| LiveOps: Systems Management as a Service | LISA '06 | Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang |
| Managing Large Networks of Virtual Machines | LISA '06 | Kyrre Begnum |
| Directing Change Using Bcfg2 | LISA '06 | Rick Bradshaw, Cory Lueninghoener |
| High Availability: From Luxury to Commonplace Necessity in 10 Years | LISA '06 | Eric Hennessey |
| What Do You Mean, Identity 2.0? | LISA '06 | Cat Okita |
| NAF: The NetSA Aggregated Flow Tool Suite | LISA '06 | Brian Trammell, Carrie Gates |
| Interactive Network Management Visualization with SVG and AJAX | LISA '06 | Athanasios Douitsis, Dimitrios Kalogeras |
| A Platform for RFID Security and Privacy Administration | LISA '06 | Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F.H. Hofman, Andrew S. Tannenbaum |
| Privilege Messaging: An Authorization Framework over Email Infrastructure | LISA '06 | Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain |
| Securing Electronic Mail on the National Research and Academic Network of Italy | LISA '06 | Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano |
| A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack | LISA '06 | Daniel V. Klein |
| Sysadmins, Network Managers, and Wiretap Law | LISA '06 | Alex Muentz |
| Firewall Analysis with Policy-Based Host Classification | LISA '06 | Robert Marmorstein, Phil Kearns |
| Secure Mobile Code Execution Service | LISA '06 | Lap-chung Lam, Yang Yu, Tzi-cker Chiueh |
| FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | LISA '06 | Adam Slagell, Kiran Lakkaraju, Katherine Luo |
| Site Reliability at Google/My First Year at Google | LISA '06 | Tom Limoncelli |
| Leveraging the IT Community | LISA '06 | Patrick McGovern |
| Centralized Security Policy Support for Virtual Machine | LISA '06 | Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji |
| Bigtable: A Distributed Storage System for Structured Data | OSDI '06 | Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber |
| Polymorphic Blending Attacks | USENIX Security '06 | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | USENIX Security '06 | Holger Dreger, Anja Feldmann |
| Behavior-based Spyware Detection | USENIX Security '06 | Engin Kirda, Christopher Kruegel |
| DRM Wars: The Next Generation | USENIX Security '06 | Ed Felten |
| An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | USENIX Security '06 | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
| vTPM: Virtualizing the Trusted Platform Module | USENIX Security '06 | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |