USENIX Mach III Symposium | Unix File Access and Caching in a Multicomputer Environment | Paul J. Roy |
USENIX Mach III Symposium | In-Kernel Servers on Mach 3.0: Implementation and Performance | Jay Lepreau, Mike Hibler, Bryan Ford, Jeffrey Law, Douglas Orr |
USENIX Mach III Symposium | Using the Mach Communication Primitives in X11 | Michael Ginsberg, Brian N. Bershad, Robert V. Baron |
USENIX Mach III Symposium | Using Continuations to Build a User-Level Threads Library | Randall Dean |
USENIX Mach III Symposium | Real Memory Mach | Philippe Bernadat, David Black |
USENIX Mach III Symposium | MIKE: A Distributed object-oriented programming platform on top of the Mach micro-kernel | Miguel Castro, Nuno Neves, Pedro Trancuso, Pedro Sousa |
USENIX Mach III Symposium | Sprite on Mach | Michael D. Kupfer |
USENIX Winter 1993 Conference | PhoneStation, Moving the Telephone onto the Virtual Desktop | Stephen A. Uhler |
USENIX Winter 1993 Conference | The BSD Packet Filter: A New Architecture for User-level Packet Capture | Steven McCanne, Van Jacobson |
USENIX Winter 1993 Conference | An Implementation of a Log-Structured File System for UNIX | Margo Seltzer, Keith Bostic, Marshall Kirk McKusick, Carl Staelin |
USENIX Winter 1993 Conference | The Nachos Instructional Operating System | Wayne A. Christopher, Steven J. Procter, Thomas E. Anderson |
UNIX Security '92 | The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers | Jörgen Bo Madsen |
UNIX Security '92 | Experiences of Internet Security in Italy | Alessandro Berni, Paolo Franchi, Joy Marino |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Restricting Network Access to System Daemons Under SunOS | William LeFebvre |
UNIX Security '92 | There Be Dragons | Steve Bellovin |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Network (In)Security Through IP Packet Filtering | D. Brent Chapman |
UNIX Security '92 | SOCKS | David Koblas, Michelle R. Koblas |
UNIX Security '92 | TCP Wrapper: Network Monitoring, Access Control, and Booby Traps | Wietse Venema |
UNIX Security '92 | Centralized System Monitoring with Swatch | Stephen E. Hansen, E. Todd Atkins |
UNIX Security '92 | Security Aspects of a UNIX PEM Implementation | James M. Galvin, David M. Balenson |
UNIX Security '92 | Introduction to the Shadow Password Suite | John F. Haugh II |
UNIX Security '92 | Giving Customers the Tools to Protect Themselves | Shabbir J. Safdar |
USENIX Summer 1992 Technical Conference | Implementing Lightweight Threads | D. Stein, D. Shah |