Culture
Culture
Science and Technology
Home
Computers and Software
CITI
Other UM
There are plenty of basic ways to misuse and compromise kerberos,
starting with the obvious: ask for a kerberos password using an html
form. – Marcus Watts
Publications
My Erdős Number is four, via honey.
- Address Resolution Statistics
(IETF 81, Quebec City, July 2011)
- Doing More With Less: End-to-End Consistent IPv4 Address Sharing
(IFIP/IEEE International Symposium on Integrated Network Management, Dublin, Ireland, May 2011)
- Clouseau Evaluation for Peer-to-Peer Transfer Operations (CITI Tech Report 09-1)
- IP and ARP over ISO 7816 (Internet Draft)
- Improving AFS Performance via Selective Caching and Native ATM AAL5 (CITI Tech Report 01-3)
- Webcard: a Java Card web server (IFIP CARDIS 2000)
- Secure Distributed Virtual Conferencing: Multicast or Bust
(CMS 1999)
- SCFS: A UNIX Filesystem for Smartcards
(1st USENIX Smartcard Workshop)
- Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol (IFIP CARDIS 1998)
- Secure Videoconferencing
(7th USENIX Security Symposium)
- Guest Editor, Computing Systems, Fall 1995 issue on Mobile Computing.
- Joining Security Realms: A Single Login for Netware and Kerberos
(5th USENIX Security Symposium)
- The Little Work Project
(3rd Workshop on Workstation Operating Systems)
- Third-Party Authentication in the Institutional File System (CITI Tech Report 92-1)
- A Dynamically Extensible Streams Implementation
(Summer 1987 USENIX)
- An Extensible I/O System
(Summer 1986 USENIX)
- AT&T's RFS and Sun's NFS: A Comparison of Heterogeneous Distributed File Systems,
UNIX/World Magazine, December 1985 p. 38 (with Mark J. Hatch and Micheal Katz)
Press
Jim Rees