Starfish Systems
information security by design
(604) 916-7871
Services Software Community About Us
D. Razzell, The Suitability of Tcl/Tk for Remote System Management, Proc. Ninth Annual Tcl/Tk Conference (Sep 2002)
J. Allen, Anatomy of LISP, McGraw-Hill, 1978
P. Anderson, "Towards a High Level Machine Configuration System," Proc. LISA 1994 (Sep 1994)
S. Bourne, "The UNIX Shell," Bell System Technical Journal, vol. 57, no. 6 (Jul 1978)
M. Burgess, "Computer Immunology," Proc. LISA 1998 (Dec 1998)
M. Burgess, R. Ralston, "Distributed Resource Administration Using Cfengine," Software - Practice and Experience, vol. 27, no. 9 (Sep 1997)
J. Case, R. Mundy, D. Partain, B. Stewart, Introduction to Version 3 of the Internet-Standard Network Management Framework, RFC 2570, The Internet Society (Apr 1999)
S. DeSimone, C. Lombardi, "Sysctl: A Distributed System Control Package," Proc. LISA 1993 (Nov 1993)
T. Dierks, C. Allen, The TLS Protocol Version 1.0, RFC 2246, The Internet Society (Jan 1999)
W. Diffie, M. Hellman, "New Directions in Cryptography," IEEE Trans. Inform. Theory, vol. IT-22, no. 6 (Nov 1976)
R. Evard, "An Analysis of UNIX System Configuration," Proc. LISA 1997 (Oct 1997)
R. Evard, "Tenwen: The Re-Engineering Of A Computing Environment," Proc. LISA 1994 (Sep 1994)
J. Finke, "Automation of Site Configuration Management," Proc. LISA 1997 (Oct 1997)
R. Finkel, "Pulsar: An Extensible Tool for Monitoring Large Unix Sites," Software - Practice and Experience, vol. 27, no. 10 (Oct 1997)
A. Frier, P. Karlton, P. Kocher, The SSL Protocol Version 3.0, Internet Draft, Netscape Communications (Mar 1996)
J. Gosling, B. Joy, G. Steele, G. Bracha, The Java Language Specification Second Edition, Addison Wesley, 2000
R. Graham, "Protection in an Information Processing Utility," CACM, vol. 11, no. 5 (May 1968)
R. Greenblatt, T. Knight Jr., J. Holloway, D. Moon, D. Weinreb, "The LISP Machine," Interactive Programming Environments, McGraw-Hill, 1984
Hewlett Packard, Managing Systems and Workgroups: A Guide for HP-UX System Administrators, B2355-90742 (Jun 2001)
Hewlett Packard, Ignite-UX Administration Guide, B2355-90749 (Mar 2002)
R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure: Certificate and CRL Profile, RFC 2459, The Internet Society (Jan 1999)
IBM, System Management Interface Tool, (Nov 2000)
J. Levi, J. Shönwälder, Definitions of Managed Objects for the Delegation of Management Scripts, RFC 3165, The Internet Society (Aug 2001)
D. Libes, "Writing a Tcl Extension in only 7 Years," Proc. Fifth Annual Tcl/Tk Workshop (Jul 1997)
M. Lutz, Programming Python, O'Reilly, 2001
J. McCarthy, P. Abrahams, D. Edwards, T. Hart, M. Levin, LISP 1.5 Programmer's Manual, MIT Press, 1962
T. Miller, C. Stirlen, E. Nemeth, "satool: A System Administrator s Cockpit, An Implementation," Proc. LISA 1993 (Nov 1993)
E. Mitchell, E. Nelson, D. Hess, "ND: A Comprehensive Network Administration and Analysis Tool," Proc. LISA 2000 (Dec 2000)
E. Organick, The MULTICS System: An Examination of Its Structure, MIT Press, 1972
J. Ousterhout, Tcl and the Tk Toolkit, Addison Wesley, 1994.
D. Peterson, M. Bishop, R. Pandey, "A Flexible Containment Mechanism for Executing Untrusted Code," Proc. Eleventh USENIX Security Symposium (Aug 2002)
C. Pierce, "The Igor System Administration Tool," Proc. LISA 1996 (Sep 1996)
K. Ramm, M. Grubb, "Exu - A System for Secure Delegation of Authority on an Insecure Network," Proc. LISA 1995 (Sep 1995)
D. Rather, D. Colburn, C. Moore, "The Evolution of Forth," ACM SIGPLAN Notices, vol. 28, no. 3 (Mar 1993)
R. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," CACM, vol. 21, no. 2 (Feb 1978)
J. Rouillard, R. Martin, "Config: A Mechanism for Installing and Tracking System Configurations," Proc. LISA 1994 (Sep 1994)
J. Shönwälder, H. Langendörfer, "Tcl Extensions for Network Management Applications," Proc. Third Annual Tcl/Tk Workshop (Jul 1995)
J. Shönwälder, H. Langendörfer, "How to Keep Track of Your Network Configuration," Proc. LISA 1993 (Nov 1993)
Sun Microsystems, Solaris 9 Installation Guide, 806-5205 (May 2002)
Symantec, Symantec Ghost Implementation Guide, 07-30-00482 (Nov 2001)
W. Tichy, "RCS - A System for Version Control," Software - Practice and Experience, vol. 15, no. 7 (Jul 1985)
TLS extension for Tcl,
S. Traugott, J. Huddleston, "Bootstrapping an Infrastructure," Proc. LISA 1998 (Dec 1998)
E. Schumacher, Small is Beautiful, Harper & Row, 1973
L. Wall, T. Christiansen, J. Orwant, Programming Perl, O'Reilly, 2000
D. Wheeler, More Than a Gigabuck: Estimating GNU/Linux's Size
C. Wright, C. Cowan, G. Kroah-Hartman, J. Morris, S. Smalley, "Linux Security Modules: General Security Support for the Linux Kernel," Proc. Eleventh USENIX Security Symposium (Aug 2002)
T. Ylönen, "SSH - Secure Login Connections over the Internet," Proc. Sixth USENIX Security Symposium (Jul 1996)