Search results

    What Do You Mean, Identity 2.0?LISA '06Cat Okita
    NAF: The NetSA Aggregated Flow Tool Suite LISA '06Brian Trammell, Carrie Gates
    Interactive Network Management Visualization with SVG and AJAX LISA '06Athanasios Douitsis, Dimitrios Kalogeras
    Bridging the Host-Network Divide: Survey, Taxonomy, and Solution LISA '06Glenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North
    The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of PrivacyLISA '06Danny O'Brien
    Command and Control: System Administration at U.S. Central CommandLISA '06Andrew Seely
    Black Ops 2006: Pattern RecognitionLISA '06Dan Kaminsky
    Seriously, Tape-Only Backup Systems Are DeadLISA '06W. Curtis Preston
    The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software LISA '06Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon
    Unifying Unified Voice Messaging LISA '06Jon Finke
    Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System LISA '06Daniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman
    Zombies and Botnets: Attacks on Messaging Security by Organized Criminal EnterprisesLISA '06Dmitri Alperovitch
    Power-Managed Storage: Longer Data Life and Lower Energy ConsumptionLISA '06Aloke Guha
    The Future of System Administration: How to Stop Worrying and Learn to Love Self-Managing SystemsLISA '06Alva L. Couch
    System Administration: Drowning in Management ComplexityLISA '06Chad Verbowski
    Corporate Security: A Hacker PerspectiveLISA '06Mark "Simple Nomad" Loveless
    Improv for SysadminsLISA '06Bob Apthorpe, Dan Klein
    Bigtable: A Distributed Storage System for Structured DataOSDI '06Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
    Opening Remarks, Awards, and KeynoteUSENIX Security '06
    Keynote Address The Current State of the War on Terrorism and What It Means for Homeland Security and TechnologyUSENIX Security '06Richard A. Clarke
    A Usability Study and Critique of Two Password Managers USENIX Security '06Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    On the Release of CRLs in Public Key InfrastructureUSENIX Security '06Chengyu Ma, Nan Hu, Yingjiu Li
    Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingUSENIX Security '06Lucas Ballard, Fabian Monrose, Daniel Lopresti
    Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis ToolUSENIX Security '06Brian Chess