Sciweavers

3 search results - page 1 / 1
» Plan 9 authentication in Linux
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 4 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti

Publication
293views
13 years 10 months ago
Providing a Cloud Network Infrastructure on a Supercomputer
Supercomputers and clouds both strive to make a large number of computing cores available for computation. More recently, similar objectives such as low-power, manageability at sc...
J. Appavoo, V. Uhlig, A. Waterland, B. Rosenburg, ...
CHI
2009
ACM
14 years 5 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...