19th Large Installation System Administration Conference (LISA '05): Preliminary Program

S U N D A Y
Sysadmin in Edu Environments Workshop
Clusters Admin Workshop
Tutorial Program

M O N D A Y
Configuration Management Workshop
AFS Workshop
Social Technologies for System Admininstration Workshop
Tutorial Program
An Evening with Make Magazine (evening program)

T U E S D A Y
Advanced Topics Workshop
System Administration Education Workshop
Tutorial Program

(workshop to be scheduled: Managing System Administrators)

W  E  D  N  E  S  D  A  Y
Refereed Papers Invited Talks 1 Invited Talks 2 Guru
9:00
to
10:30
Keynote Address: Scaling Search Beyond the Public Web
Qi Lu, Vice President of Engineering, Yahoo! Inc.

What's next in "search?" Scaling, fault tolerance, and storage management become a lot more exciting when we go from the colossal scale of Yahoo! to the challenges of searching not just the public web, but your desktop, email, bookmarks and other repositories of information like your on-line communities. This talk introduces Yahoo!'s personal and social search initiative, and focuses on technology infrastructure that can store, index and search user and community content on a massive scale. Specific topics also include storage management, fault tolerance, metrics and real-time monitoring, and much more.

Dr. Qi Lu is a VP of Engineering of Yahoo! Inc. responsible for the technology development of Yahoo's Search and Marketplace businesses unit, which includes the company's search, e-commerce, and local listings businesses and products. Prior to joining Yahoo! in 1998, Dr. Lu was a Research Staff Member at IBM Almaden Research Center. Before that, Dr. Lu worked at Carnegie Mellon University as a Research Associate, and at Fudan University in China as a faculty member. He holds 20 US patents, and received his BS and MS in Computer Science from Fudan University and PhD in Computer Science from Carnegie Mellon University.

More information on the speaker can be found at http://360.yahoo.com/profile-dHFl7togcqomOrUGtvI-

11:00
to
12:30
Vulnerabilities

GULP: A Unified Logging Architecture for Authentication Data
Daniel Medina

Toward an Automated Vulnerability Comparison of Open Source IMAP Servers
Chaos Golubitsky

Fast User-Mode Rootkit Scanner for the Enterprise
Yi-Min Wang
(computing systems for amateur spacecraft)
Bdale Garbee
Black Ops of TCP/IP: Managing the Unexpected on Your Network
Dan Kaminsky

TBA

2:00
to
3:30
Config. Mgmt. Theory

Configuration Tools: Working Together
Paul Anderson

A Case Study in Configuration Management Tool Deployment
Narayan Desai

Reducing Downtime Due to System Maintenance and Upgrades
Shaya Potter
What big sites can learn from small sites
Tom Limoncelli
(a big move at MIT)
Garrett Wollman
TBA
4:00
to
5:30
Config. Mgmt. Practice

About the Integration of MacOSX Devices into a Centrally Managed Unix Environment
Anton Schultschik

RegColl: Centralized Registry Framework for Infrastructure System Management
Vikram Sharma

Herding cats: managing a mobile unix platform
Maarten Thibaut
Under 200: Applying Best Practices to Small Companies
Strata Chalup
What's a PKI, why would I want one, and how should it be designed?
Radia Perlman
TBA
T  H  U  R  S  D  A  Y
Refereed Papers Invited Talks 1 Invited Talks 2 Guru
9:00
to
10:30
Networking

Open Network Administrator (ONA) - A Web-Based Network Management Tool
Bruce Campbell

An Open Source Solution for Testing NAT'd and Nested iptables Firewalls
Phil Kearns

Towards Network Awareness
Anil Somayaji
Modern Trends in Unix and Linux Infrastructure Management
Andrew Cowie
Incident Command for IT: What We Can Learn from the Fire Department
Brent Chapman
TBA
11:00
to
12:30
Theory

Toward a cost model for system administration
Alva Couch

Voluntary cooperation in pervasive computing services
Mark Burgess

Network Configuration Management Via Model Finding
Sanjai Narain
Automatic PC Desktop Management with Virtulization Technology
Monica Lam
(tbd)
Peyton Engel
TBA
2:00
to
3:30
Network Visualization

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite
William Yurcik

Interactive Traffic Analysis and Visualization with Wisconsin Netpy
Cristian Estan

NetViewer: A Network Traffic Visualization and Analysis Tool
Seong Soo Kim
Passive Internet Competitive Intelligence and Corporate Espionage
Lance Cottrell
Preventing Child Neglect in DNSSEC-bis
Paul Vixie
TBA
4:00
to
5:30
(picking locks & system security)
Matt Blaze
F  R  I  D  A  Y
Refereed Papers Invited Talks 1 Invited Talks 2 Guru
9:00
to
10:30
Tools

A1: Spreadsheet-based Scripting for Web Tools
Allen Cypher

Hostdb: The best damn host2DNS/DHCP script ever written
Thomas Limoncelli

Solaris Service Management Facility: Modern System Startup and Administration
Liane Praza
(PATRIOT Act and data retention)
Kevin Bankston
Wireless Security
Warfield
TBA
11:00
to
12:30
Access Control

Towards a Userspace Packet Filter Toolkit for Securing Legacy Resources
Phil Kearns

Administering Access Control in Dynamic Coalitions
Rakesh Bobba

Manage People, Not Userids
Jon Finke
(blogs, wikis, and rss)
Chris Dent
The System Administrator's Guide to Biometrics
Michael Crusoe
TBA
2:00
to
3:30
Works in Progress Network Management: What Works, What Doesn't, and Why
Terry Slattery
How to Think Like an Attacker
Steve Bono
TBA
4:00
to
5:30
(closing session, most likely game show)