Peter G. Neumann

Last updated
Peter G. Neumann
Peter G. Neumann -a.jpg
Born1932 (age 9192)
Alma mater Harvard University
Known for RISKS Digest
Multics operating system
Scientific career
Fields Computer science
Institutions SRI International
Thesis Efficient Error-Limiting Codes  (1961)
Doctoral advisor Anthony Oettinger [1]

Peter Gabriel Neumann (born 1932) is a computer-science researcher who worked on the Multics operating system in the 1960s. [2] He edits the RISKS Digest columns for ACM Software Engineering Notes and Communications of the ACM . [3] He founded ACM SIGSOFT and is a Fellow of the ACM, IEEE, [4] and AAAS. [5]

Contents

Early life and education

Neumann holds three degrees from Harvard University: an A.B. (1954) in Mathematics, and an S.M. (1955) and Ph.D. (1961) in Applied Mathematics and Science. He held a Fulbright scholarship in Germany from 1958–1960.

While a student at Harvard, he had a two-hour breakfast with Albert Einstein, on 8 November 1952, discussing simplicity in design. [6]

Career

Neumann worked at Bell Labs from 1960 to 1970. He has worked at SRI International in Menlo Park, California since 1971.

Before the RISKS mailing list, Neumann was known for the Provably Secure Operating System (PSOS). [7]

Neumann worked with Dorothy E. Denning in the 1980s to develop a computer intrusion detection system known as IDES that was a model for later computer security software. [8] [9]

Memberships and awards

Neumann has long served as moderator of RISKS Digest and is a member of the ACCURATE project. [10]

Neumann is the founding editor of ACM Software Engineering Notes (SEN), and is a Fellow of the ACM. [11]

In 2018, Neumann received the EPIC Lifetime Achievement Award from Electronic Privacy Information Center. [12]

Selected publications

Related Research Articles

<span class="mw-page-title-main">Computer science</span> Study of computation

Computer science is the study of computation, information, and automation. Computer science spans theoretical disciplines to applied disciplines.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Leslie Lamport</span> American computer scientist and mathematician

Leslie B. Lamport is an American computer scientist and mathematician. Lamport is best known for his seminal work in distributed systems, and as the initial developer of the document preparation system LaTeX and the author of its first manual.

The following outline is provided as an overview of and topical guide to software engineering:

<span class="mw-page-title-main">SRI International</span> American scientific research institute (founded 1946)

SRI International (SRI) is an American nonprofit scientific research institute and organization headquartered in Menlo Park, California. The trustees of Stanford University established SRI in 1946 as a center of innovation to support economic development in the region.

<span class="mw-page-title-main">Jack Dongarra</span> American computer scientist (born 1950)

Jack Joseph Dongarra is an American computer scientist and mathematician. He is a University Distinguished Professor of Computer Science in the Electrical Engineering and Computer Science Department at the University of Tennessee. He holds the position of a Distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory, Turing Fellowship in the School of Mathematics at the University of Manchester, and is an adjunct professor and teacher in the Computer Science Department at Rice University. He served as a faculty fellow at the Texas A&M University Institute for Advanced Study (2014–2018). Dongarra is the founding director of the Innovative Computing Laboratory at the University of Tennessee. He was the recipient of the Turing Award in 2021.

<span class="mw-page-title-main">Peter J. Denning</span> American computer scientist and writer

Peter James Denning is an American computer scientist and writer. He is best known for pioneering work in virtual memory, especially for inventing the working-set model for program behavior, which addressed thrashing in operating systems and became the reference standard for all memory management policies. He is also known for his works on principles of operating systems, operational analysis of queueing network systems, design and implementation of CSNET, the ACM digital library, and codifying the great principles of computing. He has written numerous influential articles and books, including an overview of fundamental computer science principles, computational thinking, and his thoughts on innovation as a set of learnable practices.

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

<span class="mw-page-title-main">Stuart Feldman</span> American computer scientist

Stuart Feldman is an American computer scientist. He is best known as the creator of the computer software program Make. He was also an author of the first Fortran 77 compiler, was part of the original group at Bell Labs that created the Unix operating system, and participated in development of the ALTRAN and EFL programming languages.

Michael Irwin Jordan is an American scientist, professor at the University of California, Berkeley, research scientist at the Inria Paris, and researcher in machine learning, statistics, and artificial intelligence.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

<span class="mw-page-title-main">Susan L. Graham</span> American computer scientist

Susan Lois Graham is an American computer scientist. Graham is the Pehong Chen Distinguished Professor Emerita in the Computer Science Division of the Department of Electrical Engineering and Computer Sciences at the University of California, Berkeley.

<span class="mw-page-title-main">Hewitt Crane</span>

Hewitt D. Crane (1927–2008) was an American engineer best known for his pioneering work at SRI International on ERMA, for Bank of America, magnetic digital logic, neuristor logic, the development of an eye-movement tracking device, and a pen-input device for computers.

In data analysis, anomaly detection is generally understood to be the identification of rare items, events or observations which deviate significantly from the majority of the data and do not conform to a well defined notion of normal behavior. Such examples may arouse suspicions of being generated by a different mechanism, or appear inconsistent with the remainder of that set of data.

<span class="mw-page-title-main">Ken Kennedy (computer scientist)</span> American computer scientist

Ken Kennedy was an American computer scientist and professor at Rice University. He was the founding chairman of Rice's Computer Science Department.

Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.

The National Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, Respect the Past - Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through a timeline representation, which includes inductees and their corresponding accomplishments.

<span class="mw-page-title-main">Salvatore J. Stolfo</span> American computer scientist

Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security.

J. J. Garcia-Luna-Aceves is a Mexican-American computer engineer, currently professor at the University of Toronto's Department of Electrical and Computer Engineering. Until 2023, he was the Distinguished Professor of Computer Science and Engineering at University of California at Santa Cruz UCSC, holding the Jack Baskin Endowed Chair of Computer Engineering, is CITRIS Campus Director for UCSC, and was a Principal Scientist at the Xerox Palo Alto Research Center. He is a Fellow of the IEEE for contributions to theory and design of communication protocols for network routing and channel access and a fellow to AAAS.

References

  1. Peter G. Neumann at the Mathematics Genealogy Project
  2. R. C. Daley and P. G. Neumann (1965). "A General-Purpose File System For Secondary Storage". 1965 Fall Joint Computer Conference. Archived from the original on 2013-01-02.
  3. "Risks Forum - ACM Queue". Archived from the original on 2018-01-01. Retrieved 2012-07-23.
  4. "IEEE - Fellows - N". Institute of Electrical and Electronics Engineers (IEEE). Archived from the original on 2012-09-26. Retrieved 2012-01-03.
  5. "AAAS - the World's Largest General Scientific Society". Archived from the original on 2014-01-15. Retrieved 2011-05-21.
  6. Markoff, John (2012-10-30). "Killing the Computer to Save It". The New York Times. p. D1.
  7. Feiertag, Richard J.; Neumann, Peter G. (1979). "The foundations of a provably secure operating system (PSOS)" (PDF). Proceedings of the National Computer Conference. SRI International, Menlo Park, California: AFIPS Press. pp. 329–334. Retrieved 8 April 2020.
  8. Denning, Dorothy; Neumann, Peter (1985). "Requirements and Model for IDES - A Real-Time Intrusion Detection System" (PDF).
  9. Denning, Dorothy (February 1987). "An Intrusion-Detection Model" (PDF). IEEE Transactions on Software Engineering. SE-13 (2): 222–232. doi:10.1109/TSE.1987.232894. S2CID   10028835 . Retrieved 3 July 2020.
  10. Neumann, Peter G. (2007-11-30). "Security and Privacy Risks in Voter Registration Databases (VRDBs)". www.csl.sri.com. Retrieved 2021-05-31.
  11. Association for Computing Machinery. "ACM: Fellows Award / Peter G Neumann". Association for Computing Machinery. Archived from the original on 4 October 2006.
  12. "Annual Report of the ACM CCPP 2018". SRI International . 2018.