You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    QA and the System AdministratorLISA '06Adam Haberlach
    Specification-Enhanced Policies for Automated Management of Changes in IT Systems LISA '06Chetan Shankar, Vanish Talwar, Subu Iyer, Yuan Chen, Dejan Milojicić, Roy Campbell
    Experience Implementing an IP Address Closure LISA '06Ning Wu, Alva Couch
    Modeling Next Generation Configuration Management Tools LISA '06Mark Burgess
    Everything You Know About Monitoring Is WrongLISA '06Mazda A. Marvasti
    Is Entropy Winning? Drowning in the Data TsunamiLISA '06Lee Damon, Evan Marcus
    Centralized Security Policy Support for Virtual MachineLISA '06Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji
    A Platform for RFID Security and Privacy Administration LISA '06Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F.H. Hofman, Andrew S. Tannenbaum
    Open Source Software and Its Role in Space ExplorationLISA '06DJ Byrne
    Virtualization: The Good, the Bad, the UglyLISA '06Michael Baum
    Firewall Analysis with Policy-Based Host Classification LISA '06Robert Marmorstein, Phil Kearns
    Secure Mobile Code Execution Service LISA '06Lap-chung Lam, Yang Yu, Tzi-cker Chiueh
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs LISA '06Adam Slagell, Kiran Lakkaraju, Katherine Luo
    Site Reliability at Google/My First Year at GoogleLISA '06Tom Limoncelli
    Leveraging the IT CommunityLISA '06Patrick McGovern
    Privilege Messaging: An Authorization Framework over Email Infrastructure LISA '06Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack LISA '06Daniel V. Klein
    Teaching Problem Solving: You Can and You ShouldLISA '06Elizabeth Zwicky
    Sysadmins, Network Managers, and Wiretap LawLISA '06Alex Muentz
    Bigtable: A Distributed Storage System for Structured DataOSDI '06Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's BatteryUSENIX Security '06Radmilo Racic, Denys Ma, Hao Chen
    Applying Machine-model Based Countermeasure Design to Improve Protection Against Code Injection Attacks USENIX Security '06Yves Younan, Frank Piessens, Wouter Joosen
    Building a Trusted Network Connect Evaluation Test BedUSENIX Security '06Jesus Molina
    The SAAM Project at UBCUSENIX Security '06Jason Crampton, Wing Leung