LISA '10 | Chukwa: A System for Reliable Large-Scale Log Collection | Ariel Rabkin, Randy Katz |
LISA '10 | Empirical Virtual Machine Models for Performance Guarantees | Hyong S. Kim |
LISA '10 | Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability | J. Bjørgeengen, H. Haugerud |
LISA '10 | YAF: Yet Another Flowmeter | Christopher M. Inacio, Brian Trammell |
LISA '10 | When Anti-virus Doesn't Cut It: Catching Malware with SIEM | Wyman Stocks |
LISA '10 | In-Flight Mechanics: A Software Package Management Conversion Project | Philip J. Hollenback |
LISA '10 | Experiences with Eucalyptus: Deploying an Open Source Cloud | Rick Bradshaw, Piotr T Zbiegiel |
LISA '10 | A Survey of System Configuration Tools | Thomas Delaet, Wouter Joosen, Bart Vanbrabant |
LISA '10 | High Performance Multi-Node File Copies and Checksums for Clustered File Systems | Paul Z. Kolano, Robert B. Ciotti |
LISA '10 | Fast and Secure Laptop Backups with Encrypted De-duplication | Paul Anderson, Le Zhang |
LISA '10 | The Margrave Tool for Firewall Analysis | Timothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
LISA '10 | Towards Automatic Update of Access Control Policy | Jinwei Hu, Yan Zhang, Ruixuan Li |
LISA '10 | First Step Towards Automatic Correction of Firewall Policy Faults | Fei Chen, Alex X. Liu, JeeHyun Hwang, Tao Xie |
LISA '09 | CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices | Ramani Routray, Shripad Nadgowda |
LISA '09 | Transparent Mobile Storage Protection in Trusted Virtual Domains | Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy |
LISA '09 | Crossbow Virtual Wire: Network in a Box | Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare |
LISA '09 | EVA: A Framework for Network Analysis and Risk Assessment | Melissa Danforth |
LISA '09 | An Analysis of Network Configuration Artifacts | David Plonka, Andres Jaan Tack |
LISA '09 | Secure Passwords Through Enhanced Hashing | Benjamin Strahs, Chuan Yue, Haining Wang |
LISA '09 | SEEdit: SELinux Security Policy Configuration System with Higher Level Language | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata |
LISA '09 | An SSH-based Toolkit for User-based Network Services | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
LISA '09 | Federated Access Control and Workflow Enforcement in Systems Configuration | Bart Vanbrabant, Thomas Delaet, Wouter Joosen |
LISA '09 | TECHNICAL SESSIONS | |
LISA '09 | Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery | Michael E. Locasto, Matthew Burnside, Darrell Bethea |
LISA '09 | Two-Person Control Administration: Preventing Administation Faults through Duplication | Shaya Potter, Steven M. Bellovin, Jason Nieh |