-
1
-
-
85029688731
-
Transis: A communication sub-system for high availability
-
July
-
Y. Amir, D. Dolev, S. Kramer, and D. Malki. Transis: A communication sub-system for high availability. In Proceedings of the 22nd International Symposium on Fault-Tolerant Computing, pages 76-84, July 1992.
-
(1992)
Proceedings of the 22nd International Symposium on Fault-Tolerant Computing
, pp. 76-84
-
-
Amir, Y.1
Dolev, D.2
Kramer, S.3
Malki, D.4
-
2
-
-
4243503866
-
-
Technical Report TISR #0757, TIS Labs at Network Associates, Inc., February
-
D. M. Balenson, D. K. Branstad, P. Dinsmore, M. Heyman, and C. Scace. Dynamic cryptographic context management (DCCM) report 3: Cryptographic context negotiation protocol. Technical Report TISR #0757, TIS Labs at Network Associates, Inc., February 1999.
-
(1999)
Dynamic cryptographic context management (DCCM) report 3: Cryptographic context negotiation protocol
-
-
Balenson, D. M.1
Branstad, D. K.2
Dinsmore, P.3
Heyman, M.4
Scace, C.5
-
5
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
Oakland, CA, May
-
L. Badger, D. Sterne, D. Sherman, K. Walker, and S. Haghighat. Practical domain and type enforcement for UNIX. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 66-77, Oakland, CA, May 1995.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.2
Sherman, D.3
Walker, K.4
Haghighat, S.5
-
7
-
-
0004136464
-
-
Ph.D. dissertation. Cornell University, Ithica, New York. Available as technical report TR98-1662
-
M. Hayden. The Ensemble System. Ph.D. dissertation. Cornell University, Ithica, New York. Available as technical report TR98-1662, 1998.
-
(1998)
The Ensemble System
-
-
Hayden, M.1
-
8
-
-
84969377247
-
User authentication and authorization in the Java platform
-
Phoenix, AZ, December
-
C. Lai, L. Gong, L. Koved, A. Nadalin, and R. Schemers. User authentication and authorization in the Java platform. To appear in Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix, AZ, December 1999.
-
(1999)
To appear in Proceedings of the 15th Annual Computer Security Applications Conference
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.4
Schemers, R.5
-
9
-
-
84961736396
-
-
Technical Report NAI #0768, NAI Labs at Network Associates, Inc., June
-
G. Lamperillo. Architecture and concepts of the MPOG. Technical Report NAI #0768, NAI Labs at Network Associates, Inc., June 1999.
-
(1999)
Architecture and concepts of the MPOG
-
-
Lamperillo, G.1
-
10
-
-
34248514514
-
Learn system-level win 32 coding Techniques by writing an API spy program
-
M. Pietrek. Learn system-level win 32 coding Techniques by writing an API spy program. In Microsoft Systems Journal, vol. 9, no. 12, pages 17-44, 1994.
-
(1994)
Microsoft Systems Journal
, vol.9
, Issue.12
, pp. 17-44
-
-
Pietrek, M.1
-
12
-
-
12444316446
-
-
Technical Report #TR-98-68, Sun Microsystems, Inc., September
-
P. Rosenzweig, M. Kadansky, and S. Hanna. The Java reliable multicast service: a reliable multicast library. Technical Report #TR-98-68, Sun Microsystems, Inc., September 1998.
-
(1998)
The Java reliable multicast service: a reliable multicast library
-
-
Rosenzweig, P.1
Kadansky, M.2
Hanna, S.3
-
14
-
-
85084163300
-
Scalable access control for distributed object systems
-
August
-
D. Sterne, G. Tally, D. McDonnell, P. Pasturel, D. Sames, D. Sherman, and E.J. Sebes. Scalable access control for distributed object systems. In Proceedings of the 8th USENIX Security Symposium, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Sterne, D.1
Tally, G.2
McDonnell, D.3
Pasturel, P.4
Sames, D.5
Sherman, D.6
Sebes, E.J.7
|