Sciweavers

LISA
2008
13 years 6 months ago
Authorisation and Delegation in the Machination Configuration System
Experience with a crudely delegated user interface to our internally developed configuration management system convinced us that delegated access to configuration systems was wort...
Colin Higgs
LISA
2008
13 years 6 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
LISA
2008
13 years 6 months ago
ENAVis: Enterprise Network Activities Visualization
Abstract-- With the prevalence of multi-user environments, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current ...
Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Th...
LISA
2008
13 years 6 months ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
LISA
2008
13 years 6 months ago
IZO: Applications of Large-Window Compression to Virtual Machine Management
The increased use of virtual machines in the enterprise environment presents an interesting new set of challenges for the administrators of today's information systems. In ad...
Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Vil...
LISA
2008
13 years 6 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong
LISA
2008
13 years 6 months ago
Devolved Management of Distributed Infrastructures with Quattor
In recent times a new kind of computing system has emerged: a distributed infrastructure composed of multiple physical sites in different administrative domains. This model introd...
Stephen Childs, Marco Emilio Poleggi, Charles Loom...
LISA
2008
13 years 6 months ago
Dynamic Dependencies and Performance Improvement
The art of performance tuning is, alas, still an art; there are few tools to help predict the effects of changes that are motivated by performance needs. In this work, we present ...
Marc Chiarini, Alva L. Couch
LISA
2008
13 years 6 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
LISA
2008
13 years 6 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis