Search results

    LISA '96Many Mail Domains, One Machine: The Forwarding MailerHal Pomeranz
    LISA '96How to Get There From Here: Scaling the Enterprise-Wide Mail InfrastructureMichael Grubb
    LISA '96Automatic and Reliable Elimination of E-mail Loops Based on Statistical AnalysisE. Solana, V. Baggiolini, M. Ramluckun, J. Harms
    LISA '96Renumbering: Threat or MenaceEliot Lear, Diane Tharp, Jennifer Katinsky, Jeff Coffin
    LISA '96OC3MON: Flexible, Affordable, High Performance Staistics CollectionJoel Apisdorf, Rick Wilder, Kevin Thompson, k claffy (NLANR)
    LISA '96IP Multiplexing by Transparent Port-Address Translatorheon Y. Yeom, Jungsoo Ha, and Ilhwan Kim, Seoul National University
    LISA '96How to Avoid Learning Expect -or- Automating Automating Interactive ProgramsDon Libes
    LISA '96An LPD for the 90sMark Fletcher
    LISA '96RUST: Managing Problem Reports and To-Do ListsCraig Ruefenacht
    LISA '96Visualizing Huge Tracefiles with XscalAlva L. Couch
    LISA '96Using Visualization in System and Network AdministrationDoug Hughes
    LISA '96Shuse: Multi-Host Account AdministrationHenry Spencer
    LISA '96The Design and Implementation of a Network Account Management SystemJ. Archer Harris, Gregory Gingerich
    LISA '96UNIX Host Administration in a Hererogeneous Distributed Computing EnvironmentGregory S. Thomas, James O. Schroeder, Merrilee E. Orcutt, Desiree C. Johnson, Jeffrey T. Simmelink, John P. Moore
    LISA '96Priv: Secure and Flexible Privileged Access DisseminationBrian C. Hill
    LISA '96The Igor System Administration ToolClinton Pierce
    LISA '96Centralized Administration of Distributed FirewallsMark Miller, Joe Morris
    USENIX Security '96A Framework for Building an Electronic Currency SystemLei Tang
    USENIX Security '96Building Systems That Flexibly Download Executable ContentTrent Jaeger, Atul Prakash
    USENIX Security '96Public Key Distribution with Secure DNSJames M. Galvin
    USENIX Security '96Compliance Defects in Public Key CryptographyDon Davis
    USENIX Security '96Texas A&M University Anarchistic Key Authorization (AKA)David Safford, Douglas Schales, David Hess
    USENIX Security '96Murphy's Law and Computer SecurityWietse Venema
    USENIX Security '96NetKuang--A Multi-Host Configuration Vulnerability CheckerDan Zerkle, Karl Levitt
    USENIX Security '96Problem Areas for the IP Security Protocols