


default search action
USENIX Summer 1992 Technical Conference
- USENIX Summer 1992 Technical Conference, San Antonio, TX, USA, June 8-12, 1992. USENIX Association 1992

- John F. Haugh II:

Introduction to the Shadow Password Suite. - Shabbir J. Safdar:

Giving Customers the Tools to Protect Themselves. - James da Silva, Ólafur Gudmundsson, Daniel Mossé:

Performance of a Parallel Network Backup Manager. - Steven R. Snapp, Stephen E. Smaha, Daniel M. Teal, Tim Grance:

The DIDS (Distributed Intrusion Detection System) Prototype. - Charles Salemi, Suryakanta Shah, Eric Lund:

A Privilege Mechanism for UNIX System V Release 4 Operating Systems. - Henry Spencer, Geoff Collyer:

#ifdef Considered Harmful, or Portability Experience with C News. - Kiem-Phong Vo, Yih-Farn Chen:

Incl: A Tool to Analyze Include Files. - David M. Tilbrook, Russell Crook:

Large Scale Porting through Parameterization. - David P. Anderson, Yoshitomo Osawa, Ramesh Govindan:

The Continuous Media File System. - Jean-Philippe Baud, Christian Boissat, Fabrizio Cane, Frederic Hemmer, Erik Jagel, Ashok Kumar, Gordon Lee, Bernd Panzer-Steindel, Les Robertson, Ben Segal, Antoine Trannoy, Igor Zacharov:

Mainframe Services from Gigabit-Networked Workstations. - Anupam Bhide, Spencer Shepler:

A Highly Available Lock Manager for HA-NFS. - Doug Moen:

A Discipline of Error Handling. - Don Libes:

Regression Testing and Conformance Testing Interactive Programs. - Paul Maybee:

NeD: The Network Extensible Debugger. - James Franklin:

Tiled Virtual Memory for UNIX. - Ramesh Balan, Kurt D. Gollhardt:

A Scalable Implementation of Virtual Memory HAT Layer for Shared Memory Multiprocessor Machines. - Rita Pascale, Jeremy Epstein:

Virtual Window Systems: A New Approach to Supporting Concurrent Heterogeneous Windowing Systems. - Barry J. Brachman, Gerald W. Neufeld:

TDBM: A DBM Library with Atomic Transactions. - Kevin Brook Long, Jerry Fowler, Stan Barber:

VNS Retriever: Querying MEDLINE over the Internet. - Rich Salz:

InterNetNews: Usenet Transport for Internet Sites. - Mary Baker, Mark Sullivan:

The Recovery Box: Using Fast Recovery to Provide High Availability in the UNIX Environment. - Thuan Q. Pham, Pankaj K. Garg:

On Migrating a Distributed Application to a Multi-Threaded Environment. - William L. Moran Jr., Farnam Jahanian:

Cheap Mutual Exclusion. - Dan Stein, Devang Shah:

Implementing Lightweight Threads. - Joseph R. Eykholt, Steve R. Kleiman, Steve Barton, Roger Faulkner, Anil Shivalingiah, Mark Smith, Jim Voll, Mary Weeks, Dock Williams:

Beyond Multiprocessing: Multithreading the SunOS Kernel. - J. Kent Peacock:

File System Multithreading in System V Release 4 MP. - Stuart I. Feldman:

Covers and Frontmatter. - Steven M. Bellovin:

There Be Dragons. - Jörgen Bo Madsen:

The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers. - Alessandro Berni, Paolo Franchi, Joy Marino:

Experiences of Internet Security in Italy. - Herve Schauer, Christophe Wolfhugel:

An Internet Gatekeeper. - D. Brent Chapman:

Network (In)Security Through IP Packet Filtering. - David Koblas, Michelle R. Koblas:

SOCKS. - Wietse Z. Venema:

TCP Wrapper: Network Monitoring, Access Control, and Booby Traps. - Stephen E. Hansen, E. Todd Atkins:

Centralized System Monitoring with Swatch. - James M. Galvin, David M. Balenson:

Security Aspects of a UNIX PEM Implementation.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














