Authentication on untrusted remote hosts with public-key sudo

  • Authors:
  • Matthew Burnside;Mack Lu;Angelos D. Keromytis

  • Affiliations:
  • Columbia University;Columbia University;Columbia University

  • Venue:
  • LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they use that differ from those of regular computer users. This paper presents ...