-
2
-
-
85030750455
-
Using magpie for request extraction and workload modelling
-
Paul T. Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. Using magpie for request extraction and workload modelling. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, pages 259-272, 2004.
-
(2004)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation
, pp. 259-272
-
-
Barham, P.T.1
Donnelly, A.2
Isaacs, R.3
Mortier, R.4
-
4
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the USENIX Security Symposium, pages 321-336, August 2004.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 321-336
-
-
Chow, J.1
Ben Pfaff, T.G.2
Christopher, K.3
Rosenblum, M.4
-
5
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, December 2002.
-
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, December 2002
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
8
-
-
84960382252
-
Forensix: A robust, high-performance reconstruction system
-
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, and Jonathan Walpole. Forensix: A robust, high-performance reconstruction system. In Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS), June 2005. In conjunction with the International Conference on Distributed Computing Systems (ICDCS).
-
Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS), June 2005. In Conjunction with the International Conference on Distributed Computing Systems (ICDCS)
-
-
Goel, A.1
Wu-chang, F.2
Maier, D.3
Wu-chi, F.4
Walpole, J.5
-
14
-
-
0033871806
-
Rewriting histories: Recovering from malicious transactions
-
Peng Liu, Paul Ammann, and Sushil Jajodia. Rewriting histories: Recovering from malicious transactions. Distributed and Parallel Databases, 8(1):7-40, 2000.
-
(2000)
Distributed and Parallel Databases
, vol.8
, Issue.1
, pp. 7-40
-
-
Liu, P.1
Ammann, P.2
Jajodia, S.3
-
17
-
-
33845384741
-
-
Technical Report TR-124, SUNY, Stony Brook, April
-
Dhruv Pilania and Tzi cker Chiueh. Design, implementation, and evaluation of an intrusion resilient database system. Technical Report TR-124, SUNY, Stony Brook, April 2005.
-
(2005)
Design, Implementation, and Evaluation of An Intrusion Resilient Database System
-
-
Pilania, D.1
Chiueh, T.C.2
-
18
-
-
84878346861
-
Improving host security with system call policies
-
August
-
N. Provos. Improving host security with system call policies. In Proceedings of the USENIX Security Symposium, pages 257-272, August 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
19
-
-
85084160176
-
Resolving file conflicts in the Ficus file system
-
USENIX, June
-
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J. Popek. Resolving file conflicts in the Ficus file system. In USENIX Technical Conference, pages 183-195. USENIX, June 1994.
-
(1994)
USENIX Technical Conference
, pp. 183-195
-
-
Reiher, P.1
Heidemann, J.S.2
Ratner, D.3
Skinner, G.4
Popek, G.J.5
-
22
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
December
-
Douglas S. Santry, Michael J. Feeley, Norman C. Hutchinson, Alistair C. Veitch, Ross W. Carton, and Jacob Ofir. Deciding when to forget in the Elephant file system. In Proceedings of the Symposium on Operating Systems Principles, pages 110-123, December 1999.
-
(1999)
Proceedings of the Symposium on Operating Systems Principles
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
23
-
-
84872311782
-
Linux on-the-fly kernel patching without LKM
-
sd and devik. December
-
sd and devik. Linux on-the-fly kernel patching without LKM. Phrack issue 58, December 2001.
-
(2001)
Phrack
, Issue.58
-
-
-
25
-
-
84885648386
-
Metadata efficiency in versioning file systems
-
Craig A. N. Soules, Garth R. Goodson, John D. Strunk, and Gregory R. Ganger. Metadata efficiency in versioning file systems. In Proceedings of the USENIX Conference on File and Storage Technologies, pages 43-58, 2003.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies
, pp. 43-58
-
-
Soules, C.A.N.1
Goodson, G.R.2
Strunk, J.D.3
Ganger, G.R.4
-
26
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: Protecting data in compromised systems. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, pages 165-180, 2000.
-
(2000)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
27
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. ACM SIGARCH Computer Architecture News, 32(5):85-96, 2004.
-
(2004)
ACM SIGARCH Computer Architecture News
, vol.32
, Issue.5
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
29
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
December
-
Douglas B. Terry, Marvin M. Theimer, Karin Petersen, Alan J. Demers, Mike J. Spreitzer, and Carl H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th Symposium on Operating Systems Principles, pages 172-183, December 1995.
-
(1995)
Proceedings of the 15th Symposium on Operating Systems Principles
, pp. 172-183
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
-
30
-
-
0004946166
-
-
Technical Report TR3014, Network Appliance, Inc.
-
Andy Watson and Paul Benn. Multiprotocol Data Access: NFS, CIFS, and HTTP. Technical Report TR3014, Network Appliance, Inc., 1999. http://www.netapp.com/tech-library/3014.html.
-
(1999)
Multiprotocol Data Access: NFS, CIFS, and HTTP
-
-
Watson, A.1
Benn, P.2
-
31
-
-
85084164351
-
Linux Security Modules: General security support for the Linux kernel
-
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. Linux Security Modules: General security support for the Linux kernel. In Proceedings of the USENIX Security Symposium, pages 17-31, 2002.
-
(2002)
Proceedings of the USENIX Security Symposium
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|