Butler Lampson
#718
Most Influential Person Now
American computer scientist
Butler Lampson's AcademicInfluence.com Rankings
Butler Lampsoncriminal-justice Degrees
Criminal Justice
#32
World Rank
#41
Historical Rank
#22
USA Rank
Cyber Security
#1
World Rank
#1
Historical Rank
#1
USA Rank
Butler Lampsoncomputer-science Degrees
Computer Science
#94
World Rank
#100
Historical Rank
#54
USA Rank
Cybersecurity
#12
World Rank
#12
Historical Rank
#6
USA Rank
Database
#576
World Rank
#604
Historical Rank
#215
USA Rank
Download Badge
Criminal Justice Computer Science
Butler Lampson's Degrees
- PhD Electrical Engineering and Computer Science University of California, Berkeley
Why Is Butler Lampson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Butler W. Lampson, ForMemRS, is an American computer scientist best known for his contributions to the development and implementation of distributed personal computing. Education and early life After graduating from the Lawrenceville School , Lampson received an A.B. in physics from Harvard University in 1964 and a PhD in electrical engineering and computer science from the University of California, Berkeley in 1967.
Butler Lampson's Published Works
Published Works
- A note on the confinement problem (1973) (1561)
- SPKI Certificate Theory (1999) (742)
- Authentication in distributed systems: theory and practice (1991) (741)
- A calculus for access control in distributed systems (1991) (729)
- SDSI - A Simple Distributed Security Infrastructure (1996) (636)
- Atomic Transactions (1980) (453)
- Experience with processes and monitors in Mesa (1980) (427)
- Hints for Computer System Design (1983) (388)
- IP lookups using multiway and multicolumn search (1998) (378)
- Crash Recovery in a Distributed Data Storage System (1976) (364)
- Computer security in the real world (2004) (272)
- The Digital Distributed System Security Architecture (1989) (238)
- A Trusted Open Platform (2003) (225)
- Authentication in distributed systems: theory and practice (1991) (221)
- Designing a global name service (1986) (204)
- Revisiting the PAXOS algorithm (1997) (198)
- Distributed Systems - Architecture and Implementation, An Advanced Course (1981) (184)
- Simple Public Key Certificate (1998) (165)
- How to Build a Highly Available System Using Consensus (1996) (162)
- A Machine Learning Framework for Programming by Example (2013) (147)
- Distributed Systems — Architecture and Implementation (1982) (145)
- There’s plenty of room at the Top: What will drive computer performance after Moore’s law? (2020) (142)
- A Kernel Language for Abstract Data Types and Modules (1984) (126)
- Authentication in the Taos operating system (1993) (119)
- A Global Authentication Service without Global Trust (1986) (117)
- Reflections on an operating system design (1976) (117)
- Authentication and Delegation with Smart-cards (1991) (115)
- On-line data compression in a log-structured file system (1992) (110)
- A scheduling philosophy for multiprocessing systems (1968) (106)
- Analysis and caching of dependencies (1996) (103)
- The ABCD's of Paxos (2001) (98)
- A New Presumed Commit Optimization for Two Phase Commit (1993) (94)
- Notes on the design of Euclid (1977) (90)
- Organizing software in a distributed environment (1983) (84)
- An open operating system for a single-user machine (1974) (80)
- Usable Security: How to Get It (2009) (77)
- Privacy and securityUsable security (2009) (69)
- Protection 1 (1971) (60)
- A colorful approach to text processing by example (2013) (49)
- Annual Review of Computer Science (1986) (49)
- Practical use of a polymorphic applicative language (1983) (44)
- A user machine in a time-sharing system (1966) (44)
- An online editor (1967) (42)
- A processor for a high-performance personal computer (1980) (42)
- Pebble, a Kernel Language for Modules and Abstract Data Types (1988) (42)
- Proof rules for the programming language Euclid (1978) (42)
- Personal distributed computing: the Alto and Ethernet software (1986) (38)
- Protection (2021) (37)
- On the transfer of control between contexts (1974) (36)
- Fast procedure calls (1982) (35)
- Correctness of At-Most-Once Message Delivery Protocols (1993) (34)
- Authentification and Delegation with Smart-Cards (1993) (32)
- The Memory System of a High-Performance Personal Computer (1981) (26)
- Authentication in distributed systems (1993) (26)
- Software Components: Only the Giants Survive (2004) (26)
- In alto user's handbook (2016) (24)
- Verifying concurrent software using movers in CSPEC (2018) (23)
- Correctness of Communications Protocols, A case Study (1993) (22)
- Alto: A personal computer (2016) (21)
- Reliable messages and connection establishment (1993) (21)
- An Instruction Fetch Unit for a High-Performance Personal Computer (1984) (20)
- Lazy and speculative execution in computer systems (2006) (17)
- Annual review of computer science vol. 1, 1986 (1986) (17)
- Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve (1996) (17)
- A scheduling philosophy for multi-processing systems (1967) (15)
- Applications and Protocols (1980) (15)
- Redundancy and Robustness in Memory Protection (1974) (12)
- Computer Systems Research: Past and Future (1999) (11)
- Getting computers to understand (2003) (10)
- Experience with processes and monitors in Mesa (Summary) (1979) (10)
- Practical Principles for Computer Security (2007) (10)
- The Control Structure of an Operating System (1972) (10)
- Butler Lampson Microsoft (1999) (9)
- A Critique of ``An Exploratory Investigation of Programmer Performance Under On-Line and Off-Line Conditions'' (1967) (8)
- Programming language issues for the 1980's: SIGPLAN '83: symposium on programming languages issues in software systems (1984) (7)
- Security in the Real World (2004) (6)
- NSF workshop on a software research program for the 21st century (1999) (5)
- QSPL REFERENCE MANUAL (1969) (4)
- A Description of the Cedar Language (2016) (4)
- REFERENCE MANUAL TIME-SHARING SYSTEM. (1967) (4)
- Hints and Principles for Computer System Design (2020) (4)
- A Calculus for Access Control in Distributed (1993) (4)
- Interconnecting Computers: Architecture, Technology, and Economics (1994) (3)
- Scheduling Philosophy for Multiprocessing (1968) (3)
- A terminal-oriented communication system (1977) (3)
- A processor for a high-performance personal computer (1998) (3)
- There’s plenty of room at the top (2019) (2)
- A kernel language for modules and abstract data types (2016) (2)
- Perspectives on protection and security (2015) (2)
- A naming service for a world-wide computer network (1987) (2)
- Specifying Distributed Systems (1989) (2)
- Ethernet, Pup and Violet (1980) (2)
- What Computers Do: Model, Connect, Engage (2012) (2)
- Secured Wireless Data Communication (2020) (2)
- Proceedings of the 1975 ACM SIGCOMM/SIGOPS workshop on Interprocess communications (1975) (1)
- Proceedings of the third ACM symposium on Operating systems principles (1971) (1)
- Declarative programming: The light at the end of the tunnel (2016) (1)
- Computing Meets the Physical World (2002) (1)
- Remarks on the nature of programming-Programmers as Authors (1972) (1)
- Lookups using Multiway and Multicolurnn Search (1998) (1)
- The Ongoing Computer Revolution (2016) (1)
- Making untrusted code useful (2011) (1)
- Principles for Computer System Design (2007) (1)
- A Distributed Systems Architecture for the 1990's (1989) (1)
- At-Most-Once Message Delivery. A Case Study in Algorithm Verification (1992) (1)
- The ABCD ’ s of Paxos 1 (2006) (0)
- P2P Secure Collaboration between Byzantine Processes in Heterogeneous distributed-Processing Systems (2011) (0)
- Information Systems Security (2016) (0)
- Synchronization: Introduction by the session chairman (1975) (0)
- Ideas for a simple fast VAX (2016) (0)
- Method and apparatus for decoding an information packet with a modifiable format (1991) (0)
- REFERENCE MANUAL: COMPILER PACKAGE, (1966) (0)
- Book Reviews (1975) (0)
- Risk Management and the Cybersecurity of the U.S. Government (2016) (0)
- Programming Concurrent Systems (2022) (0)
- Scheduling and protection in an interactive multi-processor system (1967) (0)
- Textual Features for Programming by Example (2012) (0)
- Implementing coherent memory (1994) (0)
- NSF Workshop on a Software Research Program For the 21 st Century Greenbelt , Maryland , October 15-16 , 1998 Workshop Participants : Professor (2002) (0)
- Requirements and Technology for Computer Security (2016) (0)
- Computer Security 1 (1997) (0)
- An on-line editor (2016) (0)
- 20 Software Components: Only The Giants Survive 1 (2004) (0)
- Character generator with high aufloesung (1977) (0)
- On reliable and extendible operating systems (2016) (0)
- Reflections on an Operating System Design 1 Reflections on an Operating System Design (1997) (0)
- A Systems Scheduling Philosophy for Multiprocessing (0)
- How to Build a Highly Available System Without a Toolkit (1995) (0)
- Procédé et dispositif de déchiffrage d'un paquet d'informations ayant un format sujet à des modifications (1991) (0)
- Some Remarks on a Large New Time-Sharing System (2016) (0)
- VOR: VAX on a RISC (2016) (0)
- Distribution-type configuration profile for calculating system (1991) (0)
- Oral history interview with Butler Lampson (2014) (0)
- A Conceptual Authorization Model for Web Services (2004) (0)
- Fault tolerant computer system with shadow virtual processor (1997) (0)
- Method and device for controlling traffic congestion in communication circuit network bridge device (1992) (0)
- 3. Information Systems Security Security Section of Executive Summary Goal: C4i Systems That Remain Operationally Secure and Available for U.s. Forces in the Face of Attacks by Adversaries (2000) (0)
- Teaching of computer design to computer science undergraduates. (2016) (0)
- A process for the status information coding (1991) (0)
- Gene McDaniel, Severo M. Ornstein: An Instruction Fetch Unit for a High-Performance Personal Conmputer (1984) (0)
- Computer security in distributed systems (1991) (0)
- Storage Allocation in Typed Languages (1977) (0)
- Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research (2006) (0)
- Device and method for cipher processing with optionally selective status encoding (1991) (0)
- Distributed transaction processing using a two-phase binding protocol with the expected binding without recording duty (1993) (0)
- Interactive machine-language programming (1965) (0)
- Understanding Network Connections (1995) (0)
- Packet receiver in a computer network and computer network with modified crypto keys between the computer and respective pairs process (1993) (0)
- An Overview of the CAL Time-Sharing System (2007) (0)
- Alto OS Design Notes (2016) (0)
- Multi-point data switching system (1975) (0)
- Protection and access control in operating systems (2016) (0)
- Psychological Investigations. By J. Ortega Y. Gasset. (Pp. 254; £14.95.) W.W.Norton: London. 1987.Actual Minds, Possible Worlds. By J. Bruner. (Pp. 200; £6.50 pb.) Harvard University Press: London. 1986 (1988) (0)
- Computer systems research (invited talk) (summary only): past and future (2000) (0)
- Operating R. Stockton Gaines Systems Editor Experience with Processes and Monitors in Mesa (1979) (0)
- What Computers Do: Model, Connect and Engage (2012) (0)
- Method and apparatus for congestion control of traffic in a bridge a communication network (1992) (0)
- Method and device for decoding a packet of information with a modifiable format (1991) (0)
- Current work on authentication (1986) (0)
This paper list is powered by the following services:
Other Resources About Butler Lampson
What Schools Are Affiliated With Butler Lampson?
Butler Lampson is affiliated with the following schools: