Papers

Search results

    ConferenceTitleAuthor(s)
    UPSEC '08A User Study Design for Comparing the Security of Registration ProtocolsChris Karlof, J.D. Tygar, David Wagner
    UPSEC '08IRBs and Security Research: Myths, Facts and Mission CreepSimson L. Garfinkel
    LISA '09Crossbow Virtual Wire: Network in a BoxSunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare
    LISA '09EVA: A Framework for Network Analysis and Risk AssessmentMelissa Danforth
    LISA '09An Analysis of Network Configuration ArtifactsDavid Plonka, Andres Jaan Tack
    LISA '09Secure Passwords Through Enhanced HashingBenjamin Strahs, Chuan Yue, Haining Wang
    LISA '09SEEdit: SELinux Security Policy Configuration System with Higher Level LanguageYuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
    LISA '09An SSH-based Toolkit for User-based Network ServicesJoyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth
    LISA '09Federated Access Control and Workflow Enforcement in Systems ConfigurationBart Vanbrabant, Thomas Delaet, Wouter Joosen
    LISA '09CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant DevicesRamani Routray, Shripad Nadgowda
    LISA '09Transparent Mobile Storage Protection in Trusted Virtual DomainsLuigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
    LISA '08Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction ModelNicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova
    LISA '08Dynamic Dependencies and Performance ImprovementMarc Chiarini, Alva Couch
    LISA '08Automatic Software Fault Diagnosis by Exploiting Application SignaturesXiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang
    LISA '08Petascale System Management ExperiencesRick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin
    LISA '08Rapid Parallel Systems Deployment: Techniques for Overnight ClusteringDonna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier
    LISA '08ENAVis: Enterprise Network Activities VisualizationQi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain
    LISA '08Fast, Cheap, and in Control: Towards Pain-Free Security!Sandeep Bhatt, Cat Okita, Prasad Rao
    LISA '08Concord: A Secure Mobile Data Authorization Framework for Regulatory ComplianceGautam Singaraju, Brent Hoon Kang
    LISA '08Authentication on Untrusted Remote Hosts with Public-Key SudoMatthew Burnside, Mack Lu, Angelos Keromytis
    LISA '08STORM: Simple Tool for Resource ManagementMark Dehus, Dirk Grunwald
    LISA '08IZO: Applications of Large-Window Compression to Virtual Machine ManagementMark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real
    LISA '08Portable Desktop Applications Based on P2P Transportation and VirtualizationYouhui Zhang, Xiaoling Wang, Liang Hong
    LISA '08Topnet: A Network-aware top(1)Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos
    LISA '08Fast Packet Classification for Snort by Native Compilation of RulesAlok Tongaonkar, Sreenaath Vasudevan, R. Sekar

    Pages