Martín Abadi

Martín Abadi

Google (United States)

Publications: 51

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 45

Gilbert Neiger

Gilbert Neiger

Intel (United States)

Publications: 42

Nancy Lynch

Nancy Lynch

MIT

Publications: 41

Barbara Liskov

Barbara Liskov

MIT

Publications: 39

Martin T. King

Martin T. King

Google (United States)

Publications: 30

Mark J. Stefik

Mark J. Stefik

Palo Alto Research Center

Publications: 29

Rachid Guerraoui

Rachid Guerraoui

École Polytechnique Fédérale de Lausanne

Publications: 27

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 26

Sumit Gulwani

Sumit Gulwani

Microsoft (United States)

Publications: 25

Andrew C. Myers

Andrew C. Myers

Cornell University

Publications: 25

Leslie Lamport

Leslie Lamport

Microsoft (United States)

Publications: 25

Andrew D. Gordon

Andrew D. Gordon

Microsoft (United States)

Publications: 24

Andrew S. Tanenbaum

Andrew S. Tanenbaum

Vrije Universiteit Amsterdam

Publications: 23

Cédric Fournet

Cédric Fournet

Microsoft (United States)

Publications: 23

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 23

Trending Scientists

Bart Dhoedt

Bart Dhoedt

Ghent University

David N. Figlio

David N. Figlio

Northwestern University

Jinhao Qiu

Jinhao Qiu

Nanjing University of Aeronautics and Astronautics

M. Anthony McKervey

M. Anthony McKervey

Queen's University Belfast

Carol J. Bult

Carol J. Bult

European Bioinformatics Institute

Gregory R. Dressler

Gregory R. Dressler

University of Michigan–Ann Arbor

Julio Saez-Rodriguez

Julio Saez-Rodriguez

Heidelberg University

Andrea Carfi

Andrea Carfi

Novartis (Switzerland)

James D. Stockand

James D. Stockand

The University of Texas Health Science Center at San Antonio

Paul R. Crocker

Paul R. Crocker

University of Dundee

Paula Kankaala

Paula Kankaala

University of Eastern Finland

Samuel Morin

Samuel Morin

Grenoble Alpes University

Patrick J. O. Miller

Patrick J. O. Miller

University of St Andrews

Paul W. Glimcher

Paul W. Glimcher

New York University

Patrizio Rigatti

Patrizio Rigatti

Vita-Salute San Raffaele University

Jaap Dronkers

Jaap Dronkers

Maastricht University

Something went wrong. Please try again later.