Travelled to:
1 × Turkey
3 × USA
Collaborated with:
∅ R.J.Feiertag K.N.Levitt L.Robinson D.Chisnall R.N.M.Watson J.Woodruff S.W.Moore M.Roe B.Davis K.Gudka Alexandre Joannou A. Theodore Markettos J. Edward Maste Robert M. Norton Stacey D. Son Ben Laurie C.Rothwell M.Vadera David Brazdil Alexander Richardson John Baldwin James Clarke N.W.Filardo Alfredo Mazzinghi Edward Tomasz Napierala P.Sewell
Talks about:
pointer (2) system (2) secur (2) cheri (2) architectur (1) motherhood (1) rectitud (1) privileg (1) certitud (1) abstract (1)
Person: Peter G. Neumann
DBLP: Neumann:Peter_G=
Contributed to:
Wrote 7 papers:
- ASPLOS-2015-ChisnallRWWVMRD #architecture #automaton #c
- Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine (DC, CR, RNMW, JW, MV, SWM, MR, BD, PGN), pp. 117–130.
- ICRE-2000-Neumann #risk management
- Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
- ICRE-2000-Neumann00a
- Certitude and Rectitude (PGN), p. 153.
- ICSE-1976-NeumannFLR #development #multi #proving #security
- Software Development and Proofs of Multi-Level Security (PGN, RJF, KNL, LR), pp. 421–428.
- SOSP-1969-Neumann #programming #women
- The role of motherhood in the pop art of system programming (PGN), pp. 13–18.
- ASPLOS-2017-ChisnallDGBJWMM #c #java #security
- CHERI JNI: Sinking the Java Security Model into the C (DC, BD, KG, DB, AJ, JW, ATM, JEM, RMN, SDS, MR, SWM, PGN, BL, RNMW), pp. 569–583.
- ASPLOS-2019-DavisWRNMBCCFGJ #c #named #pointer #runtime
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (BD, RNMW, AR, PGN, SWM, JB, DC, JC, NWF, KG, AJ, BL, ATM, JEM, AM, ETN, RMN, MR, PS, SDS, JW), pp. 379–393.