The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2009 (conf/lisa/2009)


  1. Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. [Citation Graph (, )][DBLP]


  2. Two-Person Control Administation: Preventing Administation Faults through Duplication. [Citation Graph (, )][DBLP]


  3. The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations. [Citation Graph (, )][DBLP]


  4. Crossbow Virtual Wire: Network in a Box. [Citation Graph (, )][DBLP]


  5. EVA: A Framework for Network Analysis and Risk Assessment. [Citation Graph (, )][DBLP]


  6. An Analysis of Network Configuration Artifacts. [Citation Graph (, )][DBLP]


  7. Secure Passwords Through Enhanced Hashing. [Citation Graph (, )][DBLP]


  8. SEEdit: SELinux Security Policy Configuration System with Higher Level Language. [Citation Graph (, )][DBLP]


  9. An SSH-based Toolkit for User-based Network Services. [Citation Graph (, )][DBLP]


  10. Federated Access Control and Workflow Enforcement in Systems Configuration. [Citation Graph (, )][DBLP]


  11. CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices. [Citation Graph (, )][DBLP]


  12. Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002