|
D. Razzell,
The Suitability of Tcl/Tk for Remote System Management,
Proc. Ninth Annual Tcl/Tk Conference
(Sep 2002)
|
| |
|
J. Allen,
Anatomy of LISP,
McGraw-Hill, 1978
|
|
P. Anderson,
"Towards a High Level Machine Configuration System,"
Proc. LISA 1994
(Sep 1994)
|
|
S. Bourne,
"The UNIX Shell,"
Bell System Technical Journal,
vol. 57, no. 6
(Jul 1978)
|
|
M. Burgess,
"Computer Immunology,"
Proc. LISA 1998
(Dec 1998)
|
|
M. Burgess, R. Ralston,
"Distributed Resource Administration Using Cfengine,"
Software - Practice and Experience,
vol. 27, no. 9
(Sep 1997)
|
|
J. Case, R. Mundy, D. Partain, B. Stewart,
Introduction to Version 3 of the
Internet-Standard Network Management Framework,
RFC 2570, The Internet Society
(Apr 1999)
|
|
S. DeSimone, C. Lombardi,
"Sysctl: A Distributed System Control Package,"
Proc. LISA 1993
(Nov 1993)
|
|
T. Dierks, C. Allen,
The TLS Protocol Version 1.0,
RFC 2246, The Internet Society
(Jan 1999)
|
|
W. Diffie, M. Hellman,
"New Directions in Cryptography,"
IEEE Trans. Inform. Theory,
vol. IT-22, no. 6
(Nov 1976)
|
|
R. Evard,
"An Analysis of UNIX System Configuration,"
Proc. LISA 1997
(Oct 1997)
|
|
R. Evard,
"Tenwen: The Re-Engineering Of A Computing Environment,"
Proc. LISA 1994
(Sep 1994)
|
|
J. Finke,
"Automation of Site Configuration Management,"
Proc. LISA 1997
(Oct 1997)
|
|
R. Finkel,
"Pulsar: An Extensible Tool for Monitoring Large Unix Sites,"
Software - Practice and Experience,
vol. 27, no. 10
(Oct 1997)
|
|
A. Frier, P. Karlton, P. Kocher,
The SSL Protocol Version 3.0,
Internet Draft, Netscape Communications
(Mar 1996)
|
|
J. Gosling, B. Joy, G. Steele, G. Bracha,
The Java Language Specification Second Edition,
Addison Wesley, 2000
|
|
R. Graham,
"Protection in an Information Processing Utility,"
CACM,
vol. 11, no. 5
(May 1968)
|
|
R. Greenblatt, T. Knight Jr., J. Holloway, D. Moon, D. Weinreb,
"The LISP Machine,"
Interactive Programming Environments,
McGraw-Hill, 1984
|
|
Hewlett Packard,
Managing Systems and Workgroups:
A Guide for HP-UX System Administrators,
B2355-90742
(Jun 2001)
|
|
Hewlett Packard,
Ignite-UX Administration Guide,
B2355-90749
(Mar 2002)
|
|
R. Housley, W. Ford, W. Polk, D. Solo,
Internet X.509 Public Key Infrastructure: Certificate and CRL Profile,
RFC 2459, The Internet Society
(Jan 1999)
|
|
IBM,
System Management Interface Tool,
(Nov 2000)
|
|
J. Levi, J. Shönwälder,
Definitions of Managed Objects for the Delegation of Management Scripts,
RFC 3165, The Internet Society
(Aug 2001)
|
|
D. Libes,
"Writing a Tcl Extension in only 7 Years,"
Proc. Fifth Annual Tcl/Tk Workshop
(Jul 1997)
|
|
M. Lutz,
Programming Python,
O'Reilly, 2001
|
|
J. McCarthy, P. Abrahams, D. Edwards, T. Hart, M. Levin,
LISP 1.5 Programmer's Manual,
MIT Press, 1962
|
|
T. Miller, C. Stirlen, E. Nemeth,
"satool: A System Administrator s Cockpit, An Implementation,"
Proc. LISA 1993
(Nov 1993)
|
|
E. Mitchell, E. Nelson, D. Hess,
"ND: A Comprehensive Network Administration and Analysis Tool,"
Proc. LISA 2000
(Dec 2000)
|
|
OpenSSH,
http://www.openssh.org/
|
|
OpenSSL,
http://www.openssl.org/
|
|
E. Organick,
The MULTICS System: An Examination of Its Structure,
MIT Press, 1972
|
|
J. Ousterhout,
Tcl and the Tk Toolkit,
Addison Wesley, 1994.
|
|
D. Peterson, M. Bishop, R. Pandey,
"A Flexible Containment Mechanism for Executing Untrusted Code,"
Proc. Eleventh USENIX Security Symposium
(Aug 2002)
|
|
C. Pierce,
"The Igor System Administration Tool,"
Proc. LISA 1996
(Sep 1996)
|
|
K. Ramm, M. Grubb,
"Exu - A System for Secure Delegation of Authority on an Insecure Network,"
Proc. LISA 1995
(Sep 1995)
|
|
D. Rather, D. Colburn, C. Moore,
"The Evolution of Forth,"
ACM SIGPLAN Notices,
vol. 28, no. 3
(Mar 1993)
|
|
R. Rivest, A. Shamir, L. Adelman,
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,"
CACM,
vol. 21, no. 2
(Feb 1978)
|
|
J. Rouillard, R. Martin,
"Config: A Mechanism for Installing and Tracking System Configurations,"
Proc. LISA 1994
(Sep 1994)
|
|
J. Shönwälder, H. Langendörfer,
"Tcl Extensions for Network Management Applications,"
Proc. Third Annual Tcl/Tk Workshop
(Jul 1995)
|
|
J. Shönwälder, H. Langendörfer,
"How to Keep Track of Your Network Configuration,"
Proc. LISA 1993
(Nov 1993)
|
|
Sun Microsystems,
Solaris 9 Installation Guide,
806-5205
(May 2002)
|
|
Symantec,
Symantec Ghost Implementation Guide,
07-30-00482
(Nov 2001)
|
|
W. Tichy,
"RCS - A System for Version Control,"
Software - Practice and Experience,
vol. 15, no. 7
(Jul 1985)
|
|
TLS extension for Tcl,
http://sourceforge.net/projects/tls/
|
|
S. Traugott, J. Huddleston,
"Bootstrapping an Infrastructure,"
Proc. LISA 1998
(Dec 1998)
|
|
E. Schumacher,
Small is Beautiful,
Harper & Row, 1973
|
|
L. Wall, T. Christiansen, J. Orwant,
Programming Perl,
O'Reilly, 2000
|
|
D. Wheeler,
More Than a Gigabuck: Estimating GNU/Linux's Size
|
|
C. Wright, C. Cowan, G. Kroah-Hartman, J. Morris, S. Smalley,
"Linux Security Modules: General Security Support for the Linux Kernel,"
Proc. Eleventh USENIX Security Symposium
(Aug 2002)
|
|
T. Ylönen,
"SSH - Secure Login Connections over the Internet,"
Proc. Sixth USENIX Security Symposium
(Jul 1996)
|