LISA '09 | TECHNICAL SESSIONS | |
LISA '09 | Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery | Michael E. Locasto, Matthew Burnside, Darrell Bethea |
LISA '09 | Two-Person Control Administration: Preventing Administation Faults through Duplication | Shaya Potter, Steven M. Bellovin, Jason Nieh |
LISA '09 | The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations | Craig Stacey, Max Trefonides, Tim Kendall, Brian Finley |
LISA '09 | Crossbow Virtual Wire: Network in a Box | Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare |
LISA '09 | EVA: A Framework for Network Analysis and Risk Assessment | Melissa Danforth |
LISA '09 | An Analysis of Network Configuration Artifacts | David Plonka, Andres Jaan Tack |
LISA '09 | Secure Passwords Through Enhanced Hashing | Benjamin Strahs, Chuan Yue, Haining Wang |
LISA '09 | SEEdit: SELinux Security Policy Configuration System with Higher Level Language | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata |
LISA '09 | An SSH-based Toolkit for User-based Network Services | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
LISA '09 | Federated Access Control and Workflow Enforcement in Systems Configuration | Bart Vanbrabant, Thomas Delaet, Wouter Joosen |
LISA '09 | CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices | Ramani Routray, Shripad Nadgowda |
LISA '09 | Transparent Mobile Storage Protection in Trusted Virtual Domains | Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy |
LISA '08 | Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model | Nicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova |
LISA '08 | Dynamic Dependencies and Performance Improvement | Marc Chiarini, Alva Couch |
LISA '08 | Automatic Software Fault Diagnosis by Exploiting Application Signatures | Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang |
LISA '08 | Petascale System Management Experiences | Rick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin |
LISA '08 | Rapid Parallel Systems Deployment: Techniques for Overnight Clustering | Donna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier |
LISA '08 | ENAVis: Enterprise Network Activities Visualization | Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain |
LISA '08 | Fast, Cheap, and in Control: Towards Pain-Free Security! | Sandeep Bhatt, Cat Okita, Prasad Rao |
LISA '08 | Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance | Gautam Singaraju, Brent Hoon Kang |
LISA '08 | Authentication on Untrusted Remote Hosts with Public-Key Sudo | Matthew Burnside, Mack Lu, Angelos Keromytis |
LISA '08 | STORM: Simple Tool for Resource Management | Mark Dehus, Dirk Grunwald |
LISA '08 | IZO: Applications of Large-Window Compression to Virtual Machine Management | Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real |
LISA '08 | Portable Desktop Applications Based on P2P Transportation and Virtualization | Youhui Zhang, Xiaoling Wang, Liang Hong |