D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 63 Citations 22,987 249 World Ranking 1700 National Ranking 932

Research.com Recognitions

Awards & Achievements

2017 - Fellow of the American Academy of Arts and Sciences

2011 - Member of the National Academy of Engineering For contributions to the design of trustworthy and secure computer systems.

2009 - IEEE Fellow For contributions to trustworthy computing, fault-tolerance and formal methods

1995 - ACM Fellow For work in semantics, methodology, and algorithms to support programming concurrent and distributed systems, particularly those intended for mission-critical settings.

1992 - Fellow of the American Association for the Advancement of Science (AAAS)

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • Computer network

His main research concerns Computer security, Security policy, Distributed computing, Fault tolerance and Technical report. His Computer security study combines topics in areas such as The Internet and Server. In general Distributed computing study, his work on State machine replication and Replication often relates to the realm of Computing systems, thereby connecting several areas of interest.

His biological study spans a wide range of topics, including Byzantine fault tolerance and Quantum Byzantine agreement. The various areas that he examines in his Quantum Byzantine agreement study include Paxos and Virtual synchrony. His work carried out in the field of Fault tolerance brings together such families of science as Scheduling, Virtual machine, Client server systems and Embedded system.

His most cited work include:

  • Implementing fault-tolerant services using the state machine approach: a tutorial (1969 citations)
  • Enforceable security policies (1151 citations)
  • Defining Liveness (827 citations)

What are the main themes of his work throughout his whole career to date?

Fred B. Schneider focuses on Computer security, Distributed computing, Theoretical computer science, Programming language and Fault tolerance. His Computer security research is multidisciplinary, incorporating perspectives in The Internet and Cloud computing security. His biological study focuses on Replication.

His work deals with themes such as Property and Algorithm, which intersect with Theoretical computer science. His Fault tolerance research incorporates themes from Embedded system and Backup. His Computer security model study incorporates themes from Security service and Information security standards.

He most often published in these fields:

  • Computer security (27.20%)
  • Distributed computing (16.86%)
  • Theoretical computer science (15.71%)

What were the highlights of his more recent work (between 2008-2021)?

  • Computer security (27.20%)
  • Replication (4.60%)
  • Confidentiality (1.92%)

In recent papers he was focusing on the following fields of study:

Computer security, Replication, Confidentiality, Information flow and Computer network are his primary areas of study. His Computer security research is multidisciplinary, relying on both Cloud computing security and Diversity. His research on Replication also deals with topics like

  • Executable together with Paxos, Correctness, Asynchronous communication and Byzantine fault tolerance,
  • Server that connect with fields like Response time, Backup, Interval and State machine replication.

Fred B. Schneider works mostly in the field of Paxos, limiting it down to concerns involving Reliability and, occasionally, Distributed computing. His research integrates issues of Theoretical computer science, Data mining, Database, Engineering management and Java in his study of Information flow. His studies deal with areas such as Information sensitivity and Harm as well as Theoretical computer science.

Between 2008 and 2021, his most popular works were:

  • Quantifying information flow with beliefs (83 citations)
  • Logical attestation: an authorization architecture for trustworthy computing (66 citations)
  • Nexus authorization logic (NAL): Design rationale and applications (65 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • Computer network

Fred B. Schneider mainly focuses on Computer security, Diversity, Replication, Authorization and Context. His study of Confidentiality is a part of Computer security. Fred B. Schneider has researched Diversity in several fields, including Independence, Obfuscation, Imperative programming and Set.

His Replication research includes themes of Type checking, Obfuscation, Executable and Asynchronous communication. His studies in Executable integrate themes in fields like Correctness, Paxos, Distributed computing and Reliability. His Authorization research integrates issues from Software, Attribution, Key and Action.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Implementing fault-tolerant services using the state machine approach: a tutorial

Fred B. Schneider.
ACM Computing Surveys (1990)

3234 Citations

Enforceable security policies

Fred B. Schneider.
ACM Transactions on Information and System Security (2000)

1797 Citations

Defining Liveness

Bowen Alpern;Fred B. Schneider.
(1984)

1643 Citations

Fail-stop processors: an approach to designing fault-tolerant computing systems

Richard D. Schlichting;Fred B. Schneider.
ACM Transactions on Computer Systems (1983)

1126 Citations

Concepts and Notations for Concurrent Programming

Gregory R. Andrews;Fred B. Schneider.
ACM Computing Surveys (1983)

981 Citations

Recognizing Safety and Liveness

Bowen Alpern;Fred B. Schneider.
Distributed Computing (1986)

779 Citations

A Logical Approach to Discrete Math

David Gries;Fred B. Schneider.
(1993)

636 Citations

COCA: A secure distributed online certification authority

Lidong Zhou;Fred B. Schneider;Robbert Van Renesse.
ACM Transactions on Computer Systems (2002)

564 Citations

The primary-backup approach

Navin Budhiraja;Keith Marzullo;Fred B. Schneider;Sam Toueg.
Distributed systems (2nd Ed.) (1993)

559 Citations

Chain replication for supporting high throughput and availability

Robbert van Renesse;Fred B. Schneider.
operating systems design and implementation (2004)

555 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Fred B. Schneider

Fernando Pedone

Fernando Pedone

Universita della Svizzera Italiana

Publications: 75

Rachid Guerraoui

Rachid Guerraoui

École Polytechnique Fédérale de Lausanne

Publications: 73

Paulo Veríssimo

Paulo Veríssimo

King Abdullah University of Science and Technology

Publications: 60

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 60

André Schiper

André Schiper

École Polytechnique Fédérale de Lausanne

Publications: 57

Kenneth P. Birman

Kenneth P. Birman

Cornell University

Publications: 54

Miguel Correia

Miguel Correia

Instituto Superior Técnico

Publications: 52

Keith Marzullo

Keith Marzullo

University of Maryland, College Park

Publications: 51

Leslie Lamport

Leslie Lamport

Microsoft (United States)

Publications: 50

Sandeep Kulkarni

Sandeep Kulkarni

Michigan State University

Publications: 45

Dahlia Malkhi

Dahlia Malkhi

Diem Association

Publications: 44

Nuno Neves

Nuno Neves

University of Lisbon

Publications: 42

Luís Rodrigues

Luís Rodrigues

University of Lisbon

Publications: 42

Lorenzo Alvisi

Lorenzo Alvisi

Cornell University

Publications: 39

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 36

Michel Raynal

Michel Raynal

Institut de Recherche en Informatique et Systèmes Aléatoires

Publications: 36

Trending Scientists

Martin Ester

Martin Ester

Simon Fraser University

John K. Kaldellis

John K. Kaldellis

University of West Attica

Yu Lan

Yu Lan

Zhengzhou University

Patrick T. K. Woo

Patrick T. K. Woo

University of Guelph

Mark D. Fricker

Mark D. Fricker

University of Oxford

Norimasa Sawada

Norimasa Sawada

Sapporo Medical University

Richard D. Minshall

Richard D. Minshall

University of Illinois at Chicago

Jun-ichi Miyazaki

Jun-ichi Miyazaki

Osaka University

John K. Northup

John K. Northup

National Institutes of Health

Andrea Marzi

Andrea Marzi

National Institutes of Health

Federico Ranieri

Federico Ranieri

University of Verona

Joachim H. R. Lübke

Joachim H. R. Lübke

RWTH Aachen University

Li Ching Lee

Li Ching Lee

Johns Hopkins University

Nathan A. Bowling

Nathan A. Bowling

Wright State University

Charles Henderson

Charles Henderson

Western Michigan University

C. M. Raiteri

C. M. Raiteri

National Institute for Astrophysics

Something went wrong. Please try again later.