LISA '02 | Geographically Distributed System for Catastrophic Recovery | Kevin Adams |
LISA '02 | Embracing and Extending Windows 2000 | Jon Finke |
LISA '02 | Stem: The System Administration Enabler | Uri Guttman |
LISA '02 | Pan: A High-Level Configuration Language | Lionel Cons, Piotr Poznanski |
LISA '02 | Why Order Matters: Turing Equivalence in Automated Systems Administration | Steve Traugott, Lance Brown |
LISA '02 | A New Architecture for Managing Enterprise Log Data | Adam Sah |
LISA '02 | MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis | Tetsuji Takada, Hideki Koike |
LISA '02 | Process Monitor: Detecting Events That Didn't Happen | |
LISA '02 | An Analysis of RPM Validation Drift | John Hart, Jeffrey D'Amelia |
LISA '02 | RTG: A Scalable SNMP Statistics Architecture for Service Providers | Robert Beverly |
LISA '02 | Environmental Acquisition in Network Management | Mark Logan, Matthias Felleisen, David Blank-Edelman |
LISA '02 | A Simple Way to Estimate the Cost of Downtime | David A. Patterson |
LISA '02 | Defining and Monitoring Service-Level Agreements for Dynamic e-Business | Alexander Keller, Heiko Ludwig |
LISA '02 | HotSwap–Transparent Server Failover for Linux | Noel Burton-Krahn |
LISA '02 | Over-Zealous Security Administrators Are Breaking the Internet | Richard van den Berg, Phil Dibowitz |
LISA '02 | An Approach for Secure Software Installation | V.N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Z. Liang |
LISA '02 | Network-based Intrusion Detection–Modeling for a Larger Picture | Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori |
LISA '02 | Timing the Application of Security Patches for Optimal Uptime | Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack |
USENIX Security '02 | Security in Plan 9 | Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan |
USENIX Security '02 | Linux Security Modules: General Security Support for the Linux Kernel | Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman |
USENIX Security '02 | Using CQUAL for Static Analysis of Authorization Hook Placement | Xiaolan Zhang, Antony Edwards, Trent Jaeger |
USENIX Security '02 | Using Text Categorization Techniques for Intrusion Detection | Yihua Liao, V. Rao Vemuri |
USENIX Security '02 | Detecting Manipulated Remote Call Streams | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
USENIX Security '02 | Type-Assisted Dynamic Buffer Overflow Detection | Kyung-suk Lhee, Steve J. Chapin |
USENIX Security '02 | A General and Flexible Access-Control System for the Web | Lujo Bauer, Michael A. Schneider, Edward W. Felten |