LISA '05 | Toward an Automated Vulnerability Comparison of Open Source IMAP Servers | Chaos Golubitsky |
LISA '05 | Fast User-Mode Rootkit Scanner for the Enterprise | Yi-Min Wang, Doug Beck |
LISA '05 | Configuration Tools: Working Together | Paul Anderson, Edmund Smith |
LISA '05 | A Case Study in Configuration Management Tool Deployment | Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, Tisha Stacey |
LISA '04 | LifeBoat: An Autonomic Backup and Restore Solution | Ted Bonkenburg, Dejan Diklic, Benjamin Reed, Mark Smith, Michael Vanover, Steve Welch, Roger Williams |
LISA '04 | PatchMaker: A Physical Network Patch Manager Tool | James M. Roberts |
LISA '04 | Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments | Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek |
LISA '04 | Making a Game of Network Security | Marc Dougherty |
LISA '04 | Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System | Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob Knauerhause, Aaron Klingaman |
LISA '04 | Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid | Robert A. Napier |
LISA '04 | Experience in Implementing an HTTP Service Closure | Steven Schwartzberg |
LISA '04 | Meta Change Queue: Tracking Changes to People, Places, and Things | Jon Finke |
LISA '04 | Solaris Zones: Operating System Support for Consolidating Commercial Workloads | Daniel Price, Andrew Tucker |
LISA '04 | Real-time Log File Analysis Using the Simple Event Correlator (SEC) | John P. Rouillard |
LISA '04 | Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis | Ni Lao, Ji-Rong Wen |
LISA '04 | autoMAC: A Tool for Automating Network Moves, Adds, and Changes | Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez |
LISA '04 | More Netflow Tools for Performance and Security | Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas |
LISA '04 | A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing | Sufatrio , Roland H. C. Yap |
LISA '04 | DigSig: Runtime Authentication of Binaries at Kernel Level | Axelle Apvrille, David Gordon |
LISA '04 | I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System | Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok |
LISA '04 | Nix: A Safe and Policy-Free System for Software Deployment | Eelco Dolstra, Merijn de Jonge |
LISA '04 | Auto-configuration by File Construction: Configuration Management with newfig | William LeFebvre, DCNN Internet Technologiesavid Snyder |
LISA '04 | AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations | Sergei Mikhailov, Jonathan Stanton |
LISA '04 | Scalable Centralized Bayesian Spam Mitigation with Bogofilter | Jeremy Blosser, David Josephsen |
LISA '04 | DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email | Nils Einar Eide, Andreas N. Blaafadt |