2018 - Fellow of the Royal Society, United Kingdom
2005 - Member of the National Academy of Sciences
2001 - IEEE John von Neumann Medal "For technical leadership in the creation of timesharing, distributed computing, networking security and program languages."
1994 - ACM Fellow For contributions to the development of distributed, personal computing environments and the technology for their implementation: workstations, networks, operating systems, programming systems, displays, security, and document publishing.
1993 - Fellow of the American Academy of Arts and Sciences
1992 - A. M. Turing Award For contributions to the development of distributed, personal computing environments and the technology for their implementation: workstations, networks, operating systems, programming systems, displays, security and document publishing.
1984 - Member of the National Academy of Engineering For outstanding contributions in the development, clarification, and design of computer operating systems, programming languages, and personal computers.
1984 - ACM Software System Award Butler W. Lampson, Robert W. Taylor, Charles P. Thacker
Butler W. Lampson focuses on Computer security, Distributed computing, Authentication, Operating system and Principal. His Computer security research incorporates elements of Covert channel and Internet privacy. His Distributed computing study frequently draws connections between adjacent fields such as Rate-monotonic scheduling.
Butler W. Lampson has researched Authentication in several fields, including High availability, The Internet and Implementation. His research in Operating system tackles topics such as Code which are related to areas like Program code, Secrecy, Security management and Loader. His Principal course of study focuses on Access control and Identifier, Node and Certificate authority.
Computer security, Distributed computing, Programming language, Operating system and Software are his primary areas of study. His Computer security study which covers Security information and event management that intersects with Information security. Operating system and Identity are commonly linked in his work.
His study looks at the relationship between Security service and fields such as Security through obscurity, as well as how they intersect with chemical problems. His Authentication study necessitates a more in-depth grasp of Computer network. Butler W. Lampson regularly links together related areas like Principal in his Access control studies.
His primary scientific interests are in Programming language, Software, Computer security, Access control and Software engineering. In general Programming language study, his work on Evaluation strategy, Lazy evaluation and Haskell often relates to the realm of Variety and Mathematical proof, thereby connecting several areas of interest. His Software study combines topics from a wide range of disciplines, such as Telecommunications, Computer performance and Miniaturization.
His study in Computer security is interdisciplinary in nature, drawing from both Security information and event management and Security through obscurity. The concepts of his Access control study are interwoven with issues in Control, Computer security model and Arithmetic. In the field of Software engineering, his study on Systems design overlaps with subjects such as Perspective and Computer system design.
His primary areas of investigation include Computer security, Software, Security testing, Security through obscurity and Security information and event management. Butler W. Lampson has included themes like Predicate, Database and Component in his Computer security study. His biological study spans a wide range of topics, including Telecommunications, Moore's law, Computer performance and Miniaturization.
His Security testing research is multidisciplinary, incorporating elements of Security service, Software security assurance, Security engineering, Internet privacy and Asset. His studies deal with areas such as Logical security, Countermeasure and Covert channel as well as Security engineering. His Security through obscurity research includes elements of Data security, Information security, Distributed System Security Architecture, Computer security model and Security convergence.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A note on the confinement problem
Butler W. Lampson.
Communications of The ACM (1973)
Software version management system
Eric E. Schmidt;Butler W. Lampson.
(1983)
SPKI Certificate Theory
C. Ellison;B. Frantz;B. Lampson;R. Rivest.
RFC2693 (1999)
Authentication in distributed systems: theory and practice
Butler Lampson;Martín Abadi;Michael Burrows;Edward Wobber.
ACM Transactions on Computer Systems (1992)
A calculus for access control in distributed systems
Martín Abadi;Michael Burrows;Butler Lampson;Gordon Plotkin.
ACM Transactions on Programming Languages and Systems (1993)
SDSI - A Simple Distributed Security Infrastructure
Butler Lampson;Ronald L. Rivest.
(1996)
Digital rights management operating system
Paul England;John D. DeTreville;Butler W. Lampson.
(1999)
IP lookups using multiway and multicolumn search
Butler Lampson;Venkatachary Srinivasan;George Varghese.
IEEE ACM Transactions on Networking (1999)
Loading and identifying a digital rights management operating system
Paul England;John D. DeTreville;Butler W. Lampson.
(1999)
Access control subsystem and method for distributed computer system using locally cached authentication credentials
Edward Wobber;Martin Abadi;Andrew Birrell;Butler Lampson.
(1992)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Google (United States)
Microsoft (United States)
Microsoft (United States)
Microsoft (United States)
MIT
Microsoft (United States)
Microsoft (United States)
University of California, Los Angeles
MIT
University of Edinburgh
Ghent University
Northwestern University
Nanjing University of Aeronautics and Astronautics
Queen's University Belfast
European Bioinformatics Institute
University of Michigan–Ann Arbor
Heidelberg University
Novartis (Switzerland)
The University of Texas Health Science Center at San Antonio
University of Dundee
University of Eastern Finland
Grenoble Alpes University
University of St Andrews
New York University
Vita-Salute San Raffaele University
Maastricht University