2017 - Fellow of the American Academy of Arts and Sciences
2011 - Member of the National Academy of Engineering For contributions to the design of trustworthy and secure computer systems.
2009 - IEEE Fellow For contributions to trustworthy computing, fault-tolerance and formal methods
1995 - ACM Fellow For work in semantics, methodology, and algorithms to support programming concurrent and distributed systems, particularly those intended for mission-critical settings.
1992 - Fellow of the American Association for the Advancement of Science (AAAS)
His main research concerns Computer security, Security policy, Distributed computing, Fault tolerance and Technical report. His Computer security study combines topics in areas such as The Internet and Server. In general Distributed computing study, his work on State machine replication and Replication often relates to the realm of Computing systems, thereby connecting several areas of interest.
His biological study spans a wide range of topics, including Byzantine fault tolerance and Quantum Byzantine agreement. The various areas that he examines in his Quantum Byzantine agreement study include Paxos and Virtual synchrony. His work carried out in the field of Fault tolerance brings together such families of science as Scheduling, Virtual machine, Client server systems and Embedded system.
Fred B. Schneider focuses on Computer security, Distributed computing, Theoretical computer science, Programming language and Fault tolerance. His Computer security research is multidisciplinary, incorporating perspectives in The Internet and Cloud computing security. His biological study focuses on Replication.
His work deals with themes such as Property and Algorithm, which intersect with Theoretical computer science. His Fault tolerance research incorporates themes from Embedded system and Backup. His Computer security model study incorporates themes from Security service and Information security standards.
Computer security, Replication, Confidentiality, Information flow and Computer network are his primary areas of study. His Computer security research is multidisciplinary, relying on both Cloud computing security and Diversity. His research on Replication also deals with topics like
Fred B. Schneider works mostly in the field of Paxos, limiting it down to concerns involving Reliability and, occasionally, Distributed computing. His research integrates issues of Theoretical computer science, Data mining, Database, Engineering management and Java in his study of Information flow. His studies deal with areas such as Information sensitivity and Harm as well as Theoretical computer science.
Fred B. Schneider mainly focuses on Computer security, Diversity, Replication, Authorization and Context. His study of Confidentiality is a part of Computer security. Fred B. Schneider has researched Diversity in several fields, including Independence, Obfuscation, Imperative programming and Set.
His Replication research includes themes of Type checking, Obfuscation, Executable and Asynchronous communication. His studies in Executable integrate themes in fields like Correctness, Paxos, Distributed computing and Reliability. His Authorization research integrates issues from Software, Attribution, Key and Action.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Implementing fault-tolerant services using the state machine approach: a tutorial
Fred B. Schneider.
ACM Computing Surveys (1990)
Enforceable security policies
Fred B. Schneider.
ACM Transactions on Information and System Security (2000)
Defining Liveness
Bowen Alpern;Fred B. Schneider.
(1984)
Fail-stop processors: an approach to designing fault-tolerant computing systems
Richard D. Schlichting;Fred B. Schneider.
ACM Transactions on Computer Systems (1983)
Concepts and Notations for Concurrent Programming
Gregory R. Andrews;Fred B. Schneider.
ACM Computing Surveys (1983)
Recognizing Safety and Liveness
Bowen Alpern;Fred B. Schneider.
Distributed Computing (1986)
A Logical Approach to Discrete Math
David Gries;Fred B. Schneider.
(1993)
COCA: A secure distributed online certification authority
Lidong Zhou;Fred B. Schneider;Robbert Van Renesse.
ACM Transactions on Computer Systems (2002)
The primary-backup approach
Navin Budhiraja;Keith Marzullo;Fred B. Schneider;Sam Toueg.
Distributed systems (2nd Ed.) (1993)
Chain replication for supporting high throughput and availability
Robbert van Renesse;Fred B. Schneider.
operating systems design and implementation (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Cornell University
Cornell University
University of Maryland, College Park
Microsoft (United States)
Microsoft (United States)
Cornell University
United States Naval Academy
Stony Brook University
Cornell University
Cornell University
Simon Fraser University
University of West Attica
Zhengzhou University
University of Guelph
University of Oxford
Sapporo Medical University
University of Illinois at Chicago
Osaka University
National Institutes of Health
National Institutes of Health
University of Verona
RWTH Aachen University
Johns Hopkins University
Wright State University
Western Michigan University
National Institute for Astrophysics