{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:27:24Z","timestamp":1725910044021},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672199"},{"type":"electronic","value":"9783319672205"}],"license":[{"start":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T00:00:00Z","timestamp":1504310400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67220-5_20","type":"book-chapter","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T11:19:00Z","timestamp":1504264740000},"page":"217-229","source":"Crossref","is-referenced-by-count":1,"title":["How Is Server Software Configured? Examining the Structure of Configuration Files"],"prefix":"10.1007","author":[{"given":"B\u0142a\u017cej","family":"\u015awi\u0119cicki","sequence":"first","affiliation":[]},{"given":"Leszek","family":"Borzemski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Rabkin, A., Katz, R.: Static extraction of program configuration options. In: Proceedings of the 33th International Conference on Software Engineering (2011)","DOI":"10.1145\/1985793.1985812"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Xu, T., Zhang, J., Huang, P., Zheng, J., Sheng, T., Yuan, D., Pasupathy, S.: Do not blame users for misconfigurations. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 244\u2013259. ACM (2013)","DOI":"10.1145\/2517349.2522727"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Xu, T., et al.: Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. ACM (2015)","DOI":"10.1145\/2786805.2786852"},{"key":"20_CR4","unstructured":"Xu, T., et al.: Early detection of configuration errors to reduce failure damage. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016). USENIX Association (2016)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Shambaugh, R., Weiss, A., Guha, A.: Rehearsal: a configuration verification tool for puppet. In: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM (2016)","DOI":"10.1145\/2908080.2908083"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Raab, M., Barany, G.: Challenges in validating FLOSS configuration. In: IFIP International Conference on Open Source Systems. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-57735-7_11"},{"key":"20_CR7","first-page":"4","volume":"47","author":"T Xu","year":"2015","unstructured":"Xu, T., Zhou, Y.: Systems approaches to tackling configuration errors: a survey. ACM Comput. Surv. (CSUR) 47, 4 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR8","unstructured":"Huang, P., Bolosky, W., Sigh, A., Zhou, Y.: KungfuValley: a systematic configuration validation framework for cloud services. In: Proceedings of the 10th ACM European Conference in Computer Systems (2015)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Tang, C., et al.: Holistic configuration management at Facebook. In: Proceedings of the 25th Symposium on Operating Systems Principles. ACM (2015)","DOI":"10.1145\/2815400.2815401"},{"key":"20_CR10","unstructured":"Oppenheimer, D., Ganapathi A., Patterson, D.: Why do Internet services fail, and what can be done about it?. In: USENIX Symposium on Internet Technologies and Systems, vol. 67 (2003)"},{"key":"20_CR11","unstructured":"Delaet, T., Joosen, W., Van Brabant, B.: A survey of system configuration tools. In: LISA, vol. 10 (2010)"},{"key":"20_CR12","unstructured":"Anderson, P., Scobie, A.: LCFG: the next generation. In: UKUUG Winter Conference (2002)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Heap, M.: Ansible. Apress (2016)","DOI":"10.1007\/978-1-4842-1659-0"},{"key":"20_CR14","first-page":"223","volume":"2012","author":"B Hosmer","year":"2012","unstructured":"Hosmer, B.: Getting started with salt stack\u2013the other configuration management system built with python. Linux J. 2012, 223 (2012)","journal-title":"Linux J."},{"key":"20_CR15","volume-title":"Managing Infrastructure with Puppet: Configuration Management at Scale","author":"J Loope","year":"2011","unstructured":"Loope, J.: Managing Infrastructure with Puppet: Configuration Management at Scale. O\u2019Reilly Media Inc, Sebastopol (2011)"},{"key":"20_CR16","unstructured":"Burgess, M.: Cfengine: a site configuration engine. In: USENIX Computing systems (1995)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"\u015awi\u0119cicki, B.: A novel approach to automating operating system configuration management. In: Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology\u2013ISAT 2015\u2013Part II. Springer International Publishing (2016)","DOI":"10.1007\/978-3-319-28561-0_10"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Xu, T., et al.: How do system administrators resolve access-denied issues in the real world? In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM (2017)","DOI":"10.1145\/3025453.3025999"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Huang, Q., et al.: Identifying self-admitted technical debt in open source projects using text mining. In: Empirical Software Engineering (2017)","DOI":"10.1007\/s10664-017-9522-4"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67220-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T11:28:27Z","timestamp":1504265307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67220-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,2]]},"ISBN":["9783319672199","9783319672205"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67220-5_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,2]]}}}