Conferences

Search results

    TitleConferenceSpeaker(s)
    LiveOps: Systems Management as a Service LISA '06Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
    Managing Large Networks of Virtual Machines LISA '06Kyrre Begnum
    Directing Change Using Bcfg2 LISA '06Rick Bradshaw, Cory Lueninghoener
    High Availability: From Luxury to Commonplace Necessity in 10 YearsLISA '06Eric Hennessey
    What Do You Mean, Identity 2.0?LISA '06Cat Okita
    NAF: The NetSA Aggregated Flow Tool Suite LISA '06Brian Trammell, Carrie Gates
    Interactive Network Management Visualization with SVG and AJAX LISA '06Athanasios Douitsis, Dimitrios Kalogeras
    A Platform for RFID Security and Privacy Administration LISA '06Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F.H. Hofman, Andrew S. Tannenbaum
    Privilege Messaging: An Authorization Framework over Email Infrastructure LISA '06Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack LISA '06Daniel V. Klein
    Sysadmins, Network Managers, and Wiretap LawLISA '06Alex Muentz
    Firewall Analysis with Policy-Based Host Classification LISA '06Robert Marmorstein, Phil Kearns
    Secure Mobile Code Execution Service LISA '06Lap-chung Lam, Yang Yu, Tzi-cker Chiueh
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs LISA '06Adam Slagell, Kiran Lakkaraju, Katherine Luo
    Site Reliability at Google/My First Year at GoogleLISA '06Tom Limoncelli
    Leveraging the IT CommunityLISA '06Patrick McGovern
    Centralized Security Policy Support for Virtual MachineLISA '06Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji
    Bigtable: A Distributed Storage System for Structured DataOSDI '06Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
    Polymorphic Blending AttacksUSENIX Security '06Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionUSENIX Security '06Holger Dreger, Anja Feldmann
    Behavior-based Spyware DetectionUSENIX Security '06Engin Kirda, Christopher Kruegel
    DRM Wars: The Next GenerationUSENIX Security '06Ed Felten
    An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataUSENIX Security '06Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
    vTPM: Virtualizing the Trusted Platform ModuleUSENIX Security '06Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn

Pages