-
2
-
-
77952164184
-
-
Microsoft Corporatin. Microsoft SoftGrid. http://www.microsoft.com/ systemcenter/ softgrid/evaluation/virtualization.mspx, 2007.
-
(2007)
Microsoft SoftGrid
-
-
-
3
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 133-147, 2005.
-
(2005)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
5
-
-
33846240903
-
Automatic high-performance reconstruction and recovery
-
April From Intrusion Detection to Self-Protection
-
Ashvin Goel, Wu chang Feng, Wu chi Feng, David Maier, and Jim Snow. Automatic high-performance reconstruction and recovery. Journal of Computer Networks, 51(5):1361-1377, April 2007. From Intrusion Detection to Self-Protection.
-
(2007)
Journal of Computer Networks
, vol.51
, Issue.5
, pp. 1361-1377
-
-
Goel, A.1
Feng, W.C.2
Feng, W.C.3
Maier, D.4
Snow, J.5
-
6
-
-
84885588230
-
The Taser intrusion recovery system
-
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, and Eyal de Lara. The Taser intrusion recovery system. In Proceedings of the Symposium on Operating Systems Principles (SOSP), October 2005.
-
Proceedings of the Symposium on Operating Systems Principles (SOSP), October 2005
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
De Lara, E.5
-
7
-
-
0023963197
-
Recovery management in QuickSilver
-
Roger Haskin, Yoni Malachi, Wayne Sawdon, and Gregory Chan. Recovery management in QuickSilver. ACM Transactions on Computer Systems, 6(1):82-108, 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 82-108
-
-
Haskin, R.1
Malachi, Y.2
Sawdon, W.3
Chan, G.4
-
9
-
-
39049086327
-
Back to the future: A framework for automatic malware removal and system repair
-
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su. Back to the future: A framework for automatic malware removal and system repair. In Proceedings of the Annual Computer Security Applications Conference, December 2006.
-
Proceedings of the Annual Computer Security Applications Conference, December 2006
-
-
Hsu, F.1
Chen, H.2
Ristenpart, T.3
Li, J.4
Su, Z.5
-
14
-
-
34548763868
-
Usable mandatory integrity protection for operating systems
-
DOI 10.1109/SP.2007.37, 4223222, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Ninghui Li, Ziqing Mao, and Hong Chen. Usable mandatory integrity protection for operating systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 164-178, 2007. (Pubitemid 47432524)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 164-178
-
-
Li, N.1
Mao, Z.2
Chen, H.3
-
19
-
-
33244463191
-
Ext3cow: A time-shifting file system for regulatory compliance
-
May
-
Zachary N.J. Peterson and Randal Burns. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transactions on Storage, 1(2):190-212, May 2005.
-
(2005)
ACM Transactions on Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.N.J.1
Burns, R.2
-
21
-
-
85010767984
-
The use of name spaces in Plan 9
-
Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, and Phil Winterbottom. The use of name spaces in Plan 9. ACM Operating Systems Review, 27(2):72-76, 1993.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.2
, pp. 72-76
-
-
Pike, R.1
Presotto, D.2
Thompson, K.3
Trickey, H.4
Winterbottom, P.5
-
25
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
December
-
Douglas S. Santry, Michael J. Feeley, Norman C. Hutchinson, Alistair C. Veitch, Ross W. Carton, and Jacob Ofir. Deciding when to forget in the Elephant file system. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 110-123, December 1999.
-
(1999)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
28
-
-
34548029519
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
Stephen Soltesz, Herbert Pötzl, Marc E. Fiuczynski, Andy Bavier, and Larry Peterson. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In Proceedings of the EuroSys conference, pages 275-287, 2007.
-
(2007)
Proceedings of the EuroSys Conference
, pp. 275-287
-
-
Soltesz, S.1
Pötzl, H.2
Marc, E.3
Fiuczynski4
Bavier, A.5
Peterson, L.6
-
29
-
-
33845428560
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, 2004.
-
(2004)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
32
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
December
-
Douglas B. Terry, Marvin M. Theimer, Karin Petersen, Alan J. Demers, Mike J. Spreitzer, and Carl H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th Symposium on Operating Systems Principles (SOSP), pages 172-183, December 1995.
-
(1995)
Proceedings of the 15th Symposium on Operating Systems Principles (SOSP)
, pp. 172-183
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
|