{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:22:15Z","timestamp":1751840535838,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025999","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"348-361","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["How Do System Administrators Resolve Access-Denied Issues in the Real World?"],"prefix":"10.1145","author":[{"given":"Tianyin","family":"Xu","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Han Min","family":"Naing","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Le","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/3089491.3089501"},{"unstructured":"Apache Users Mailing List. 2016. http:\/\/mail-archives.apache.org\/mod_mbox\/httpd-users\/. (2016).  Apache Users Mailing List. 2016. http:\/\/mail-archives.apache.org\/mod_mbox\/httpd-users\/. (2016).","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/CSAC.2003.1254345"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 27th ACM Conference on Human Factors in Computing Systems (CHI'03)","author":"Barrett Rob","year":"2009","unstructured":"Rob Barrett , Yen-Yang Michael Chen , and Paul Maglio . 2009 . System Administrators are Users, Too: Designing Workspaces for Managing Internet-Scale Systems . In Proceedings of the 27th ACM Conference on Human Factors in Computing Systems (CHI'03) . Boston, MA, USA. Rob Barrett, Yen-Yang Michael Chen, and Paul Maglio. 2009. System Administrators are Users, Too: Designing Workspaces for Managing Internet-Scale Systems. In Proceedings of the 27th ACM Conference on Human Factors in Computing Systems (CHI'03). Boston, MA, USA."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1031607.1031672"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1357054.1357143"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1518701.1518838"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1377836.1377866"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1952982.1952984"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1280680.1280693"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1143120.1143124"},{"unstructured":"CentOS Forums. 2016. https:\/\/www.centos.org\/forums\/. (2016).  CentOS Forums. 2016. https:\/\/www.centos.org\/forums\/. (2016).","key":"e_1_3_2_1_12_1"},{"unstructured":"CentOS Mailing Lists. 2016. https:\/\/lists.centos.org\/pipermail\/centos\/. (2016).  CentOS Mailing Lists. 2016. https:\/\/lists.centos.org\/pipermail\/centos\/. (2016).","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/MSP.2010.127"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 19th USENIX Security Symposium (USENIX Security'10)","author":"Das Tathagata","year":"2010","unstructured":"Tathagata Das , Ranjita Bhagwan , and Prasad Naldurg . 2010 . Baaz: A System for Detecting Access Control Misconfigurations . In Proceedings of the 19th USENIX Security Symposium (USENIX Security'10) . Washington, DC, USA. Tathagata Das, Ranjita Bhagwan, and Prasad Naldurg. 2010. Baaz: A System for Detecting Access Control Misconfigurations. In Proceedings of the 19th USENIX Security Symposium (USENIX Security'10). Washington, DC, USA."},{"unstructured":"Database Administrators. 2016. http:\/\/dba.stackexchange.com. (2016).  Database Administrators. 2016. http:\/\/dba.stackexchange.com. (2016).","key":"e_1_3_2_1_16_1"},{"unstructured":"Database Administrators #127003. 2016. Can't access MySQL database with created user through dll. http:\/\/dba.stackexchange.com\/questions\/127003\/cantaccess-mysql-database-with-created-user-through-dll. (Jan. 2016).  Database Administrators #127003. 2016. Can't access MySQL database with created user through dll. http:\/\/dba.stackexchange.com\/questions\/127003\/cantaccess-mysql-database-with-created-user-through-dll. (Jan. 2016).","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1978942.1979280"},{"unstructured":"Jeff Goldman. 2014. Misconfigured Server Causes Massive Data Breach at MBIA. http:\/\/www.esecurityplanet.com\/networksecurity\/misconfigured-server-causes-massive-databreach-at-mbia.html. (Oct. 2014).  Jeff Goldman. 2014. Misconfigured Server Causes Massive Data Breach at MBIA. http:\/\/www.esecurityplanet.com\/networksecurity\/misconfigured-server-causes-massive-databreach-at-mbia.html. (Oct. 2014).","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1234772.1234774"},{"unstructured":"Hadoop User Mailing Lists. 2016. http:\/\/mail-archives.apache.org\/mod_mbox\/hadoop-user\/. (2016).  Hadoop User Mailing Lists. 2016. http:\/\/mail-archives.apache.org\/mod_mbox\/hadoop-user\/. (2016).","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Risk Report","author":"Enterprise Hewlett Packard","year":"2015","unstructured":"Hewlett Packard Enterprise . 2015. HP Cyber Risk Report 2015 . http:\/\/www8.hp.com\/h20195\/v2\/GetPDF.aspx\/4AA50858ENN.pdf. (Feb. 2015). Hewlett Packard Enterprise. 2015. HP Cyber Risk Report 2015. http:\/\/www8.hp.com\/h20195\/v2\/GetPDF.aspx\/4AA50858ENN.pdf. (Feb. 2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)","author":"Jiang Weihang","year":"2009","unstructured":"Weihang Jiang , Chongfeng Hu , Shankar Pasupathy , Arkady Kanevsky , Zhenmin Li , and Yuanyuan Zhou . 2009 . Understanding Customer Problem Troubleshooting from Storage System Logs . In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09) . San Francisco, CA, USA. Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, and Yuanyuan Zhou. 2009. Understanding Customer Problem Troubleshooting from Storage System Logs. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09). San Francisco, CA, USA."},{"key":"e_1_3_2_1_28_1","volume-title":"Haber","author":"Kandogan Eser","year":"2005","unstructured":"Eser Kandogan and Eben M . Haber . 2005 . Security Administration Tools and Practices. Security and Usability, O'Reilly Media , Inc. (Aug. 2005). Eser Kandogan and Eben M. Haber. 2005. Security Administration Tools and Practices. Security and Usability, O'Reilly Media, Inc. (Aug. 2005)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1030083.1030092"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1592761.1592773"},{"key":"e_1_3_2_1_31_1","volume-title":"Perspectives on Security. SOSP History Day. (Oct","author":"Lampson Butler","year":"2015","unstructured":"Butler Lampson . 2015. Perspectives on Security. SOSP History Day. (Oct . 2015 ). http:\/\/sigops.org\/sosp\/sosp15\/history\/. Butler Lampson. 2015. Perspectives on Security. SOSP History Day. (Oct. 2015). http:\/\/sigops.org\/sosp\/sosp15\/history\/."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/775265.775268"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/MC.2004.17"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1036474.1036499"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/1753326.1753421"},{"unstructured":"Microsoft Baseline Security Analyzer. 2016. http:\/\/www. microsoft.com\/technet\/security\/tools\/MBSAHome.mspx. (2016).  Microsoft Baseline Security Analyzer. 2016. http:\/\/www. microsoft.com\/technet\/security\/tools\/MBSAHome.mspx. (2016).","key":"e_1_3_2_1_37_1"},{"unstructured":"MySQL Bug #80542. 2016. Should notify users when ignoring their option files. http:\/\/bugs.mysql.com\/bug.php?id=80542. (Feb. 2016).  MySQL Bug #80542. 2016. Should notify users when ignoring their option files. http:\/\/bugs.mysql.com\/bug.php?id=80542. (Feb. 2016).","key":"e_1_3_2_1_38_1"},{"unstructured":"MySQL General Discussion Mailing List. 2016. https:\/\/lists.mysql.com\/mysql. (2016).  MySQL General Discussion Mailing List. 2016. https:\/\/lists.mysql.com\/mysql. (2016).","key":"e_1_3_2_1_39_1"},{"volume-title":"Reminiscences on the 25th SOSP's History Day Workshop","author":"Neumann Peter G.","unstructured":"Peter G. Neumann . 2015. Reminiscences on the 25th SOSP's History Day Workshop . http:\/\/sigops.org\/sosp\/sosp15\/history\/12-neumann.pdf. (2015). Peter G. Neumann. 2015. Reminiscences on the 25th SOSP's History Day Workshop. http:\/\/sigops.org\/sosp\/sosp15\/history\/12-neumann.pdf. (2015).","key":"e_1_3_2_1_40_1"},{"unstructured":"Eric Steven Raymond and Rick Moen. 2014. How To Ask Questions The Smart Way. http:\/\/www.catb.org\/~esr\/faqs\/smart-questions.html. (2014).  Eric Steven Raymond and Rick Moen. 2014. How To Ask Questions The Smart Way. http:\/\/www.catb.org\/~esr\/faqs\/smart-questions.html. (2014).","key":"e_1_3_2_1_41_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/1357054.1357285"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/1978942.1979243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/1542476.1542506"},{"unstructured":"Bruce Schneier. 2009. Real-World Access Control. https:\/\/www.schneier.com\/blog\/archives\/2009\/09\/realworld_acce.html. (2009).  Bruce Schneier. 2009. Real-World Access Control. https:\/\/www.schneier.com\/blog\/archives\/2009\/09\/realworld_acce.html. (2009).","key":"e_1_3_2_1_45_1"},{"unstructured":"ServerFault. 2016. http:\/\/serverfault.com. (2016).  ServerFault. 2016. http:\/\/serverfault.com. (2016).","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","volume-title":"http:\/\/serverfault.com\/questions\/235376\/apache-phpwriting-to-a-users-home-folder. (Feb","author":"ServerFault","year":"2011","unstructured":"ServerFault #235376. 2011. Apache\/PHP writing to a user's home folder. http:\/\/serverfault.com\/questions\/235376\/apache-phpwriting-to-a-users-home-folder. (Feb . 2011 ). ServerFault #235376. 2011. Apache\/PHP writing to a user's home folder. http:\/\/serverfault.com\/questions\/235376\/apache-phpwriting-to-a-users-home-folder. (Feb. 2011)."},{"key":"e_1_3_2_1_48_1","volume-title":"Apache Permission denied problem on OS X. serverfault.com\/questions\/\/apachepermission-denied-problem-on-os-x. (Jul","author":"ServerFault","year":"2011","unstructured":"ServerFault #287508. 2011. Apache Permission denied problem on OS X. serverfault.com\/questions\/\/apachepermission-denied-problem-on-os-x. (Jul . 2011 ). ServerFault #287508. 2011. Apache Permission denied problem on OS X. serverfault.com\/questions\/\/apachepermission-denied-problem-on-os-x. (Jul. 2011)."},{"unstructured":"ServerFault #396036. 2012. Apache httpd permissions. http:\/\/serverfault.com\/questions\/396036\/apache-httpdpermissions. (Jun. 2012).  ServerFault #396036. 2012. Apache httpd permissions. http:\/\/serverfault.com\/questions\/396036\/apache-httpdpermissions. (Jun. 2012).","key":"e_1_3_2_1_49_1"},{"unstructured":"ServerFault #401115. 2012. Apache Mod SVN Access Forbidden. http:\/\/serverfault.com\/questions\/401115\/apache-modsvn-access-forbidden. (Jun. 2012).  ServerFault #401115. 2012. Apache Mod SVN Access Forbidden. http:\/\/serverfault.com\/questions\/401115\/apache-modsvn-access-forbidden. (Jun. 2012).","key":"e_1_3_2_1_50_1"},{"unstructured":"ServerFault #402630. 2012. HTTP Error: 413 Request Entity Too Large. http:\/\/serverfault.com\/questions\/402630\/http-error413-request-entity-too-large. (Jun. 2012).  ServerFault #402630. 2012. HTTP Error: 413 Request Entity Too Large. http:\/\/serverfault.com\/questions\/402630\/http-error413-request-entity-too-large. (Jun. 2012).","key":"e_1_3_2_1_51_1"},{"unstructured":"ServerFault #418101. 2012. Apache \"Client denied by server con?guration\" despite allowing access to directory (vhost configuration). http:\/\/serverfault.com\/questions\/418101\/apache-clientdenied-by-server-configuration-despite-allowingaccess-to-direc. (Aug. 2012).  ServerFault #418101. 2012. Apache \"Client denied by server con?guration\" despite allowing access to directory (vhost configuration). http:\/\/serverfault.com\/questions\/418101\/apache-clientdenied-by-server-configuration-despite-allowingaccess-to-direc. (Aug. 2012).","key":"e_1_3_2_1_52_1"},{"unstructured":"ServerFault #421633. 2012. Cannot write file with apache despite 777 permissions on Directory. http:\/\/serverfault.com\/questions\/421633\/cannot-writefile-with-apache-despite-777-permissions-on-directory. (Aug. 2012).  ServerFault #421633. 2012. Cannot write file with apache despite 777 permissions on Directory. http:\/\/serverfault.com\/questions\/421633\/cannot-writefile-with-apache-despite-777-permissions-on-directory. (Aug. 2012).","key":"e_1_3_2_1_53_1"},{"unstructured":"ServerFault #507914. 2013. Mysql working remotely but not localy. http:\/\/serverfault.com\/questions\/507914\/mysql-workingremotely-but-not-localy. (May 2013).  ServerFault #507914. 2013. Mysql working remotely but not localy. http:\/\/serverfault.com\/questions\/507914\/mysql-workingremotely-but-not-localy. (May 2013).","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","volume-title":"Is there a work around for the \"Permission denied? error from urllib2.urlopen\" http: \/\/serverfault.com\/questions\/\/is-there-a-work-aroundfor-the-permission-denied-error-from-urllib2-urlopen. (Sep","author":"ServerFault","year":"2009","unstructured":"ServerFault #65362. 2009. Is there a work around for the \"Permission denied? error from urllib2.urlopen\" http: \/\/serverfault.com\/questions\/\/is-there-a-work-aroundfor-the-permission-denied-error-from-urllib2-urlopen. (Sep . 2009 ). ServerFault #65362. 2009. Is there a work around for the \"Permission denied? error from urllib2.urlopen\" http: \/\/serverfault.com\/questions\/\/is-there-a-work-aroundfor-the-permission-denied-error-from-urllib2-urlopen. (Sep. 2009)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/MSP.2010.139"},{"unstructured":"StackOverflow. 2016. http:\/\/stackoverflow.com. (2016).  StackOverflow. 2016. http:\/\/stackoverflow.com. (2016).","key":"e_1_3_2_1_58_1"},{"unstructured":"StackOverflow #13542384. 2012. Setting permissions for cloudera hadoop. http:\/\/stackoverflow.com\/questions\/13542384\/settingpermissions-for-cloudera-hadoop. (Nov. 2012).  StackOverflow #13542384. 2012. Setting permissions for cloudera hadoop. http:\/\/stackoverflow.com\/questions\/13542384\/settingpermissions-for-cloudera-hadoop. (Nov. 2012).","key":"e_1_3_2_1_59_1"},{"unstructured":"StackOverflow #22664268. 2014. Error on map reduce example of Hadoop 2.2.0. http:\/\/stackoverflow.com\/questions\/22664268\/error-onmap-reduce-example-of-hadoop-2--2-0. (Mar. 2014).  StackOverflow #22664268. 2014. Error on map reduce example of Hadoop 2.2.0. http:\/\/stackoverflow.com\/questions\/22664268\/error-onmap-reduce-example-of-hadoop-2--2-0. (Mar. 2014).","key":"e_1_3_2_1_60_1"},{"unstructured":"StackOverflow #29438893. 2015. Hadoop jar execution failing on class not found. http:\/\/stackoverflow.com\/questions\/29438893\/hadoopjar-execution-failing-on-class-not-found. (Apr. 2015).  StackOverflow #29438893. 2015. Hadoop jar execution failing on class not found. http:\/\/stackoverflow.com\/questions\/29438893\/hadoopjar-execution-failing-on-class-not-found. (Apr. 2015).","key":"e_1_3_2_1_61_1"},{"unstructured":"StackOverflow #30926357. 2015. Oozie on YARN oozie is not allowed to impersonate hadoop. http:\/\/stackoverflow.com\/questions\/30926357\/oozie-onyarn-oozie-is-not-allowed-to-impersonate-hadoop. (Jun. 2015).  StackOverflow #30926357. 2015. Oozie on YARN oozie is not allowed to impersonate hadoop. http:\/\/stackoverflow.com\/questions\/30926357\/oozie-onyarn-oozie-is-not-allowed-to-impersonate-hadoop. (Jun. 2015).","key":"e_1_3_2_1_62_1"},{"key":"e_1_3_2_1_63_1","volume-title":"http:\/\/stackoverflow.com\/questions\/33358339\/hadooperror-while-writing-tokenizermapper-permission-denied. (Jun","author":"StackOverflow","year":"2015","unstructured":"StackOverflow #33358339. 2015. Hadoop \"error while writing TokenizerMapper permission denied\". http:\/\/stackoverflow.com\/questions\/33358339\/hadooperror-while-writing-tokenizermapper-permission-denied. (Jun . 2015 ). StackOverflow #33358339. 2015. Hadoop \"error while writing TokenizerMapper permission denied\". http:\/\/stackoverflow.com\/questions\/33358339\/hadooperror-while-writing-tokenizermapper-permission-denied. (Jun. 2015)."},{"unstructured":"StackOverflow #473789. 2013. mysql doesn't start after relocating data dir. http:\/\/serverfault.com\/questions\/473789\/mysql-doesntstart-after-relocating-data-dir. (Jan. 2013).  StackOverflow #473789. 2013. mysql doesn't start after relocating data dir. http:\/\/serverfault.com\/questions\/473789\/mysql-doesntstart-after-relocating-data-dir. (Jan. 2013).","key":"e_1_3_2_1_64_1"},{"unstructured":"StackOverflow Help Center. 2016. Why is voting important? http:\/\/stackoverflow.com\/help\/why-vote. (2016).  StackOverflow Help Center. 2016. Why is voting important? http:\/\/stackoverflow.com\/help\/why-vote. (2016).","key":"e_1_3_2_1_65_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1145\/1125451.1125708"},{"unstructured":"The Open Web Application Security Project. 2013. OWASP Top 10: The Ten Most Critical Web Application Security Risks. http:\/\/owasptop10.googlecode.com\/files\/ OWASP%20Top%2010%20-%202013.pdf. (2013).  The Open Web Application Security Project. 2013. OWASP Top 10: The Ten Most Critical Web Application Security Risks. http:\/\/owasptop10.googlecode.com\/files\/ OWASP%20Top%2010%20-%202013.pdf. (2013).","key":"e_1_3_2_1_67_1"},{"unstructured":"Dan Walsh. 2013. Audit2allow should be your third option not the first. http:\/\/danwalsh.livejournal.com\/63137.html. (2013).  Dan Walsh. 2013. Audit2allow should be your third option not the first. http:\/\/danwalsh.livejournal.com\/63137.html. (2013).","key":"e_1_3_2_1_68_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1145\/1330311.1330320"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1145\/2786805.2786852"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.5555\/3026877.3026925"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_72_1","DOI":"10.1145\/2517349.2522727"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1145\/2791577"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Yuan Ding","year":"2012","unstructured":"Ding Yuan , Soyeon Park , Peng Huang , Yang Liu , Michael M. Lee , Xiaoming Tang , Yuanyuan Zhou , and Stefan Savage . 2012 . Be Conservative: Enhancing Failure Diagnosis with Proactive Logging . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12) . Hollywood, CA, USA. Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael M. Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage. 2012. Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12). Hollywood, CA, USA."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_77_1","DOI":"10.1145\/1950365.1950369"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_78_1","DOI":"10.1145\/2541940.2541983"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_79_1","DOI":"10.1145\/2771783.2771817"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_80_1","DOI":"10.1109\/SECPRI.1999.766718"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHI '17","name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:17Z","timestamp":1750215797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":75,"alternative-id":["10.1145\/3025453.3025999","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025999","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}