USENIX Systems Administration Conference (LISA) 2004 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


18th LISA 2004: Atlanta, USA

jump to

SPARQL queries 
⚠
Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Lee Damon:
Proceedings of the 18th Conference on Systems Administration (LISA 2004), Atlanta, USA, November 14-19, 2004. USENIX 2004
Opening Remarks, Awards, Keynote

Howard Ginsberg:
Keynote Address: Going Digital at CNN.
SPAM/Email

Jeremy Blosser, David Josephsen:
Scalable Centralized Bayesian Spam Mitigation with Bogofilter (Awarded Best Paper!). 1-20
Nils Einar Eide, Andreas N. Blaafadt, Baard H. Rehn Johansen, Frode Eika Sandnes:
DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email. 21-32
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. 33-46
Intrusion and Vulnerability Detection

Sufatrio, Roland H. C. Yap, Liming Zhong:
A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing. 47-58
Axelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy:
DigSig: Runtime Authentication of Binaries at Kernel Level. 59-66
Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok:
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. 67-78
Configuration Management

Eelco Dolstra, Merijn de Jonge, Eelco Visser:
Nix: A Safe and Policy-Free System for Software Deployment. 79-92
William LeFebvre, David Snyder:
Auto-configuration by File Construction: Configuration Management with newfig. 93-104
Sergei Mikhailov, Jonathan Robert Stanton:
AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations. 105-112
Networking

Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez:
autoMAC: A Tool for Automating Network Moves, Adds, and Changes. 113-120
Carrie Gates, Michael P. Collins, Michael Duggan, Andrew Kompanek, Mark Thomas:
More Netflow Tools for Performance and Security. 121-132
Monitoring and Troubleshooting

Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang:
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004

John P. Rouillard:
Real-time Log File Analysis Using the Simple Event Correlator (SEC). 133-150
Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang:
Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. 151-158
System Integrity

Ted Bonkenburg, Dejan Diklic, Benjamin C. Reed
, Mark A. Smith, Michael Vanover, Steve Welch, Roger Williams:
LifeBoat: An Autonomic Backup and Restore Solution. 159-170
Joseph R. Crouthamel, James M. Roberts, Christopher M. Sanchez, Christopher J. Tengi:
PatchMaker: A Physical Network Patch Manager Tool. 171-176
Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph A. Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. 177-186
Security

Marc Dougherty:
Making a Game of Network Security. 187-194
Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob C. Knauerhase, Aaron Klingaman:
Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System. 195-202
Robert A. Napier:
Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. 203-212
Theory

Steven Schwartzberg, Alva L. Couch:
Experience in Implementing an HTTP Service Closure. 213-230
Jon Finke:
Meta Change Queue: Tracking Changes to People, Places, and Things. 231-240
Daniel Price, Andrew Tucker:
Solaris Zones: Operating System Support for Consolidating Commercial Workloads. 241-254
Work-in-Progress Reports (WiPs)
Invited Talks

Alva L. Couch:
What Is This Thing Called System Configuration?

Mark Burgess:
Anomaly Detection: Whatever Happened to Computer Immunology? LISA 2004

Lisa Phillips, Brad Fitzpatrick:
LiveJournal's Backend and memcached: Past, Present, and Future.

Michael Ciavarella:
Documentation. LISA 2004

Peter H. Salus:
The Administrator, Then and Now. LISA 2004

Keri Carpenter, Thomas A. Limoncelli:
Lessons Learned from Howard Dean's Digital Campaign.
Spam Mini-Symposium

Joshua Goodman:
Filtering, Stamping, Blocking, Anti-Spoofing: How to Stop the Spam. LISA 2004

Douglas Hughes:
Lessons Learned Reimplementing an ISP Mail Service Infrastructure to Cope with Spam.
John Graham-Cumming:
What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future.
Plenary Session

Bill Van Etten:
A System Administrator's Introduction to Bioinformatics.
Network/Security/Professional Track

John Nicholson:
What Information Security Laws Mean For You.
Brian Pawlowski:
NFS, Its Applications and Future.
Jim Nisbet:
The Security Role of Linguistic Content Analysis.
Esther Filderman, Ken McInnis:
Grid Computing: Just What Is It and Why Should I Care?

Trey Harris:
A New Approach to Scripting. LISA 2004

Daniel V. Klein:
Flying Linux.
David N. Blank-Edelman:
System Administration and Sex Therapy: The Gentle Art of Debugging.
Simson L. Garfinkel:
Used Disk Drives.

W. Curtis Preston:
Storage Security: You're Fooling Yourself. LISA 2004
Guru Sessions

Gerald Carter:
Samba. LISA 2004

Michael Bartosh:
Mac OS X. LISA 2004

Bdale Garbee:
Linux. LISA 2004

W. Curtis Preston:
Backups. LISA 2004

Robert Sparks:
VoIP and IETF Standards. LISA 2004

Douglas Hughes, Darren Dunham:
RAID/HA/SAN (with a Heavy Dose of Veritas). LISA 2004

David W. Parter:
Professional Growth. LISA 2004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






