CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Unified login with pluggable authentication modules (PAM)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
The use of name spaces in plan 9
EW 5 Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
REX: secure, extensible remote execution
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Design of the EROS trusted window system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Plan 9 authentication in Linux
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
NetAuth: supporting user-based network services
SS'08 Proceedings of the 17th conference on Security symposium
Practical uses of virtual machines for protection of sensitive user data
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
An SSH-based toolkit for user-based network services
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Integrative security management for web-based enterprise applications
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
Bell Labs Technical Journal
Enhancing the OS against security threats in system administration
Proceedings of the 13th International Middleware Conference
Hi-index | 0.00 |