Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '99Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories Tse-Huong Choo
    USENIX Security '99Enforcing Well-Formed and Partially-Formed Transactions for UNIXDean Povey
    USENIX Security '99Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level SpecificationsR. Sekar, Prem UppuluriR. Sekar
    USENIX Security '99Building Intrusion-Tolerant ApplicationsThomas Wu, Michael Malkin, Dan Boneh
    USENIX Security '99Brute Force Attack on UNIX Passwords with SIMD ComputerGershon Kedem, Yuriko Ishihara
    USENIX Security '99Antigone: A Flexible Framework for Secure Group CommunicationPatrick McDaniel, Atul Prakash, Peter Honeyman
    USENIX Security '99A Secure Station for Network Monitoring and Control
    USENIX Security '99The Flask Security Architecture: System Support for Diverse Security PoliciesRay Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, Dave Andersen, Jay Lepreau
    USENIX Security '99A Study in Using Neural Networks for Anomaly and Misuse DetectionAnup K. Ghosh, Aaron Schwartzbard
    USENIX Security '99The Design of a Cryptographic Security ArchitecturePeter Gutmann
    USENIX Security '99Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0Alma Whitten, J. D. Tygar
    USENIX Security '99Jonah: Experience Implementing PKIX Reference FreewareMary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin
    USENIX Security '99Scalable Access Control for Distributed Object SystemsDaniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, E. John Sebes
    USENIX Security '99Certificate-based Access Control for Widely Distributed ResourcesMary R. Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, Abdelilah Essiari
    USENIX Security '99Digital-Ticket-Controlled Digital Ticket CirculationKo Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine
    LISA-NT '99Scalable, Remote Administration of Windows NTMichail Gomberg, Craig Stacey, Janet Sayrem
    LISA-NT '99A Network Machine Management SystemDave Roth
    LISA-NT '99State-Driven Software Installation for Windows NTMartin Sjolin
    LISA-NT '99NFS and SMB Data Sharing Within a Heterogeneous Environment: A Real World StudyAlan Epps, Dr. Glenn Bailey, Douglas Glatz
    LISA-NT '99Administering a Windows NT Domain Using a Non-Windows NT Primary Domain ControllerGerald Carter
    LISA-NT '99Radio Dial-in Connectivity to NT NetworksKenneth May
    LISA-NT '99NT Security in an Open Academic EnvironmentMatthew Campbell, Andrea Chan, Robert Cowles, Gregg Daly, Ernest Denys, Patrick Hancox, William Johnson, David Leung, Jeff Lwin
    LISA-NT '99Deployment of Microsoft Windows NT in a Design Engineering EnvironmentJason Sampson, Elwood Coslett, Bob Paauwe, Russ Craft, Gary Washington, Kevin Wheeler
    Windows NT 3rd SymposiumEfficient User-Level Thread Migration and Checkpointing on Windows NT ClustersHazim Abdel-Shafi, Evan Speight, John K. Bennett
    Windows NT 3rd SymposiumHigh-End Workstation Compute Farms Using Windows NTSrinivas Nimmagadda, Joshua LeVasseur, Rumi Zahir

Pages