Peter G. Neumann

Last updated
Peter G. Neumann
Peter G. Neumann -a.jpg
Born1932 (age 9192)
Alma mater Harvard University
Known for RISKS Digest
Multics operating system
Scientific career
Fields Computer science
Institutions SRI International
Thesis Efficient Error-Limiting Codes (1961)
Doctoral advisor Anthony Oettinger [1]

Peter Gabriel Neumann (born 1932) is a computer-science researcher who worked on the Multics operating system in the 1960s. [2] He edits the RISKS Digest columns for ACM Software Engineering Notes and Communications of the ACM . [3] He founded ACM SIGSOFT and is a Fellow of the ACM, IEEE, [4] and AAAS. [5]

Contents

Early life and education

Neumann holds three degrees from Harvard University: an A.B. (1954) in Mathematics, and an S.M. (1955) and Ph.D. (1961) in Applied Mathematics and Science. He held a Fulbright scholarship in Germany from 1958–1960.

While a student at Harvard, he had a two-hour breakfast with Albert Einstein, on 8 November 1952, discussing simplicity in design. [6]

Career

Neumann worked at Bell Labs from 1960 to 1970. He has worked at SRI International in Menlo Park, California since 1971.

Before the RISKS mailing list, Neumann was known for the Provably Secure Operating System (PSOS). [7]

Neumann worked with Dorothy E. Denning in the 1980s to develop a computer intrusion detection system known as IDES that was a model for later computer security software. [8] [9]

Memberships and awards

Neumann has long served as moderator of RISKS Digest and is a member of the ACCURATE project. [10]

Neumann is the founding editor of ACM Software Engineering Notes (SEN), and is a Fellow of the ACM. [11]

In 2018, Neumann received the EPIC Lifetime Achievement Award from Electronic Privacy Information Center. [12]

Selected publications

Related Research Articles

<span class="mw-page-title-main">Computer science</span> Study of computation

Computer science is the study of computation, information, and automation. Computer science spans theoretical disciplines to applied disciplines. Though more often considered an academic discipline, computer science is closely related to computer programming.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Leslie Lamport</span> American computer scientist and mathematician

Leslie B. Lamport is an American computer scientist and mathematician. Lamport is best known for his seminal work in distributed systems, and as the initial developer of the document preparation system LaTeX and the author of its first manual.

<span class="mw-page-title-main">Barry Boehm</span> American computer scientist (1935–2022)

Barry William Boehm was an American software engineer, distinguished professor of computer science, industrial and systems engineering; the TRW Professor of Software Engineering; and founding director of the Center for Systems and Software Engineering at the University of Southern California. He was known for his many contributions to the area of software engineering.

<span class="mw-page-title-main">SRI International</span> American scientific research institute (founded 1946)

SRI International (SRI) is an American nonprofit scientific research institute and organization headquartered in Menlo Park, California. The trustees of Stanford University established SRI in 1946 as a center of innovation to support economic development in the region.

<span class="mw-page-title-main">Jack Dongarra</span> American computer scientist (born 1950)

Jack Joseph Dongarra is an American computer scientist and mathematician. He is the American University Distinguished Professor of Computer Science in the Electrical Engineering and Computer Science Department at the University of Tennessee. He holds the position of a Distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory, Turing Fellowship in the School of Mathematics at the University of Manchester, and is an adjunct professor and teacher in the Computer Science Department at Rice University. He served as a faculty fellow at the Texas A&M University Institute for Advanced Study (2014–2018). Dongarra is the founding director of the Innovative Computing Laboratory at the University of Tennessee. He was the recipient of the Turing Award in 2021.

<span class="mw-page-title-main">Peter J. Denning</span> American computer scientist and writer

Peter James Denning is an American computer scientist and writer. He is best known for pioneering work in virtual memory, especially for inventing the working-set model for program behavior, which addressed thrashing in operating systems and became the reference standard for all memory management policies. He is also known for his works on principles of operating systems, operational analysis of queueing network systems, design and implementation of CSNET, the ACM digital library, and codifying the great principles of computing. He has written numerous influential articles and books, including an overview of fundamental computer science principles, computational thinking, and his thoughts on innovation as a set of learnable practices.

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

<span class="mw-page-title-main">Stuart Feldman</span> American computer scientist

Stuart Feldman is an American computer scientist. He is best known as the creator of the computer software program make. He was also an author of the first Fortran 77 compiler, was part of the original group at Bell Labs that created the Unix operating system, and participated in development of the ALTRAN and EFL programming languages.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

<span class="mw-page-title-main">Simson Garfinkel</span> American academic and journalist (born 1965)

Simson L. Garfinkel is the chief scientist of BasisTech in Somerville, Massachusetts. He was previously a program scientist at AI2050, part of Schmidt Futures. He has held several roles across government, including a Senior Data Scientist at the Department of Homeland Security, the US Census Bureau's Senior Computer Scientist for Confidentiality and Data Access and a computer scientist at the National Institute of Standards and Technology. From 2006 to 2015, he was an associate professor at the Naval Postgraduate School in Monterey, California. In addition to his research, Garfinkel is a journalist, an entrepreneur and an inventor; his work is generally concerned with computer security, privacy and information technology.

James Jay Horning was an American computer scientist and ACM Fellow.

<span class="mw-page-title-main">Susan L. Graham</span> American computer scientist

Susan Lois Graham is an American computer scientist. Graham is the Pehong Chen Distinguished Professor Emerita in the Computer Science Division of the Department of Electrical Engineering and Computer Sciences at the University of California, Berkeley.

<span class="mw-page-title-main">Hewitt Crane</span>

Hewitt D. Crane (1927–2008) was an American engineer best known for his pioneering work at SRI International on ERMA, for Bank of America, magnetic digital logic, neuristor logic, the development of an eye-movement tracking device, and a pen-input device for computers.

In data analysis, anomaly detection is generally understood to be the identification of rare items, events or observations which deviate significantly from the majority of the data and do not conform to a well defined notion of normal behavior. Such examples may arouse suspicions of being generated by a different mechanism, or appear inconsistent with the remainder of that set of data.

<span class="mw-page-title-main">Ken Kennedy (computer scientist)</span> American computer scientist

Ken Kennedy was an American computer scientist and professor at Rice University. He was the founding chairman of Rice's Computer Science Department.

Ruchir Puri is an Indian American scientist, CTO and chief architect of IBM Watson, an IBM Fellow and currently Chief Scientist of IBM Research. He is a Fellow of the IEEE, a member of IBM Academy of Technology and IBM Master Inventor, an ACM Distinguished Speaker and IEEE Distinguished Lecturer. Ruchir received Semiconductor Research Corporation's outstanding mentor award. He was a visiting scientist at the Dept. of Computer Science, Stanford University, CA, and an adjunct professor at the Dept. of Electrical Engineering, Columbia University, NY and was awarded John Von-Neumann Chair at Institute of Discrete Mathematics at Bonn University, Germany. Ruchir received the 2014 Asian American Engineer of the Year Award. He has delivered numerous keynotes and invited talks at major software and hardware conferences. He is an inventor of over 50 United States patents and has authored over 100 publications as well as authored a book on Analyzing Analytics. Ruchir is an active proponent of technology among school children and has been evangelizing fun with electronics and FIRST LEGO League Robotics among middle schools children.

<span class="mw-page-title-main">Qiang Yang</span>

Qiang Yang is the Chair Professor, Department Head of CSE, HKUST in Hong Kong and University New Bright Professor of Engineering and Chair Professor from 2015. He was the founding head of Noah's Ark Lab. He had taught at the University of Waterloo and Simon Fraser University. His research interests are data mining and artificial intelligence.

Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.

The National Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, Respect the Past - Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through a timeline representation, which includes inductees and their corresponding accomplishments.

References

  1. Peter G. Neumann at the Mathematics Genealogy Project
  2. R. C. Daley and P. G. Neumann (1965). "A General-Purpose File System For Secondary Storage". 1965 Fall Joint Computer Conference. Archived from the original on 2013-01-02.
  3. "Risks Forum - ACM Queue". Archived from the original on 2018-01-01. Retrieved 2012-07-23.
  4. "IEEE - Fellows - N". Institute of Electrical and Electronics Engineers (IEEE). Archived from the original on 2012-09-26. Retrieved 2012-01-03.
  5. "AAAS - the World's Largest General Scientific Society". Archived from the original on 2014-01-15. Retrieved 2011-05-21.
  6. Markoff, John (2012-10-30). "Killing the Computer to Save It". The New York Times. p. D1.
  7. Feiertag, Richard J.; Neumann, Peter G. (1979). "The foundations of a provably secure operating system (PSOS)" (PDF). Proceedings of the National Computer Conference. SRI International, Menlo Park, California: AFIPS Press. pp. 329–334. Retrieved 8 April 2020.
  8. Denning, Dorothy; Neumann, Peter (1985). "Requirements and Model for IDES - A Real-Time Intrusion Detection System" (PDF).
  9. Denning, Dorothy (February 1987). "An Intrusion-Detection Model" (PDF). IEEE Transactions on Software Engineering. SE-13 (2): 222–232. doi:10.1109/TSE.1987.232894. S2CID   10028835 . Retrieved 3 July 2020.
  10. Neumann, Peter G. (2007-11-30). "Security and Privacy Risks in Voter Registration Databases (VRDBs)". www.csl.sri.com. Retrieved 2021-05-31.
  11. Association for Computing Machinery. "ACM: Fellows Award / Peter G Neumann". Association for Computing Machinery. Archived from the original on 4 October 2006.
  12. "Annual Report of the ACM CCPP 2018". SRI International . 2018.