[3381] in Kerberos
Re: supposition in kerberization
daemon@ATHENA.MIT.EDU (Jonathan I. Kamens)
Sun Jun 5 17:37:19 1994
To: kerberos@MIT.EDU
Date: 05 Jun 1994 21:16:04 GMT
From: jik@cam.ov.com (Jonathan I. Kamens)
In article <2sd9of$r5h@pad-thai.aktis.com> jik@cam.ov.com (Jonathan I. Kamens) writes:
Kamens, Jonathan, "Retrofitting network security to third-party applications
--- the SecureBase experience". Proceedings of the UNIX Security Symposium
IV, Santa Clara, California, 1993.
A number of people have sent me E-mail asking where this paper is
available on-line. I'm sorry for not responding sooner.... I'm out of
town right now and I'm not exactly logging in and checking my E-mail
every day.
I've put a compressed PostScript file containing the paper up for
anonymous FTP on remote.cam.ov.com in /pub/users/jik/secpaper.PS.Z.
Jonathan Kamens | OpenVision Technologies, Inc. | jik@cam.ov.com