Papers

Search results

    ConferenceTitleAuthor(s)
    COOTS '95Simple Activation for Distributed ObjectsAnn Wollrath, Geoff Wyant, Jim Waldo
    COOTS '95Dynamic Insertion of Object ServicesAjay Mohindra, Murthy Devarakonda, George Copeland
    COOTS '95Object-Oriented Components for High-speed Network ProgrammingDouglas C. Schmidt, Tim Harrison
    COOTS '95Program Explorer: A Program Visualizer for C++Danny B. Lange, Yuichi Nakamura
    COOTS '95Configuration Management in an Object-Oriented DatabaseMick Jordan, Michael Van DeVanter
    COOTS '95Debugging Storage Management Problems in Garbage-Collected EnvironmentsDave Detlefs, Bill Kaslow
    5th USENIX UNIX Security SymposiumFile-Based Network Collaboration SystemMasao Murota, Toshinari Takahashi, Atsushi Shimbo
    5th USENIX UNIX Security SymposiumSafe Use of X Window System Protocol Across a Firewall Brian L. Kahn
    5th USENIX UNIX Security SymposiumAn Architecture for Advanced Packet Filtering and Access PolicyAndrew Molitor
    5th USENIX UNIX Security SymposiumA Domain and Type Enforcement UNIX PrototypeLee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat
    5th USENIX UNIX Security SymposiumProviding Policy Control Over Object Operations in a Mach-Based SystemSpencer E. Minear
    5th USENIX UNIX Security SymposiumJoining Security Realms: A Single Login for NetWare and KerberosWilliam A. Adamson, Jim Rees, Peter Honeyman
    5th USENIX UNIX Security SymposiumIndependent One-Time Passwords Aviel D. Rubin
    5th USENIX UNIX Security SymposiumOne-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong AuthenticationDaniel L. McDonald, Randall J. Atkinson, Craig Metz, Kaman Sciences Corporation
    5th USENIX UNIX Security SymposiumImproving the Trustworthiness of Evidence Derived from Security Trace FilesEnnio Pozzetti, Vidar Vetland
    5th USENIX UNIX Security SymposiumUsing the Domain Name System for System Break-ins Steven M. Bellovin
    5th USENIX UNIX Security SymposiumDNS and BIND Security IssuesPaul A. Vixie
    5th USENIX UNIX Security SymposiumMIME Object Security Services: Issues in a Multi-User EnvironmentJames M. Galvin, Mark S. Feldman
    5th USENIX UNIX Security SymposiumInformation Security Technology? Don't Rely on It. A Case Study in Social EngineeringIra S. Winkler, Brian Dealy
    5th USENIX UNIX Security SymposiumA Simple Active Attack Against TCPLaurent Joncheray
    5th USENIX UNIX Security SymposiumWAN-hacking with AutoHack: Auditing Security Behind the Firewall Alec Muffet
    5th USENIX UNIX Security SymposiumKerberos Security with Clocks AdriftDon Davis, Daniel E. Geer
    5th USENIX UNIX Security SymposiumDesign and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIXPau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    5th USENIX UNIX Security SymposiumNetwork Randomization Protocol: A Proactive Pseudo-Random GeneratorChee-Seng Chow
    5th USENIX UNIX Security SymposiumImplementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer ProtocolGene H. Kim, Hilarie Orman, Sean O'Malley

Pages