Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '10Chukwa: A System for Reliable Large-Scale Log CollectionAriel Rabkin, Randy Katz
    LISA '10Empirical Virtual Machine Models for Performance GuaranteesHyong S. Kim
    LISA '10Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability J. Bjørgeengen, H. Haugerud
    LISA '10YAF: Yet Another FlowmeterChristopher M. Inacio, Brian Trammell
    LISA '10When Anti-virus Doesn't Cut It: Catching Malware with SIEMWyman Stocks
    LISA '10In-Flight Mechanics: A Software Package Management Conversion ProjectPhilip J. Hollenback
    LISA '10Experiences with Eucalyptus: Deploying an Open Source CloudRick Bradshaw, Piotr T Zbiegiel
    LISA '10A Survey of System Configuration ToolsThomas Delaet, Wouter Joosen, Bart Vanbrabant
    LISA '10High Performance Multi-Node File Copies and Checksums for Clustered File SystemsPaul Z. Kolano, Robert B. Ciotti
    LISA '10Fast and Secure Laptop Backups with Encrypted De-duplicationPaul Anderson, Le Zhang
    LISA '10The Margrave Tool for Firewall AnalysisTimothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi
    LISA '10Towards Automatic Update of Access Control PolicyJinwei Hu, Yan Zhang, Ruixuan Li
    LISA '10First Step Towards Automatic Correction of Firewall Policy FaultsFei Chen, Alex X. Liu, JeeHyun Hwang, Tao Xie
    LISA '09CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant DevicesRamani Routray, Shripad Nadgowda
    LISA '09Transparent Mobile Storage Protection in Trusted Virtual DomainsLuigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
    LISA '09Crossbow Virtual Wire: Network in a BoxSunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare
    LISA '09EVA: A Framework for Network Analysis and Risk AssessmentMelissa Danforth
    LISA '09An Analysis of Network Configuration ArtifactsDavid Plonka, Andres Jaan Tack
    LISA '09Secure Passwords Through Enhanced HashingBenjamin Strahs, Chuan Yue, Haining Wang
    LISA '09SEEdit: SELinux Security Policy Configuration System with Higher Level LanguageYuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
    LISA '09An SSH-based Toolkit for User-based Network ServicesJoyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth
    LISA '09Federated Access Control and Workflow Enforcement in Systems ConfigurationBart Vanbrabant, Thomas Delaet, Wouter Joosen
    LISA '09TECHNICAL SESSIONS
    LISA '09Pushing Boulders Uphill: The Difficulty of Network Intrusion RecoveryMichael E. Locasto, Matthew Burnside, Darrell Bethea
    LISA '09Two-Person Control Administration: Preventing Administation Faults through DuplicationShaya Potter, Steven M. Bellovin, Jason Nieh

Pages