LISA '03 | A Secure and Transparent Firewall Web Proxy | Roger Crandell, James Clifford, Alexander Kent |
LISA '03 | Designing, Developing, and Implementing a Document Repository | Liza Weissler |
LISA '03 | DryDock: A Document Firewall | Deepak Giridharagopal |
LISA '03 | Run-time Detection of Heap-based Overflows | William Robertson, Christopher Kruegel, Darren Mutz, Fredrik Valeur |
LISA '03 | Designing a Configuration Monitoring and Reporting Environment | Xev Gittler, Ken Beer |
LISA '03 | New NFS Tracing Tools and Techniques for System Analysis | Daniel Ellard, Margo Seltzer |
LISA '03 | EasyVPN: IPsec Remote Access Made Easy | Mark C. Benvenuto, Angelos D. Keromytis |
LISA '03 | The Yearly Review, or How to Evaluate Your Sys Admin | Carrie Gates, Jason Rouse |
LISA '03 | Peer Certification: Techniques and Tools for Reducing System Admin Support Burdens While Improving Customer Service | Stacy Purcell, Sally Hambridge, David Armstrong, Tod Oace, Matt Baker, Jeff Sedayao |
LISA '03 | ISconf: Theory, Practice, and Beyond | Luke Kanies |
LISA '03 | Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management | John Hart, Elizabeth G. Idhaw, Dominic Kallas |
LISA '03 | Archipelago: A Network Security Analysis Tool | Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien |
LISA '03 | Three Practical Ways to Improve Your Network | Kevin Miller |
LISA '03 | Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables | Jon Meek, Frank Colosimo |
LISA '03 | The Realities of Deploying Desktop Linux | Bevis King, Roger Webb, Graeme Wilford |
LISA '03 | STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang |
LISA '03 | CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment | Ted Cabeen, Job Bogan |
LISA '03 | Virtual Appliances for Deploying and Maintaining Software | Constantine Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum |
LISA '03 | Generating Configuration Files: The Director's Cut | Jon Finke |
LISA '03 | Preventing Wheel Reinvention: The psgconf System Configuration Framework | Mark D. Roth |
LISA '03 | SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control | Paul Anderson, Patrick Goldsack, Jim Paterson |
LISA '03 | Distributed Tarpitting: Impeding Spam Across Multiple Servers | Tim Hunter, Paul Terry, Alan Judge |
LISA '03 | Using Service Grammar to Diagnose BGP Configuration Errors | Xiaohu Qie, Sanjai Narain |
LISA '03 | Splat: A Network Switch/Port Configuration Management Tool | Cary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller |
BSDCon 2003 | Reasoning about SMP in FreeBSD | Jeffrey Hsu |