Peter G. Neumann
Orcid: 0009-0008-1197-8000Affiliations:
- SRI International, Menlo Park, California, USA
According to our database1,
Peter G. Neumann
authored at least 222 papers
between 1957 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1994, "For his dedicated service as founder and moderator of the ACM Forum on Risks to the Public in the Use of Computers and Related Systems. His work with RISKS Forum on-line, in the Software Engineering Notes, and in CACM has increased awareness of security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on acm.org
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on csl.sri.com
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Des. Test, February, 2024
J. Cybersecur., January, 2024
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
2023
Proceedings of the 41st IEEE International Conference on Computer Design, 2023
2022
2021
2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020
2019
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017
2016
IEEE Micro, 2016
ERCIM News, 2016
Commun. ACM, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the SOSP History Day 2015, Monterey, California, USA, October 4, 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015
2014
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014
2013
Proceedings of the Security Protocols XXI, 2013
2012
IEEE Secur. Priv., 2012
2011
Proceedings of the Dependable and Historic Computing, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
IEEE Secur. Priv., 2008
2007
2006
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
2004
Proceedings of the Formal Methods and Software Engineering, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Social and Technical Implications of Nonproprietary Software.
Proceedings of BSDCon 2003, San Mateo, California, USA, September 8-12, 2003, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002
2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 4th International Conference on Requirements Engineering, 2000
1999
IEEE Internet Comput., 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
Security and Privacy Issues in Computer and Communication Systems.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
Illustrative risks to the public in the use of computer systems and related technology.
ACM SIGSOFT Softw. Eng. Notes, 1996
Distributed Systems have Distributed Risks.
Commun. ACM, 1996
Proceedings of the Computerization and Controversy, 2nd Ed., 1996
1995
ACM SIGSOFT Softw. Eng. Notes, 1995
Risks of Easy Answers.
Commun. ACM, 1995
Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science, CSC '95, Nashville, TN, USA, February 28, 1995
Computer-related risks.
Addison-Wesley, ISBN: 978-0-201-55805-0, 1995
1994
1993
IEEE Trans. Software Eng., 1993
Risks of Technology.
Commun. ACM, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Proceedings of the Information als Produktionsfaktor, 1992
1991
ACM SIGSOFT Softw. Eng. Notes, 1991
1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
ACM SIGSOFT Softw. Eng. Notes, 1989
1988
1987
1986
IEEE Trans. Software Eng., 1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1985
Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985.
ACM SIGSOFT Softw. Eng. Notes, 1985
1984
Review of "The hacker's dictionary: a guide to the world of computer wizards" by Guy L. Steele, Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow. Harper & Row Publishers 1983.
ACM SIGSOFT Softw. Eng. Notes, 1984
A Further View of the First Quarter Century, Introduction to the April 1984 Special Section.
Commun. ACM, 1984
1983
1982
Psychosocial implications of computer software development and use: Zen and the art of computing.
ACM SIGSOFT Softw. Eng. Notes, 1982
1981
1979
Proceedings of the 1979 International Workshop on Managing Requirements Knowledge, 1979
1978
Computer system - Security evaluation.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978
1976
Proceedings of the 2nd International Conference on Software Engineering, 1976
1975
IEEE Trans. Computers, 1975
Proceedings of the International Conference on Reliable Software 1975, 1975
1974
Proceedings of the GI - 4. Jahrestagung, Berlin, 9.-12. Oktober 1974, 1974
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974
1973
Proceedings of the Proceeding of ACM SIGPLAN-SIGOPS Interface Meeting on Programming Languages, 1973
1969
Proceedings of the Second Symposium on Operating Systems Principles, 1969
1965
Proceedings of the 1965 fall joint computer conference, part I, 1965
1964
IEEE Trans. Inf. Theory, 1964
IEEE Trans. Inf. Theory, 1964
1963
1962
IRE Trans. Inf. Theory, 1962
IRE Trans. Electron. Comput., 1962
IRE Trans. Electron. Comput., 1962
1957