17. LISA 2003:
San Diego,
CA,
USA
 Proceedings of the 17th Conference on Systems Administration (LISA 2003), San Diego, California, USA, October 26-31, 2003.
 USENIX 2003  
  
  
  
  
 @proceedings{DBLP:conf/lisa/2003,
  title     = {Proceedings of the 17th Conference on Systems Administration
               (LISA 2003), San Diego, California, USA, October 26-31, 2003},
  booktitle = {LISA},
  publisher = {USENIX},
  year      = {2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
 
Keynote Address
 
- Paul Kilmartin:
Inside eBay.com: The System Administrator's Perspective.
           
Refereed Papers
 
Administering Essential Services
 
Information and Content Management
 
System and Network Monitoring
 
Difficult Tasks Made Easier
 
Emerging Theories of System Administration
 
- Luke Kanies:
 ISconf: Theory, Practice, and Beyond.
115-124
             
- Alva L. Couch, John Hart, Elizabeth G. Idhaw, Dominic Kallas:
 Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management.
125-148
             
- Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien:
 Archipelago: A Network Security Analysis Tool.
149-158
             
Practicum:
Unusual Techniques from the Front Lines
 
Configuration Management:
Tools and Techniques
 
- Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:
 STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support.
159-172
             
- Ted Cabeen, Job Bogan:
 CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment.
173-180
             
- Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum:
 Virtual Appliances for Deploying and Maintaining Software.
181-194
             
Configuration Management:
Analysis and Theory
 
Network Administration
 
Invited Talks 
 
- John Nicholson:
 Outsourcing: Common Problems and Current Trends in the Outsourcing Industry.
             
- Geoff Halprin:
Organizational Maturity Models: Achieving Success and Happiness in Modern IT Environments.
           
- Paul Vixie:
Internet Governance Reloaded.
           
- Peyton Engel:
 Coping with the Disappearance of Network Boundaries.
             
- Rémy Evard:
Security vs. Science: Changing the Security Culture of a National Lab.
           
- David N. Blank-Edelman:
Through the Lens Geekly: How Sysadmins Are Portrayed in Pop Culture.
           
- Gene Kim:
Security Lessons from "Best in Class" Organizations.
           
- Ross Oliver:
Stick, Rudder, and Keyboard: How Flying My Airplane Makes Me a Better Sysadmin.
           
- David Plonka:
 A Case Study in Internet Pathology: Flawed Routers Flood University's Network.
             
- David Moore:
Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe.
           
- Lance Hayden:
 High Risk Information: Safe Handling for System Administrators.
             
- Mark Burgess:
Talking to the Walls (Again).
           
- Thomas A. Limoncelli, Adam Moskowitz:
 How to Get Your Papers Accepted at LISA.
             
- Declan McCullagh:
What Washington Still Doesn't Get.
           
- Abe Singer:
Security Without Firewalls.
           
Panel:
Myth or Reality? Studies of System Administrators
 
Spam Mini Symposium
 
- Robert Haskins:
Emerging Spam-Fighting Techniques.
           
- John Graham-Cumming:
Adaptive Filtering: One Year On.
           
- Panel Discussion: Current Best Practices and Forthcoming Advances.
           
Guru Sessions
 
Work-In-Progress Reports
 
Copyright © Sun Mar 14 23:16:39 2010
 by Michael Ley (ley@uni-trier.de)