Abstract is missing.
- Pushing Boulders Uphill: The Difficulty of Network Intrusion RecoveryMichael E. Locasto, Matthew Burnside, Darrell Bethea. 1-13 [doi]
- Two-Person Control Administation: Preventing Administation Faults through DuplicationShaya Potter, Steven M. Bellovin, Jason Nieh. 15-27 [doi]
- The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service MigrationsCraig Stacey, Max Trefonides, Tim Kendall, Brian Finley. 29-46 [doi]
- Crossbow Virtual Wire: Network in a BoxSunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare. 47-63 [doi]
- EVA: A Framework for Network Analysis and Risk AssessmentMelissa Danforth. 65-77 [doi]
- An Analysis of Network Configuration ArtifactsDavid Plonka, Andres Jaan Tack. 79-91 [doi]
- Secure Passwords Through Enhanced HashingBenjamin Strahs, Chuan Yue, Haining Wang. 93-106 [doi]
- SEEdit: SELinux Security Policy Configuration System with Higher Level LanguageYuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata. 107-117 [doi]
- An SSH-based Toolkit for User-based Network ServicesJoyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth. 119-127 [doi]
- Federated Access Control and Workflow Enforcement in Systems ConfigurationBart Van Brabant, Thomas Delaet, Wouter Joosen. 129-143 [doi]
- CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant DevicesRamani Routray, Shripad Nadgowda. 145-157 [doi]
- Transparent Mobile Storage Protection in Trusted Virtual DomainsLuigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy. 159-172 [doi]