USENIX Security '99 | Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories | Tse-Huong Choo |
USENIX Security '99 | Enforcing Well-Formed and Partially-Formed Transactions for UNIX | Dean Povey |
USENIX Security '99 | Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications | R. Sekar, Prem UppuluriR. Sekar |
USENIX Security '99 | Building Intrusion-Tolerant Applications | Thomas Wu, Michael Malkin, Dan Boneh |
USENIX Security '99 | Brute Force Attack on UNIX Passwords with SIMD Computer | Gershon Kedem, Yuriko Ishihara |
USENIX Security '99 | Antigone: A Flexible Framework for Secure Group Communication | Patrick McDaniel, Atul Prakash, Peter Honeyman |
USENIX Security '99 | A Secure Station for Network Monitoring and Control | |
USENIX Security '99 | The Flask Security Architecture: System Support for Diverse Security Policies | Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, Dave Andersen, Jay Lepreau |
USENIX Security '99 | A Study in Using Neural Networks for Anomaly and Misuse Detection | Anup K. Ghosh, Aaron Schwartzbard |
USENIX Security '99 | The Design of a Cryptographic Security Architecture | Peter Gutmann |
USENIX Security '99 | Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 | Alma Whitten, J. D. Tygar |
USENIX Security '99 | Jonah: Experience Implementing PKIX Reference Freeware | Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin |
USENIX Security '99 | Scalable Access Control for Distributed Object Systems | Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, E. John Sebes |
USENIX Security '99 | Certificate-based Access Control for Widely Distributed Resources | Mary R. Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, Abdelilah Essiari |
USENIX Security '99 | Digital-Ticket-Controlled Digital Ticket Circulation | Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine |
LISA-NT '99 | Scalable, Remote Administration of Windows NT | Michail Gomberg, Craig Stacey, Janet Sayrem |
LISA-NT '99 | A Network Machine Management System | Dave Roth |
LISA-NT '99 | State-Driven Software Installation for Windows NT | Martin Sjolin |
LISA-NT '99 | NFS and SMB Data Sharing Within a Heterogeneous Environment: A Real World Study | Alan Epps, Dr. Glenn Bailey, Douglas Glatz |
LISA-NT '99 | Administering a Windows NT Domain Using a Non-Windows NT Primary Domain Controller | Gerald Carter |
LISA-NT '99 | Radio Dial-in Connectivity to NT Networks | Kenneth May |
LISA-NT '99 | NT Security in an Open Academic Environment | Matthew Campbell, Andrea Chan, Robert Cowles, Gregg Daly, Ernest Denys, Patrick Hancox, William Johnson, David Leung, Jeff Lwin |
LISA-NT '99 | Deployment of Microsoft Windows NT in a Design Engineering Environment | Jason Sampson, Elwood Coslett, Bob Paauwe, Russ Craft, Gary Washington, Kevin Wheeler |
Windows NT 3rd Symposium | Efficient User-Level Thread Migration and Checkpointing on Windows NT Clusters | Hazim Abdel-Shafi, Evan Speight, John K. Bennett |
Windows NT 3rd Symposium | High-End Workstation Compute Farms Using Windows NT | Srinivas Nimmagadda, Joshua LeVasseur, Rumi Zahir |