Search results

    Centralized Security Policy Support for Virtual MachineLISA '06Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji
    A Platform for RFID Security and Privacy Administration LISA '06Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F.H. Hofman, Andrew S. Tannenbaum
    Open Source Software and Its Role in Space ExplorationLISA '06DJ Byrne
    Virtualization: The Good, the Bad, the UglyLISA '06Michael Baum
    Specification-Enhanced Policies for Automated Management of Changes in IT Systems LISA '06Chetan Shankar, Vanish Talwar, Subu Iyer, Yuan Chen, Dejan Milojicić, Roy Campbell
    Experience Implementing an IP Address Closure LISA '06Ning Wu, Alva Couch
    Modeling Next Generation Configuration Management Tools LISA '06Mark Burgess
    Everything You Know About Monitoring Is WrongLISA '06Mazda A. Marvasti
    Is Entropy Winning? Drowning in the Data TsunamiLISA '06Lee Damon, Evan Marcus
    Windows XP Kernel Crash Analysis LISA '06Archana Ganapathi, Viji Ganapathi, David Patterson
    SUEZ: A Distributed Safe Execution Environment for System Administration Trials LISA '06Doo San Sim, V.N. Venkatakrishnan
    WinResMon: A Tool for Discovering Software Dependencies, Configuration and Requirements in Microsoft Windows LISA '06Rajiv Ramnath, Sufatrio, Roland H. C. Yap, Wu Yongzheng
    Perfect Data in an Imperfect WorldLISA '06Daniel V. Klein
    QA and the System AdministratorLISA '06Adam Haberlach
    Privilege Messaging: An Authorization Framework over Email Infrastructure LISA '06Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack LISA '06Daniel V. Klein
    Teaching Problem Solving: You Can and You ShouldLISA '06Elizabeth Zwicky
    Sysadmins, Network Managers, and Wiretap LawLISA '06Alex Muentz
    Firewall Analysis with Policy-Based Host Classification LISA '06Robert Marmorstein, Phil Kearns
    Secure Mobile Code Execution Service LISA '06Lap-chung Lam, Yang Yu, Tzi-cker Chiueh
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs LISA '06Adam Slagell, Kiran Lakkaraju, Katherine Luo
    Site Reliability at Google/My First Year at GoogleLISA '06Tom Limoncelli
    Leveraging the IT CommunityLISA '06Patrick McGovern
    Bigtable: A Distributed Storage System for Structured DataOSDI '06Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber