LISA '97 | A Large-Scale Data Warehouse Application Case Study | Dan Pollack |
LISA '97 | SHUSE at Two | Henry Spencer |
LISA '97 | A Web-Based Backup/Restore Method for Intel-Based PCs | Tyler Barnett, Kyle McPeek, Larry S. Lile, Ray Hyatt, Jr. |
LISA '97 | Managing PC Operating Systems With A Revision Control System | Gottfried Rudorfer |
LISA '97 | BAL: A Tool to Synchronize Document Collections Between Computers | Juergen Christoffel |
LISA '97 | Increased Server Availibility Through Failover Capability | Michael R. Barber |
LISA '97 | The Cyclic News Filesystem: Getting INN To Do More With Less | Scott Lystig Fritchie |
LISA '97 | Adaptive Locks for Frequently Scheduled Tasks With Unpredictable Runtimes | Mark Burgess, Demosthenes Skipitaris |
LISA '97 | Creating the Network for Lucent Bell Labs Research | Tom Limoncelli, Thomas Reingold, Ravi Narayan, Ralph Loura |
LISA '97 | Pinpointing System Performance Issues | Douglas L. Urner |
LISA '97 | Chaos Out of Order: A Simple, Scalable File Distribution Facility For 'Intentionally Heterogeneous' Networks | Alva Couch |
LISA '97 | An Analysis of UNIX System Configuration | Remy Evard |
LISA '97 | Tuning Sendmail for Large Mailing Lists | Rob Kolstad |
LISA '97 | Selectively Rejecting Spam Using Sendmail check_Rulesets | Robert Harker |
LISA '97 | A Better Email Bouncer | Rich Holland |
USENIX Security '96 | A Secure Environment for Untrusted Helper Applications | Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer |
USENIX Security '96 | Confining Root Programs with Domain and Type Enforcement | Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp |
USENIX Security '96 | Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks | Barry Jaspan |
USENIX Security '96 | A Revocable Backup System | Dan Boneh, Richard J. Lipton |
USENIX Security '96 | A Framework for Building an Electronic Currency System | Lei Tang |
USENIX Security '96 | Chrg-http: A Tool for Micropayments on the World Wide Web | Lei Tang, Steve Low |
USENIX Security '96 | Building Systems That Flexibly Download Executable Content | Trent Jaeger, Atul Prakash, Avi Rubin |
USENIX Security '96 | Public Key Distribution with Secure DNS | James M. Galvin |
USENIX Security '96 | Compliance Defects in Public Key Cryptography | Don Davis |
USENIX Security '96 | Texas A&M University Anarchistic Key Authorization (AKA) | David Safford, Douglas Schales, David Hess |