Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX ATC '03The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0Robert Watson, Wayne Morrison, Chris Vance, Brian Feldman
    USENIX ATC '03Robust, Portable I/O Scheduling with the Disk MimicFlorentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    USENIX ATC '03Controlling Your PLACE in the File System with Gray-box TechniquesJames A. Nugent
    USENIX ATC '03Operating System I/O Speculation: How Two Invocations Are Faster Than OneKeir Fraser, Fay Chang
    USENIX ATC '03Using Read-Copy-Update Techniques for System V IPC in the Linux 2.5 KernelAndrea Arcangeli, Mingming Cao, Paul McKenney, Dipankar Sarma
    USENIX ATC '03An Implementation of User-level Restartable Atomic Sequences on the NetBSD Operating SystemGregory McGarry
    USENIX ATC '03Providing a Linux API on the Scalable K42 KernelDavid Edelsohn
    USENIX Security '00MAPbox: Using Parameterized Behavior Classes to Confine Untrusted ApplicationsAnurag Acharya, Mandar Raje
    USENIX Security '00A Secure Java Virtual MachineLeendert van Doorn
    USENIX Security '00Encrypting Virtual MemoryNiels Provos
    USENIX Security '00Deja Vu--A User Study: Using Images for AuthenticationRachna Dhamija, Adrian Perrig
    USENIX Security '00Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing SystemMarc Waldman, Aviel D. Rubin, Lorrie F. Cranor
    USENIX Security '00Probabilistic Counting of Large Digital Signature CollectionsMarkus G. Kuhn
    USENIX Security '00Can Pseudonymity Really Guarantee Privacy?Josyula R. Rao, Pankaj Rohatgi
    USENIX Security '00An Open-Source Cryptographic CoprocessorPeter Gutmann
    USENIX Security '00Secure Coprocessor Integration with Kerberos V5Naomaru Itoi
    USENIX Security '00Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine MonitorJohn Scott Robin, Cynthia E. Irvine
    USENIX Security '00Detecting and Countering System Intrusions Using Software WrappersCalvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv
    USENIX Security '00Detecting BackdoorsYin Zhang, Vern Paxson
    USENIX Security '00Detecting Stepping Stones
    USENIX Security '00Automated Response Using System-Call DelayAnil Somayaji, Stephanie Forrest
    USENIX Security '00CenterTrack: An IP Overlay Network for Tracking DoS FloodsRobert Stone
    USENIX Security '00A Multi-Layer IPSEC ProtocolYongguang Zhang, Bikramjit Singh
    USENIX Security '00Defeating TCP/IP Stack FingerprintingMatthew Smart, G. Robert Malan, Farnam Jahanian
    USENIX Security '00A Chosen Ciphertext Attack Against Several E-Mail Encryption ProtocolsJonathan Katz, Bruce Schneier

    Pages