LISA '05 | Solaris Service Management Facility: Modern System Startup and Administration | Jonathan Adams, David Bustos, Stephen Hahn, David Powell, Liane Praza |
LISA '05 | Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources | James Deverick |
LISA '05 | Administering Access Control in Dynamic Coalitions | Rakesh Bobba, Serban Gavrila, Virgil Gligor, Himanshu Khurana, Radostina Koleva |
LISA '05 | Manage People, Not Userids | |
LISA '04 | Scalable Centralized Bayesian Spam Mitigation with Bogofilter | Jeremy Blosser, David Josephsen |
LISA '04 | DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email | Nils Einar Eide, Andreas N. Blaafadt |
LISA '04 | Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management | Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo |
LISA '04 | A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing | Sufatrio , Roland H. C. Yap |
LISA '04 | DigSig: Runtime Authentication of Binaries at Kernel Level | Axelle Apvrille, David Gordon |
LISA '04 | I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System | Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok |
LISA '04 | Nix: A Safe and Policy-Free System for Software Deployment | Eelco Dolstra, Merijn de Jonge |
LISA '04 | Auto-configuration by File Construction: Configuration Management with newfig | William LeFebvre, DCNN Internet Technologiesavid Snyder |
LISA '04 | AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations | Sergei Mikhailov, Jonathan Stanton |
LISA '04 | autoMAC: A Tool for Automating Network Moves, Adds, and Changes | Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez |
LISA '04 | More Netflow Tools for Performance and Security | Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas |
LISA '04 | Real-time Log File Analysis Using the Simple Event Correlator (SEC) | John P. Rouillard |
LISA '04 | Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis | Ni Lao, Ji-Rong Wen |
LISA '04 | LifeBoat: An Autonomic Backup and Restore Solution | Ted Bonkenburg, Dejan Diklic, Benjamin Reed, Mark Smith, Michael Vanover, Steve Welch, Roger Williams |
LISA '04 | PatchMaker: A Physical Network Patch Manager Tool | James M. Roberts |
LISA '04 | Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments | Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek |
LISA '04 | Making a Game of Network Security | Marc Dougherty |
LISA '04 | Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System | Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob Knauerhause, Aaron Klingaman |
LISA '04 | Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid | Robert A. Napier |
LISA '04 | Experience in Implementing an HTTP Service Closure | Steven Schwartzberg |
LISA '04 | Meta Change Queue: Tracking Changes to People, Places, and Things | Jon Finke |