default search action
Peter G. Neumann
Person information
- affiliation: SRI International, Menlo Park, California, USA
- award (1996): EFF Pioneer Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j322]Peter G. Neumann, Ulf Lindqvist:
The Future of Misuse Detection. Commun. ACM 67(11): 27-28 (2024) - [j321]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [j320]Alexandre Joannou, Peter Rugg, Jonathan Woodruff, Franz A. Fuchs, Marno van der Maas, Matthew Naylor, Michael Roe, Robert N. M. Watson, Peter G. Neumann, Simon W. Moore:
Randomized Testing of RISC-V CPUs Using Direct Instruction Injection. IEEE Des. Test 41(1): 40-49 (2024) - [j319]Robert N. M. Watson, David Chisnall, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff:
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. IEEE Secur. Priv. 22(4): 50-61 (2024) - [j318]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 49(1): 4-9 (2024) - [j317]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 49(2): 3-8 (2024) - [j316]Peter G. Neumann:
ACM Risks Forum Quarterly Summary. ACM SIGSOFT Softw. Eng. Notes 49(3): 3-12 (2024) - [j315]Peter G. Neumann:
ACM Risks Forum Quarterly Summary. ACM SIGSOFT Softw. Eng. Notes 49(4): 8-13 (2024) - [c49]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Jessica Clarke, Peter Rugg, Brooks Davis, Mark Johnston, Robert M. Norton, David Chisnall, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety. ASPLOS (2) 2024: 251-268 - [c48]Peter G. Neumann:
Position Paper: Computer-Related Health Risks. HealthSec@CCS 2024: 1-9 - 2023
- [j314]Peter G. Neumann:
Computer-Related Risks and Remediation Challenges. Commun. ACM 66(6): 28-30 (2023) - [j313]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(1): 7-12 (2023) - [j312]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(2): 4-8 (2023) - [j311]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(3): 4-7 (2023) - [j310]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 48(4): 8-12 (2023) - [c47]Franz A. Fuchs, Jonathan Woodruff, Peter Rugg, Marno van der Maas, Alexandre Joannou, Alexander Richardson, Jessica Clarke, Nathaniel Wesley Filardo, Brooks Davis, John Baldwin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Architectural Contracts for Safe Speculation. ICCD 2023: 578-586 - 2022
- [j309]Peter G. Neumann:
Toward total-system trustworthiness. Commun. ACM 65(6): 32-35 (2022) - [j308]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(1): 5-7 (2022) - [j307]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(2): 4-7 (2022) - [j306]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(3): 5-10 (2022) - [j305]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 47(4): 9-15 (2022) - [i3]Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
CompartOS: CHERI Compartmentalization for Embedded Systems. CoRR abs/2206.02852 (2022) - 2021
- [j304]Rebecca T. Mercuri, Peter G. Neumann:
The risks of election believability (or lack thereof). Commun. ACM 64(6): 24-30 (2021) - [j303]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(1): 13-18 (2021) - [j302]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(2): 11-15 (2021) - [j301]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(3): 8-13 (2021) - [j300]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 46(4): 8-13 (2021) - [i2]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [j299]Peter G. Neumann:
A holistic view of future risks. Commun. ACM 63(10): 23-27 (2020) - [j298]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(1): 6-11 (2020) - [j297]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(2): 7-12 (2020) - [j296]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(3): 6-11 (2020) - [j295]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 45(4): 11-16 (2020) - [c46]A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Position Paper: Defending Direct Memory Access with CHERI Capabilities. HASP@MICRO 2020: 7:1-7:9 - [c45]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. SP 2020: 608-625 - [c44]Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony C. J. Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert M. Norton, Simon W. Moore, Peter G. Neumann, Ian Stark, Robert N. M. Watson, Peter Sewell:
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. SP 2020: 1003-1020
2010 – 2019
- 2019
- [j294]A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann:
Through computer architecture, darkly. Commun. ACM 62(6): 25-27 (2019) - [j293]Peter G. Neumann:
How might we increase system trustworthiness? Commun. ACM 62(10): 23-25 (2019) - [j292]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(1): 11-17 (2019) - [j291]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(2): 6-12 (2019) - [j290]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(3): 16-21 (2019) - [j289]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 44(4): 5-10 (2019) - [j288]Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony C. J. Fox, Robert M. Norton, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel Wesley Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore:
CHERI Concentrate: Practical Compressed Capabilities. IEEE Trans. Computers 68(10): 1455-1469 (2019) - [c43]Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c42]Hongyan Xia, Jonathan Woodruff, Sam Ainsworth, Nathaniel Wesley Filardo, Michael Roe, Alexander Richardson, Peter Rugg, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson, Timothy M. Jones:
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety. MICRO 2019: 545-557 - [c41]A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. NDSS 2019 - 2018
- [j287]Steven M. Bellovin, Peter G. Neumann:
The big picture. Commun. ACM 61(11): 24-26 (2018) - [j286]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(1): 1-6 (2018) - [j285]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(2): 8-11 (2018) - [j284]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(3): 11-16 (2018) - [j283]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 43(4): 13-20 (2018) - [c40]Hongyan Xia, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alexander Richardson, Simon W. Moore, Robert N. M. Watson:
CheriRTOS: A Capability Model for Embedded Devices. ICCD 2018: 92-99 - 2017
- [j282]Ulf Lindqvist, Peter G. Neumann:
The future of the internet of things. Commun. ACM 60(2): 26-30 (2017) - [j281]Peter G. Neumann:
Trustworthiness and truthfulness are essential. Commun. ACM 60(6): 26-28 (2017) - [j280]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(1): 9-16 (2017) - [j279]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(2): 7-14 (2017) - [j278]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(3): 10-17 (2017) - [j277]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 42(4): 10-17 (2017) - [c39]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - [c38]Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey D. Son, A. Theodore Markettos:
Efficient Tagged Memory. ICCD 2017: 641-648 - 2016
- [j276]Rebecca T. Mercuri, Peter G. Neumann:
The risks of self-auditing systems. Commun. ACM 59(6): 22-25 (2016) - [j275]Peter G. Neumann:
Risks of automation: a cautionary total-system perspective of our cyberfuture. Commun. ACM 59(10): 26-30 (2016) - [j274]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [j273]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(1): 18-24 (2016) - [j272]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(2): 16-22 (2016) - [j271]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(3): 19-26 (2016) - [j270]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(4): 18-24 (2016) - [j269]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(5): 19-26 (2016) - [j268]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 41(6): 16-23 (2016) - [j267]Peter G. Neumann:
Automated Car Woes - Whoa There! Ubiquity 2016(July): 1:1-1:6 (2016) - [i1]Robert N. M. Watson, Simon W. Moore, Peter G. Neumann:
CHERI: A Hardware-Software System to Support the Principle of Least Privilege. ERCIM News 2016(106) (2016) - 2015
- [j266]Peter G. Neumann:
Far-sighted thinking about deleterious computer-related events. Commun. ACM 58(2): 30-33 (2015) - [j265]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j264]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j263]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(1): 19-26 (2015) - [j262]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(2): 16-21 (2015) - [j261]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(3): 17-22 (2015) - [j260]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(4): 15-20 (2015) - [j259]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(5): 15-25 (2015) - [j258]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 40(6): 14-19 (2015) - [c37]Jong Hun Han, Prashanth Mundkur, Charalampos Rotsos, Gianni Antichi, Nirav H. Dave, Andrew William Moore, Peter G. Neumann:
Blueswitch: Enabling Provably Consistent Configuration of Network Switches. ANCS 2015: 17-27 - [c36]David Chisnall, Colin Rothwell, Robert N. M. Watson, Jonathan Woodruff, Munraj Vadera, Simon W. Moore, Michael Roe, Brooks Davis, Peter G. Neumann:
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine. ASPLOS 2015: 117-130 - [c35]Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson:
Clean Application Compartmentalization with SOAAP. CCS 2015: 1016-1031 - [c34]Peter G. Neumann:
Reminiscences on SOSP history day. SOSP History Day 2015: 14:1-14:9 - [c33]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - 2014
- [j257]Peter G. Neumann:
Risks and myths of cloud computing and cloud storage. Commun. ACM 57(10): 25-27 (2014) - [j256]Peter G. Neumann, Sean Peisert, Marvin Schaefer:
The IEEE Symposium on Security and Privacy, in Retrospect. IEEE Secur. Priv. 12(3): 15-17 (2014) - [j255]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(1): 17-23 (2014) - [j254]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 39(2): 25-30 (2014) - [j253]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(3): 18-22 (2014) - [j252]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(4): 24-32 (2014) - [j251]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 39(5): 3:14-3:21 (2014) - [j250]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 39(6): 17-22 (2014) - [c32]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - 2013
- [j249]Peter G. Neumann:
More sight on foresight. Commun. ACM 56(2): 23-25 (2013) - [j248]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(1): 20-26 (2013) - [j247]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(2): 20-25 (2013) - [j246]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(3): 21-28 (2013) - [j245]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(4): 19-24 (2013) - [j244]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 38(5): 28-33 (2013) - [j243]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 38(6): 21-28 (2013) - [c31]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - 2012
- [j242]Peter G. Neumann:
The foresight saga, redux. Commun. ACM 55(10): 26-29 (2012) - [j241]Peter G. Neumann, Ulf Lindqvist:
The IEEE Symposium on Security and Privacy Is Moving to San Francisco. IEEE Secur. Priv. 10(2): 65-66 (2012) - [j240]Dan Thomsen, Jeremy Epstein, Peter G. Neumann:
Lost Treasures. IEEE Secur. Priv. 10(6): 17-19 (2012) - [j239]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 37(1): 21-26 (2012) - [j238]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(2): 21-29 (2012) - [j237]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(3): 18-25 (2012) - [j236]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(4): 20-29 (2012) - [j235]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(5): 27-33 (2012) - [j234]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 37(6): 19-23 (2012) - 2011
- [j233]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(1): 19-27 (2011) - [j232]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(2): 19-27 (2011) - [j231]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 36(3): 19-25 (2011) - [j230]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(4): 17-23 (2011) - [j229]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(5): 20-23 (2011) - [j228]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 36(6): 19-23 (2011) - [c30]Peter G. Neumann:
Carrying Goals to Newcastle: A Tribute to Brian Randell. Dependable and Historic Computing 2011: 387-392 - 2010
- [j227]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(1): 21-30 (2010) - [j226]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(2): 15-24 (2010) - [j225]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(3): 24-32 (2010) - [j224]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(4): 17-23 (2010) - [j223]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(5): 18-24 (2010) - [j222]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 35(6): 19-26 (2010) - [c29]Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer:
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy 2010: 3-13 - [p3]Peter G. Neumann:
Combatting Insider Threats. Insider Threats in Cyber Security 2010: 17-44
2000 – 2009
- 2009
- [j221]Peter G. Neumann:
Inside risks - U.S. election after-math. Commun. ACM 52(2): 29 (2009) - [j220]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(1): 17-26 (2009) - [j219]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(2): 15-24 (2009) - [j218]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(3): 16-29 (2009) - [j217]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(4): 17-24 (2009) - [j216]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(5): 18-24 (2009) - [j215]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 34(6): 21-24 (2009) - [c28]Peter G. Neumann:
Computer-Related Risk Futures. ACSAC 2009: 35-40 - 2008
- [j214]Peter G. Neumann:
Reflections on computer-related risks. Commun. ACM 51(1): 78-80 (2008) - [j213]Jim Horning, Peter G. Neumann:
Risks of neglecting infrastructure. Commun. ACM 51(6): 112 (2008) - [j212]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford:
Risking Communications Security: Potential Hazards of the Protect America Act. IEEE Secur. Priv. 6(1): 24-33 (2008) - [j211]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(1) (2008) - [j210]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(2): 18-28 (2008) - [j209]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(3): 17-28 (2008) - [j208]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(4): 17-26 (2008) - [j207]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(5) (2008) - [j206]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 33(6): 15-24 (2008) - 2007
- [j205]Peter G. Neumann:
Reflections on systems trustworthiness. Adv. Comput. 70: 269-310 (2007) - [j204]Peter G. Neumann:
Widespread network failures. Commun. ACM 50(2): 112 (2007) - [j203]Peter G. Neumann:
E-migrating risks? Commun. ACM 50(9): 120 (2007) - [j202]Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman:
Toward a safer and more secure cyberspace. Commun. ACM 50(10): 128 (2007) - [j201]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) - [j200]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(1): 15-20 (2007) - [j199]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(2): 18-23 (2007) - [j198]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(3): 20-24 (2007) - [j197]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(4): 20-29 (2007) - [j196]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(5): 17-25 (2007) - [j195]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 32(6): 20-27 (2007) - 2006
- [j194]Peter G. Neumann:
Trustworthy systems revisited. Commun. ACM 49(2): 152 (2006) - [j193]Peter G. Neumann, Lauren Weinstein:
Risks of RFID. Commun. ACM 49(5): 136 (2006) - [j192]Peter G. Neumann:
Risks relating to system compositions. Commun. ACM 49(7): 120 (2006) - [j191]Peter G. Neumann:
The foresight saga. Commun. ACM 49(9): 112 (2006) - [j190]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(1): 14-19 (2006) - [j189]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(2): 6-16 (2006) - [j188]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(3): 17-24 (2006) - [j187]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(4): 25-37 (2006) - [j186]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(5): 16-21 (2006) - [j185]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 31(6): 21-37 (2006) - [c27]Peter G. Neumann:
Risks of Untrustworthiness. ACSAC 2006: 321-328 - [c26]Peter G. Neumann:
System and network trustworthiness in perspective. CCS 2006: 1-5 - [c25]Steven Fraser, Gregor Kiczales, Ricardo López, Peter G. Neumann, Linda M. Northrop, Martin C. Rinard, Douglas C. Schmidt, Kevin J. Sullivan:
The ultra challenge: software systems beyond big. OOPSLA Companion 2006: 929-933 - 2005
- [j184]Peter G. Neumann:
Responsibilities of technologists. Commun. ACM 48(2): 128 (2005) - [j183]Peter G. Neumann:
Anticipating disasters. Commun. ACM 48(3): 128 (2005) - [j182]Peter G. Neumann, Michael D. Byrne:
Disability-related risks. Commun. ACM 48(8): 144 (2005) - [j181]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 30(1): 9 (2005) - [j180]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 30(1): 9-18 (2005) - [j179]Peter G. Neumann:
Risks to the Public. ACM SIGSOFT Softw. Eng. Notes 30(2): 17-25 (2005) - [j178]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 30(3): 22-37 (2005) - [j177]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 30(4): 19-35 (2005) - [j176]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 30(6): 14-25 (2005) - 2004
- [j175]Peter G. Neumann:
Optimistic optimization. Commun. ACM 47(6): 112 (2004) - [j174]Peter G. Neumann:
The big picture. Commun. ACM 47(9): 112 (2004) - [j173]Peter G. Neumann:
Introduction. Commun. ACM 47(10): 28-30 (2004) - [j172]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 29(2): 8-16 (2004) - [j171]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 29(3): 7-14 (2004) - [j170]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 29(5): 13-18 (2004) - [c24]Peter G. Neumann:
When Can Formal Methods Make a Real Difference? ICFEM 2004: 12 - 2003
- [j169]Peter G. Neumann:
Gambling on system accountability. Commun. ACM 46(2): 120 (2003) - [j168]Peter G. Neumann:
E-epistemology and misinformation. Commun. ACM 46(5): 104 (2003) - [j167]Peter G. Neumann:
Risks in trusting untrustworthiness. Commun. ACM 46(9): 120 (2003) - [j166]Peter G. Neumann:
Information system security redux. Commun. ACM 46(10): 136 (2003) - [j165]Rebecca Mercuri, Peter G. Neumann:
Security by obscurity. Commun. ACM 46(11): 160 (2003) - [j164]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 28(2): 12-17 (2003) - [j163]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 28(3): 5-9 (2003) - [j162]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 28(4): 6-10 (2003) - [j161]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 28(6): 6-14 (2003) - [c23]Peter G. Neumann, Richard J. Feiertag:
PSOS Revisited. ACSAC 2003: 208-216 - [c22]Peter G. Neumann:
Social and Technical Implications of Nonproprietary Software. BSDCon 2003 - [c21]Peter G. Neumann:
Achieving Principled Assuredly Trustworthy Composable Systems and Networks. DISCEX (2) 2003: 182-187 - [p2]Rebecca T. Mercuri, Peter G. Neumann:
Verification for Electronic Balloting Systems. Secure Electronic Voting 2003: 31-42 - 2002
- [j160]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 27(1): 7-17 (2002) - [j159]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 27(2): 5-19 (2002) - [j158]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 27(3): 5-19 (2002) - [j157]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 27(5): 6-16 (2002) - [c20]Kim Alexander, Ernie Hawkins, Peter G. Neumann, Joe Taggard, Jason Dearen, Andy Neff:
Plenary Session #5: how to hack an election. CFP 2002: 6:6 - [c19]Alan Davidson, Peter G. Neumann, Susan Crawford, Karl Auerbach:
ICANN in Year 3. CFP 2002: 10:10 - 2001
- [j156]Rebecca Mercuri, Peter G. Neumann:
System integrity revisited. Commun. ACM 44(1): 160 (2001) - [j155]Peter G. Neumann:
What to know about risks. Commun. ACM 44(2): 136 (2001) - [j154]Peter G. Neumann, David Lorge Parnas:
Computers: boon or bane? Commun. ACM 44(3): 168 (2001) - [j153]Lauren Weinstein, Peter G. Neumann:
Inside Risks: Risks of Panic. Commun. ACM 44(11): 152 (2001) - [j152]Peter G. Neumann, Lauren Weinstein:
Risks of National Identity Cards. Commun. ACM 44(12): 176 (2001) - [j151]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 26(1): 14-38 (2001) - [j150]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 26(2): 5-11 (2001) - [j149]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 26(4): 3-12 (2001) - [j148]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 26(6): 6-15 (2001) - [j147]Peter G. Neumann:
Machanizing proof: computing, risk, and trust. Ubiquity 2001(December): 6 (2001) - 2000
- [j146]Peter G. Neumann:
A Tale of Two Thousands. Commun. ACM 43(3): 144 (2000) - [j145]Peter G. Neumann:
Denial-of-Service Attacks. Commun. ACM 43(4): 136 (2000) - [j144]Lauren Weinstein, Peter G. Neumann:
Internet Risks. Commun. ACM 43(5): 144 (2000) - [j143]Peter G. Neumann:
Risks in retrospect. Commun. ACM 43(7): 144 (2000) - [j142]Peter G. Neumann:
Missile defense. Commun. ACM 43(9): 128 (2000) - [j141]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 25(1): 22-26 (2000) - [j140]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 25(2): 17-21 (2000) - [j139]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 25(3): 15-23 (2000) - [j138]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 25(4): 7-11 (2000) - [j137]Peter G. Neumann:
Certitude and rectitude. Ubiquity 2000(June): 1 (2000) - [j136]Peter G. Neumann:
Risks in our information infrastructures. Ubiquity 2000(May): 7 (2000) - [c18]Peter G. Neumann:
Requirements-Related Risks in Critical Systems. ICRE 2000: 3- - [c17]Peter G. Neumann:
Certitude and Rectitude. ICRE 2000: 153 - [c16]Peter G. Neumann:
Robust Nonproprietary Software. S&P 2000: 122-123
1990 – 1999
- 1999
- [j135]Peter G. Neumann:
Robust Open-Source Software. Commun. ACM 42(2): 128 (1999) - [j134]Peter G. Neumann, Declan McCullagh:
Risks of Y2K. Commun. ACM 42(6): 144 (1999) - [j133]Peter G. Neumann:
Information is a Double-Edged Sword. Commun. ACM 42(7): 120 (1999) - [j132]Peter G. Neumann, Lauren Weinstein:
Risks of Content Filtering. Commun. ACM 42(11): 152 (1999) - [j131]Peter G. Neumann:
Risks of Insiders. Commun. ACM 42(12): 160 (1999) - [j130]Peter G. Neumann:
IC Online Exclusive Interview: Internet Security - Beyond Cryptography. IEEE Internet Comput. 3(2): 100 (1999) - [j129]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 24(1): 31-35 (1999) - [j128]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 24(4): 26-29 (1999) - [c15]Peter G. Neumann, Phillip A. Porras:
Experience with EMERALD to Date. Workshop on Intrusion Detection and Network Monitoring 1999: 73-80 - 1998
- [j127]Peter G. Neumann:
Protecting the Infrastructures. Commun. ACM 41(1): 128 (1998) - [j126]Peter G. Neumann:
Internet Gambling. Commun. ACM 41(2): 112 (1998) - [j125]Peter G. Neumann:
Are Computers Addictive? Commun. ACM 41(3): 128 (1998) - [j124]Peter G. Neumann:
Laptops in Congress? Commun. ACM 41(7): 128 (1998) - [j123]Peter G. Neumann:
Y2K Update. Commun. ACM 41(9): 128 (1998) - [j122]Peter G. Neumann:
Risks of E-Education. Commun. ACM 41(10): 136 (1998) - [j121]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 23(1): 9-15 (1998) - [j120]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 23(3): 23-29 (1998) - [j119]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 23(4): 21-25 (1998) - [j118]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 23(5): 25-29 (1998) - [e1]Rebecca N. Wright, Peter G. Neumann:
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 38, DIMACS/AMS 1998, ISBN 978-0-8218-0832-0 [contents] - 1997
- [j117]Peter G. Neumann:
Hopes for Fewer Risks? Commun. ACM 40(2): 170 (1997) - [j116]Peter G. Neumann:
The Big Picture. Commun. ACM 40(5): 136 (1997) - [j115]Peter G. Neumann, Lauren Weinstein:
Spam, Spam, Spam! Commun. ACM 40(6): 112 (1997) - [j114]Peter G. Neumann:
Identity-Ralated Misuse. Commun. ACM 40(7): 112 (1997) - [j113]Peter G. Neumann:
Crypto Key Management. Commun. ACM 40(8): 136 (1997) - [j112]Peter G. Neumann:
Integrity in Software Development. Commun. ACM 40(10): 144 (1997) - [j111]Peter G. Neumann:
System Development Woes. Commun. ACM 40(12): 160 (1997) - [j110]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 22(1): 16-22 (1997) - [j109]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 22(2): 19-24 (1997) - [j108]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 22(4): 25-34 (1997) - [j107]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 22(5): 13-15 (1997) - [j106]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - [r1]Peter G. Neumann:
Security and Privacy Issues in Computer and Communication Systems. The Computer Science and Engineering Handbook 1997: 1910-1913 - 1996
- [j105]Peter G. Neumann:
Risks in Digital Commerce. Commun. ACM 39(1): 154 (1996) - [j104]Peter G. Neumann, Peter J. Denning:
W(h)ither Research and Education? Commun. ACM 39(2): 154 (1996) - [j103]Peter G. Neumann:
A Risks-related Bookshelf. Commun. ACM 39(4): 122 (1996) - [j102]Peter G. Neumann:
Linguistic Risks. Commun. ACM 39(5): 154 (1996) - [j101]Peter G. Neumann:
Using Formal Methods to Reduce Risks. Commun. ACM 39(7): 114 (1996) - [j100]Peter G. Neumann:
Disinformation Theory. Commun. ACM 39(10): 138 (1996) - [j99]Peter G. Neumann:
Distributed Systems have Distributed Risks. Commun. ACM 39(11): 130 (1996) - [j98]Peter G. Neumann:
Risks of Anonymity. Commun. ACM 39(12): 162 (1996) - [j97]Peter G. Neumann:
Illustrative risks to the public in the use of computer systems and related technology. ACM SIGSOFT Softw. Eng. Notes 21(1): 16-30 (1996) - [j96]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 21(2): 16-22 (1996) - [j95]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 21(4): 12-18 (1996) - [j94]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 21(5): 13-20 (1996) - [p1]Peter G. Neumann:
Risks of Technology. Computerization and Controversy, 2nd Ed. 1996: 844-846 - 1995
- [b1]Peter G. Neumann:
Computer-related risks. Addison-Wesley 1995, ISBN 978-0-201-55805-0, pp. I-XV, 1-367 - [j93]Peter G. Neumann:
Reassessing the Crypto Debate. Commun. ACM 38(3): 138 (1995) - [j92]Peter G. Neumann:
Computer Vulnerabilities: Exploitation or Avoidance. Commun. ACM 38(6): 138 (1995) - [j91]Peter G. Neumann:
Risks of Easy Answers. Commun. ACM 38(9): 130 (1995) - [j90]Peter G. Neumann:
Reviewing the Risks Archives. Commun. ACM 38(12): 138 (1995) - [j89]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 20(1): 16-21 (1995) - [j88]Peter G. Neumann:
Book review: Software Creativity by Robert L. Glass. ACM SIGSOFT Softw. Eng. Notes 20(1): 93 (1995) - [j87]Peter G. Neumann:
Risks to the Public in Computers and Related Systems. ACM SIGSOFT Softw. Eng. Notes 20(2): 7-13 (1995) - [j86]Peter G. Neumann:
Risks to the Public in Computers and Related Systems. ACM SIGSOFT Softw. Eng. Notes 20(3): 7-12 (1995) - [j85]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 20(5): 8-14 (1995) - [j84]Peter G. Neumann:
Safeware: System Safety and Computers. ACM SIGSOFT Softw. Eng. Notes 20(5): 90-91 (1995) - [j83]Peter G. Neumann:
Fatal Defect: Chasing Killer Computer Bugs. ACM SIGSOFT Softw. Eng. Notes 20(5): 91 (1995) - [c14]Peter G. Neumann:
Risks, Responsibilities, and the Future: Walking the Tightwire. ACM Conference on Computer Science 1995: 257 - 1994
- [j82]Peter G. Neumann:
Technology, Laws, and Society. Commun. ACM 37(3): 138 (1994) - [j81]Peter G. Neumann:
Risks of Passwords. Commun. ACM 37(4): 126 (1994) - [j80]Peter G. Neumann:
Alternative Passwords. Commun. ACM 37(5): 146 (1994) - [j79]Peter G. Neumann:
Risks on the Information Superhighway. Commun. ACM 37(6): 114 (1994) - [j78]Susan Landau, Stephen T. Kent, Clinton Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel:
Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994) - [j77]Peter G. Neumann:
Friendly Fire. Commun. ACM 37(8): 138 (1994) - [j76]Peter G. Neumann:
Expectations of Security and Privacy. Commun. ACM 37(9): 138 (1994) - [j75]Peter G. Neumann:
Inside "Inside Risks". Commun. ACM 37(12): 154 (1994) - [j74]Peter G. Neumann:
Illustrative risks to the public in the use of computer systems and related technology. ACM SIGSOFT Softw. Eng. Notes 19(1): 16-29 (1994) - 1993
- [j73]Peter G. Neumann:
Risks Considered Global(ly). Commun. ACM 36(1): 154 (1993) - [j72]Peter G. Neumann:
Are Dependable Systems Feasible? Commun. ACM 36(2): 146 (1993) - [j71]Peter G. Neumann:
Risks of Technology. Commun. ACM 36(3): 130 (1993) - [j70]Peter G. Neumann:
Using Names as Identifiers. Commun. ACM 36(4): 154 (1993) - [j69]Peter G. Neumann:
The Role of Software Engineering. Commun. ACM 36(5): 114 (1993) - [j68]Peter G. Neumann:
Modeling and Simulation. Commun. ACM 36(6): 124 (1993) - [j67]Peter G. Neumann:
Risks on the Rails. Commun. ACM 36(7): 130 (1993) - [j66]Peter G. Neumann:
Risks of Surveillance. Commun. ACM 36(8): 122 (1993) - [j65]Peter G. Neumann:
Animal Crackers. Commun. ACM 36(9): 162 (1993) - [j64]Peter G. Neumann:
System Development Woes. Commun. ACM 36(10): 146 (1993) - [j63]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 18(2): 4-17 (1993) - [j62]Peter G. Neumann:
Risks to the Public in Computers and Related Systems. ACM SIGSOFT Softw. Eng. Notes 18(3): A:3-A:15 (1993) - [j61]Nancy G. Leveson, Peter G. Neumann:
Introduction to Special Issue on Software for Critical Systems. IEEE Trans. Software Eng. 19(1): 1-2 (1993) - [c13]Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen:
Effects of multilevel security on real-time applications. ACSAC 1993: 120-129 - 1992
- [j60]Peter G. Neumann:
What's in a Name? Commun. ACM 35(1): 186 (1992) - [j59]Peter G. Neumann:
Inside "Risks of Risks". Commun. ACM 35(3): 160 (1992) - [j58]Peter G. Neumann:
Survivable Systems. Commun. ACM 35(5): 130 (1992) - [j57]Peter G. Neumann:
Leap-Year Problems. Commun. ACM 35(6): 162 (1992) - [j56]Peter G. Neumann:
Aggravation by Computer: Life, Death, and Taxes. Commun. ACM 35(7): 122 (1992) - [j55]Peter G. Neumann:
Fraud by Computer. Commun. ACM 35(8): 154 (1992) - [j54]Peter G. Neumann:
Accidental Financial Losses. Commun. ACM 35(9): 194 (1992) - [j53]Peter G. Neumann:
Where to Place Trust. Commun. ACM 35(10): 138 (1992) - [j52]Peter G. Neumann:
Avoiding Weak Links. Commun. ACM 35(12): 146 (1992) - [j51]Peter G. Neumann:
Illustrative risks to the public in the use of computer systems and related technology. ACM SIGSOFT Softw. Eng. Notes 17(1): 23-32 (1992) - [c12]Peter G. Neumann:
Developing Complex Software for Critical Systems. GI Jahrestagung 1992: 117-131 - 1991
- [j50]Peter G. Neumann:
The Clock Grows at Midnight. Commun. ACM 34(1): 170 (1991) - [j49]Peter G. Neumann:
Certifying Professionals. Commun. ACM 34(2): 130 (1991) - [j48]Peter G. Neumann:
Putting on Your Best Interface. Commun. ACM 34(3): 138 (1991) - [j47]Peter G. Neumann:
Interpreting (Mis)information. Commun. ACM 34(4): 144 (1991) - [j46]Peter G. Neumann:
Expecting the Unexpected Mayday. Commun. ACM 34(5): 128 (1991) - [j45]Peter G. Neumann:
Computers, Ethics, and Values. Commun. ACM 34(7): 106 (1991) - [j44]Peter G. Neumann:
The Not-So-Accidental Holist. Commun. ACM 34(9): 122 (1991) - [j43]Peter G. Neumann:
The Human Element. Commun. ACM 34(11): 150 (1991) - [j42]Peter G. Neumann:
Collaborative Effords. Commun. ACM 34(12): 162 (1991) - [j41]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 16(2): 4-18 (1991) - [j40]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 16(3): 3-28 (1991) - 1990
- [j39]Peter G. Neumann:
Some Reflections on a Telephone Switching Problem. Commun. ACM 33(7): 154 (1990) - [j38]Peter G. Neumann:
Insecurity about Security? Commun. ACM 33(8): 170 (1990) - [j37]Peter G. Neumann:
A Few Old Coincidences. Commun. ACM 33(9): 202 (1990) - [j36]Peter G. Neumann:
Ghosts, Mysteries and Uncertainty. Commun. ACM 33(10): 170 (1990) - [j35]Peter G. Neumann:
Risks in Computerized Elections. Commun. ACM 33(11): 170 (1990) - [j34]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 15(1): 4-23 (1990) - [j33]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 15(2): 3-22 (1990) - [j32]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 15(5): 3-17 (1990) - [c11]Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali:
IDES: a progress report [Intrusion-Detection Expert System]. ACSAC 1990: 273-285
1980 – 1989
- 1989
- [j31]Peter G. Neumann:
Errata - Interchanged pages in the previous issue: SEN 14-1: Page 31 and Page 46. ACM SIGSOFT Softw. Eng. Notes 14(2): 78 (1989) - 1988
- [j30]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 13(1): 3-16 (1988) - [j29]Peter G. Neumann:
Risks to the public and related systems. ACM SIGSOFT Softw. Eng. Notes 13(2): 5-17 (1988) - [j28]Peter G. Neumann, et al.:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 13(4): 3-20 (1988) - 1987
- [j27]Peter G. Neumann:
Risks to the public in computers and related systems. ACM SIGSOFT Softw. Eng. Notes 12(1): 3-22 (1987) - [j26]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 12(3): 2-17 (1987) - [j25]Peter G. Neumann:
Risks to the public. ACM SIGSOFT Softw. Eng. Notes 12(4): 2-18 (1987) - [j24]Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987) - 1986
- [j23]Peter G. Neumann:
Risks to the public in computer systems. ACM SIGSOFT Softw. Eng. Notes 11(1): 2-14 (1986) - [j22]Peter G. Neumann:
Risks to the public in computer systems. ACM SIGSOFT Softw. Eng. Notes 11(2): 1 (1986) - [j21]Peter G. Neumann:
Risks to the public in computer systems. ACM SIGSOFT Softw. Eng. Notes 11(2): 2-17 (1986) - [j20]Peter G. Neumann:
Risks to the public in computer systems. ACM SIGSOFT Softw. Eng. Notes 11(5): 3-28 (1986) - [j19]Peter G. Neumann:
On Hierarchical Design of Computer Systems for Critical Applications. IEEE Trans. Software Eng. 12(9): 905-920 (1986) - [c10]Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark R. Heckman:
Views for Multilevel Database Security. S&P 1986: 156-172 - 1985
- [j18]Peter G. Neumann:
Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985. ACM SIGSOFT Softw. Eng. Notes 10(2): 23-27 (1985) - 1984
- [j17]Peter G. Neumann:
A Further View of the First Quarter Century, Introduction to the April 1984 Special Section. Commun. ACM 27(4): 343 (1984) - [j16]Peter G. Neumann:
Review of "The hacker's dictionary: a guide to the world of computer wizards" by Guy L. Steele, Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow. Harper & Row Publishers 1983. ACM SIGSOFT Softw. Eng. Notes 9(1): 12-15 (1984) - 1983
- [j15]Stanley R. Ames Jr., Peter G. Neumann:
Computer Security Technology: Guest Editors' Introduction. Computer 16(7): 10-12 (1983) - 1982
- [j14]Peter G. Neumann:
Psychosocial implications of computer software development and use: Zen and the art of computing. ACM SIGSOFT Softw. Eng. Notes 7(2): 3-12 (1982) - 1981
- [j13]Peter G. Neumann:
Retrospective introduction to VERkshop II. ACM SIGSOFT Softw. Eng. Notes 6(3): 2 (1981) - [j12]Karl N. Levitt, Peter G. Neumann:
Recent SRI work in verification. ACM SIGSOFT Softw. Eng. Notes 6(3): 27-35 (1981)
1970 – 1979
- 1979
- [c9]Richard J. Feiertag, Peter G. Neumann:
The foundations of a provably secure operating system (PSOS). MARK 1979: 329-334 - 1978
- [c8]Peter G. Neumann:
Computer system - Security evaluation. AFIPS National Computer Conference 1978: 1087-1096 - 1976
- [c7]Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson:
Software Development and Proofs of Multi-Level Security. ICSE 1976: 421-428 - 1975
- [j11]Peter G. Neumann, T. R. N. Rao:
Error-Correcting Codes for Byte-Organized Arithmetic Processors. IEEE Trans. Computers 24(3): 226-232 (1975) - [c6]Lawrence Robinson, Karl N. Levitt, Peter G. Neumann, Ashok R. Saxena:
On attaining reliable software for a secure operating system. Reliable Software 1975: 267-284 - 1974
- [c5]Steven B. Lipner, William A. Wulf, Roger R. Schell, Gerald J. Popek, Peter G. Neumann, Clark Weissman, Theodore A. Linden:
Security kernels. AFIPS National Computer Conference 1974: 973-980 - [c4]Peter G. Neumann:
Toward a Methodology for Designing Large Systems and Verifying Their Properties. GI Jahrestagung 1974: 52-67 - 1973
- [c3]Peter G. Neumann:
Report of evening session protection. SIGPLAN-SIGOPS Interface Meeting 1973: 27
1960 – 1969
- 1969
- [c2]Peter G. Neumann:
The role of motherhood in the pop art of system programming. SOSP 1969: 13-18 - 1965
- [j10]Peter G. Neumann:
A note on Gilbert burst-correcting codes. IEEE Trans. Inf. Theory 11(3): 377-384 (1965) - [c1]Robert C. Daley, Peter G. Neumann:
A general-purpose file system for secondary storage. AFIPS Fall Joint Computing Conference (1) 1965: 213-229 - 1964
- [j9]Peter G. Neumann:
On a class of cyclically permutable error-correcting codes. IEEE Trans. Inf. Theory 10(1): 75-78 (1964) - [j8]Peter G. Neumann:
Error-limiting coding using information-lossless sequential machines. IEEE Trans. Inf. Theory 10(2): 108-115 (1964) - 1963
- [j7]Peter G. Neumann:
On error-limiting variable-length codes (Corresp.). IEEE Trans. Inf. Theory 9(3): 209 (1963) - 1962
- [j6]Peter G. Neumann:
A Note on Cyclic Permutation Error-Correcting Codes. Inf. Control. 5(1): 72-86 (1962) - [j5]Peter G. Neumann:
On the Logical Design of Noiseless Load-Sharing Matrix Switches. IRE Trans. Electron. Comput. 11(3): 369-374 (1962) - [j4]Peter G. Neumann:
Encoding and Decoding for Cyclic Permutation Codes. IRE Trans. Electron. Comput. 11(4): 507-511 (1962) - [j3]Peter G. Neumann:
Efficient error-limiting variable-length codes. IRE Trans. Inf. Theory 8(4): 292-304 (1962) - [j2]Peter G. Neumann:
On a class of efficient error-limiting variable-length codes. IRE Trans. Inf. Theory 8(5): 260-266 (1962)
1950 – 1959
- 1957
- [j1]Frederick P. Brooks Jr., Albert L. Hopkins Jr., Peter G. Neumann, William V. Wright:
An experiment in musical composition. IRE Trans. Electron. Comput. 6(3): 175-182 (1957)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint