default search action
20th LISA 2006: Washington, DC, USA
- William LeFebvre:
Proceedings of the 20th Conference on Systems Administration (LISA 2006), Washington, DC, USA, December 3-8, 2006. USENIX 2006
Opening Remarks, Awards, Keynote
- Cory Doctorow:
Keynote Address: Hollywood's Secret War on Your NOC.
Electronic Mail
- Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain:
Privilege Messaging: An Authorization Framework over Email Infrastructure. 1-16 - Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano:
Securing Electronic Mail on the National Research and Academic Network of Italy. 17-29 - Daniel V. Klein:
A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack (Awarded Honorable Mention!). 31-40
Boundaries
- Robert M. Marmorstein, Phil Kearns:
Firewall Analysis with Policy-based Host Classification. 41-51 - Lap-Chung Lam, Yang Yu, Tzi-cker Chiueh:
Secure Mobile Code Execution Service. 53-62 - Adam J. Slagell, Kiran Lakkaraju, Katherine Luo:
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. 63-77
Security
- Anh-Quynh Nguyen, Ruo Ando, Yoshiyasu Takefuji:
Centralized Security Policy Support for Virtual Machine. 79-87 - Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). 89-102
Theory
- Chetan Shiva Shankar, Vanish Talwar, Subu Iyer, Yuan Chen, Dejan S. Milojicic, Roy H. Campbell:
Specification-Enhanced Policies for Automated Management of Changes in IT Systems. 103-118 - Ning Wu, Alva L. Couch:
Experience Implementing an IP Address Closure. 119-130 - Mark Burgess, Alva L. Couch:
Modeling Next Generation Configuration Management Tools. 131-147
Analysis
- Archana Ganapathi, Viji Ganapathi, David A. Patterson:
Windows XP Kernel Crash Analysis. 149-159 - Doo San Sim, V. N. Venkatakrishnan:
SUEZ: A Distributed Safe Execution Environment for System Administration Trials. 161-173 - Rajiv Ramnath, Sufatrio, Roland H. C. Yap, Yongzheng Wu:
WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows. 175-186
Systems and Network Management
- Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang:
LiveOps: Systems Management as a Service. 187-203 - Kyrre M. Begnum:
Managing Large Networks of Virtual Machines. 205-214 - Narayan Desai, Rick Bradshaw, Cory Lueninghoener:
Directing Change Using Bcfg2. 215-220
Visualization
- Brian Trammell, Carrie Gates:
NAF: The NetSA Aggregated Flow Tool Suite. 221-231 - Athanasios Douitsis, Dimitrios Kalogeras:
Interactive Network Management Visualization with SVG and AJAX. 233-245 - Glenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North:
Bridging the Host-Network Divide: Survey, Taxonomy, and Solution. 247-262
Potpourri
- Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon:
The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software. 263-273 - Jon Finke:
Unifying Unified Voice Messaging. 275-285 - Daniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman:
Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System. 287-298
Work-in-Progress Reports (WiPS)
Invited Talks
- Elizabeth D. Zwicky:
Teaching Problem Solving: You Can and You Should. - Alexander Muentz:
Sysadmins, Network Managers, and Wiretap Law. - Thomas A. Limoncelli:
Site Reliability at Google/My First Year at Google. LISA 2006 - Patrick McGovern:
Leveraging the IT Community. LISA 2006 - D. J. Byrne:
Open Source Software and Its Role in Space Exploration. - Michael Baum:
Virtualization: The Good, the Bad, the Ugly. LISA 2006 - Mazda A. Marvasti:
Everything You Know About Monitoring Is Wrong. - Lee Damon, Evan Marcus:
Is Entropy Winning? Drowning in the Data Tsunami. - Daniel V. Klein:
Perfect Data in an Imperfect World. LISA 2006 - Adam Haberlach:
QA and the System Administrator. - Eric Hennessey:
High Availability: From Luxury to Commonplace Necessity in 10 Years. - Cat Okita:
What Do You Mean, Identity 2.0?. LISA 2006 - Danny O'Brien:
The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of Privacy. - Andrew Seely:
Command and Control: System Administration at U.S. Central Command. - W. Curtis Preston:
Seriously, Tape-Only Backup Systems Are Dead. - Aloke Guha:
Power-Managed Storage: Longer Data Life and Lower Energy Consumption. - Chad Verbowski:
System Administration: Drowning in Management Complexity. LISA 2006
Network Security Track
- Dan Kaminsky:
Black Ops 2006: Pattern Recognition. LISA 2006 - Dmitri Alperovitch:
Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises. LISA 2006 - Mark Loveless:
Corporate Security: A Hacker Perspective.
Guru Sessions
- Joseph Radin:
UNIX and Microsoft Interoperability. LISA 2006 - Howard Chu:
LDAP. LISA 2006 - Douglas Hughes:
Spam. LISA 2006 - Robert Sparks:
VoIP. LISA 2006 - Thomas A. Limoncelli, Adam Moskowitz:
How to Get Your Paper Accepted at LISA. - Thomas A. Limoncelli:
Time Management for System Administrators. - John Arrasjid, John Gannon, Michael DiPetrillo:
Virtualization and the Virtual Infrastructure. LISA 2006 - W. Curtis Preston:
Backups. LISA 2006
Hit the Ground Running Track
- Jon Finke:
Identity Management. LISA 2006 - Esther Filderman:
AFS. LISA 2006 - Chris Page:
Build a Linux Oracle RAC Cluster. LISA 2006 - Michael Eisler:
NFSv4. LISA 2006 - Douglas Hughes:
SNMP. LISA 2006 - Adam Moskowitz:
Bad Interview Questions. LISA 2006 - John Littell:
Spam. LISA 2006 - Thomas A. Limoncelli:
Mac OS X. LISA 2006 - Narayan Desai:
bcfg2. LISA 2006 - Luke Kanies:
Puppet. LISA 2006
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.