Protocol service decomposition for high-performance networking
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
CERT incident response and the Internet
Communications of the ACM
The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Take Command: Finding Files and More
Linux Journal
Frigate: A User-Extensible OO File System
IEEE Concurrency
Computer
CHAOS: An Active Security Mediation System
CAiSE '00 Proceedings of the 12th International Conference on Advanced Information Systems Engineering
ISC '01 Proceedings of the 4th International Conference on Information Security
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network
IEEE Transactions on Knowledge and Data Engineering
IBM Systems Journal - End-to-end security
LISA '93 Proceedings of the 7th USENIX conference on System administration
Role-based System Administration or Who, What, Where, and How
LISA '93 Proceedings of the 7th USENIX conference on System administration
Handling Passwords with Security and Reliability in Background Processes
LISA '94 Proceedings of the 8th USENIX conference on System administration
Security Administration in an Open Networking Environment
LISA '95 Proceedings of the 9th USENIX conference on System administration
The Design and Implementation of a Network Account Management System
LISA '96 Proceedings of the 10th USENIX conference on System administration
Secure public internet access handler (SPINACH)
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Confining root programs with domain and type enforcement (DTE)
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Improving the trustworthiness of evidence derived from security trace files
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Frigate: an object-oriented file system for ordinary users
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
Evolving event-driven programs
GECCO '96 Proceedings of the 1st annual conference on Genetic and evolutionary computation
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
Hi-index | 0.02 |