


default search action
17th LISA 2003: San Diego, CA, USA
- Æleen Frisch:

Proceedings of the 17th Conference on Systems Administration (LISA 2003), San Diego, California, USA, October 26-31, 2003. USENIX 2003
Keynote Address
- Paul Kilmartin:

Inside eBay.com: The System Administrator's Perspective. LISA 2003
Refereed Papers
Administering Essential Services
- Wesley D. Craig, Patrick M. McNeal:

Radmind: The Integration of Filesystem Integrity Checking with Filesystem Management. 1-6 - Elizabeth D. Zwicky:

Further Torture: More Testing of Backup and Archive Programs. 7-14 - Nick Elprin, Bryan Parno:

An Analysis of Database-Driven Mail Servers. 15-22
Information and Content Management
- Roger Crandell, James Clifford, Alexander Kent:

A Secure and Transparent Firewall Web Proxy. 23-30 - Joshua S. Simon, Liza Weissler:

Designing, Developing, and Implementing a Document Repository. 31-40 - Deepak Giridharagopal:

DryDock: A Document Firewall. 41-50
System and Network Monitoring
- William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur:

Run-time Detection of Heap-based Overflows. 51-60 - Xev Gittler, Ken Beer:

Designing a Configuration Monitoring and Reporting Environment. 61-72 - Daniel Ellard, Margo I. Seltzer:

New NFS Tracing Tools and Techniques for System Analysis. 73-86
Difficult Tasks Made Easier
- Mark C. Benvenuto, Angelos D. Keromytis:

EasyVPN: IPsec Remote Access Made Easy. 87-94 - Carrie Gates, Jason Rouse:

The Yearly Review, or How to Evaluate Your Sys Admin. 95-104 - Stacy Purcell, Sally Hambridge, David Armstrong, Tod Oace, Matt Baker, Jeff Sedayao:

Peer Certification: Techniques and Tools for Reducing System Admin Support Burdens While Improving Customer Service. 105-114
Emerging Theories of System Administration
- Luke Kanies:

ISconf: Theory, Practice, and Beyond. 115-124 - Alva L. Couch, John Hart, Elizabeth G. Idhaw, Dominic Kallas:

Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management. 125-148 - Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien:

Archipelago: A Network Security Analysis Tool. 149-158
Practicum: Unusual Techniques from the Front Lines
- Kevin Miller:

Three Practical Ways to Improve Your Network. - Jon T. Meek, Frank Colosimo:

Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables. - Bevis King, Roger Webb, Graeme Wilford:

The Realities of Deploying Desktop Linux.
Configuration Management: Tools and Techniques
- Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:

STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. 159-172 - Ted Cabeen, Job Bogan:

CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment. 173-180 - Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum:

Virtual Appliances for Deploying and Maintaining Software. 181-194
Configuration Management: Analysis and Theory
- Jon Finke:

Generating Configuration Files: The Director's Cut. 195-204 - Mark D. Roth:

Preventing Wheel Reinvention: The psgconf System Configuration Framework. 205-212 - Paul Anderson, Patrick Goldsack, Jim Paterson:

SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control. 213-222
Network Administration
- Tim Hunter, Paul Terry, Alan Judge:

Distributed Tarpitting: Impeding Spam Across Multiple Servers. 223-236 - Xiaohu Qie, Sanjai Narain:

Using Service Grammar to Diagnose BGP Configuration Errors. 237-246 - Cary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller, David W. Parter:

Splat: A Network Switch/Port Configuration Management Tool. 247-256
Invited Talks
- John Nicholson:

Outsourcing: Common Problems and Current Trends in the Outsourcing Industry. - Geoff Halprin:

Organizational Maturity Models: Achieving Success and Happiness in Modern IT Environments. LISA 2003 - Paul Vixie:

Internet Governance Reloaded. LISA 2003 - Peyton Engel:

Coping with the Disappearance of Network Boundaries. - Rémy Evard:

Security vs. Science: Changing the Security Culture of a National Lab. LISA 2003 - David N. Blank-Edelman:

Through the Lens Geekly: How Sysadmins Are Portrayed in Pop Culture. LISA 2003 - Gene Kim:

Security Lessons from "Best in Class" Organizations. LISA 2003 - Ross Oliver:

Stick, Rudder, and Keyboard: How Flying My Airplane Makes Me a Better Sysadmin. LISA 2003 - David Plonka:

A Case Study in Internet Pathology: Flawed Routers Flood University's Network. - David Moore:

Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe. LISA 2003 - Lance Hayden:

High Risk Information: Safe Handling for System Administrators. - Mark Burgess:

Talking to the Walls (Again). LISA 2003 - Thomas A. Limoncelli, Adam Moskowitz:

How to Get Your Papers Accepted at LISA. - Declan McCullagh:

What Washington Still Doesn't Get. LISA 2003 - Abe Singer:

Security Without Firewalls. LISA 2003
Panel: Myth or Reality? Studies of System Administrators
Spam Mini Symposium
- Robert Haskins:

Emerging Spam-Fighting Techniques. LISA 2003 - John Graham-Cumming:

Adaptive Filtering: One Year On. LISA 2003 - Panel Discussion: Current Best Practices and Forthcoming Advances. LISA 2003

Guru Sessions
- Hugh Daniel:

IPsec. LISA 2003 - Esther Filderman, Garry Zacheiss:

AFS. LISA 2003 - Brent Chapman:

MBAs for Sys Admins. LISA 2003 - Gregory G. Rose:

PKI/Cryptography. LISA 2003 - Bdale Garbee:

Linux. LISA 2003 - Paul Anderson, Steve Traugott:

Automated System Administration/Infrastructure. LISA 2003 - David W. Parter:

Professional Growth and Development. LISA 2003
Work-In-Progress Reports

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














