LISA '96 | The Brave Little Toaster Meets Usenet | Karl L. Swartz |
LISA '96 | A Simple Caching File System for Application Serving | John D. Bell, Ford Motor Co. |
LISA '96 | Automating the Administration of Heterogeneous LANs | Michael Fisk |
LISA '96 | PC Administration Tools: Using Linux to Manage Personal Computers | Jim Trocki |
LISA '96 | Abstract Yourself With Modules | John L. Furlani, Peter W. Osel |
LISA '96 | SLINK: Simple, Effective Filesystem Maintenance Abstractions for Community-Based Administration | Alva L. Couch |
LISA '96 | Managing and Distributing Application Software | Ph. Defert, M. Goossens, O. Le Moigne, A. Peyrat, I. Reguero, E. Fernandez |
LISA '96 | A New Twist on Teaching System Administration | Raven Tompkins |
LISA '96 | Institute White Pages as a System Administration Problem | Jon Finke |
LISA '96 | New Fangled Phone Systems Pose New Challenges for System Administrators | Snoopy |
USENIX Security '96 | A Secure Environment for Untrusted Helper Applications | Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer |
USENIX Security '96 | Confining Root Programs with Domain and Type Enforcement | Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp |
USENIX Security '96 | Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks | Barry Jaspan |
USENIX Security '96 | A Revocable Backup System | Dan Boneh, Richard J. Lipton |
USENIX Security '96 | A Framework for Building an Electronic Currency System | Lei Tang |
USENIX Security '96 | Chrg-http: A Tool for Micropayments on the World Wide Web | Lei Tang, Steve Low |
USENIX Security '96 | Building Systems That Flexibly Download Executable Content | Trent Jaeger, Atul Prakash, Avi Rubin |
USENIX Security '96 | Public Key Distribution with Secure DNS | James M. Galvin |
USENIX Security '96 | Compliance Defects in Public Key Cryptography | Don Davis |
USENIX Security '96 | Texas A&M University Anarchistic Key Authorization (AKA) | David Safford, Douglas Schales, David Hess |
USENIX Security '96 | Murphy's Law and Computer Security | Wietse Venema |
USENIX Security '96 | NetKuang--A Multi-Host Configuration Vulnerability Checker | Dan Zerkle, Karl Levitt |
USENIX Security '96 | Problem Areas for the IP Security Protocols | Steve Bellovin |
Fourth Annual USENIX Tcl/Tk Workshop | Agent Tcl: A Flexible and Secure Mobile-Agent System | Robert S. Gray |
Fourth Annual USENIX Tcl/Tk Workshop | QuaSR: A Large-Scale Automated, Distributed Testing Environment | Steven Grady, G. S. Madhusudan, Marc Sugiyama |