On this page:

Conference Programme

Wednesday, 1 September 2004

0900
0910
CONFERENCE OPENING
David Purdue
President and AUUG'2004 Programme Chair
AUUG Incorporated
0910
0950
KEYNOTE
Senator Kate Lundy
Shadow Minister for Information Technology
Australian Labor Party
0950
1030
PLENARY
Angus McDonald
CTO
Sun Microsystems
1030
1100
MORNING TEA
STREAMS Identity Management System Configuration
1100
1140
Chanaka Kannangara, Sun Microsystems
End to End Identity Management Architecture for the Enterprise
Adrian Close, Fernhill Technology
Kara - A Distributed Configuration Management System for OpenBSD
1140
1220
Brajesh Pande, Indian Institute of Technology
Issues in User Account Management in Academic Environments
Michael Paddon, Qualcomm
Scalable Remote Firewalls
1220
1300
David Purdue, Sun Microsystems
A Review of Domain Keys Email Authentication Technology
Martin Schwenke, IBM OzLabs Linux Technology Center
Using Vital Product Data For Persistent Device Naming
1300
1415
LUNCH
1415
1430
KEYNOTE
Bruce Rivendell
Convenor Australian Greens (Victoria) IT Working Group
  Matthew Wright
Candidate for the Seat of Menzies
Australian Greens
STREAMS ISOC-AU Identity Management Case Studies
1430
1510
Jeremy Malcolm
The Australian Spam Act and Spam Code
Andrew Rutherford, Iagu Networks
Identity Assurance with Voice over IP
1510
1550
Andrew McRae, NetDevices Inc
A User Level Networking Infrastructure for Linux
Warren Toomey, Bond University
Comparing C Code Trees
1550
1615
AFTERNOON TEA
1615
1700
FOOTNOTE: Privacy, Anonymity, and Security on the Internet
Steve Bellovin
AT&T Fellow
Network Services Research Lab, AT&T Labs Research

1700
1800
AUUG Incorporated Annual General Meeting
1800
2000
NETWORKING RECEPTION



Thursday, 2 September 2004

0900
0945
KEYNOTE: How To Eat An Elephant
Arjen Lentz
MySQL AB
0945
1030
PLENARY: Exploit Mitigation Techniques
Theo de Raadt
Project Lead
OpenBSD Project
1030
1100
MORNING TEA
STREAMS On The Internet Identity and Cryptology
1100
1140
Enno Davids, Metva
ICAP - The Internet Content Adaption Protocol
Joonsang Baek, School of Information Technology and Computer Science, University of Wollongong
A Survey of Identity-Based Cryptography
1140
1220
Joel Sing, Ionix Technology
Combatting Email Borne Pests using Open Source Tools
Ben Elliston,
CAcert: Certificates for the masses
1220
1300
Warren Toomey, Bond University
OzTiVo - Toys, Tools, TWikis and a Community
Steve Bellovin, AT&T Labs Research
Permissive Action Links
1300
1430
LUNCH
1430
1500
Daniel Saffioti, University of Wollongong
Myth or Fact: Is Open Source Software More Secure than Closed Source Software?
1500
1550
PANEL SESSION: Authorisation, Privacy, Anonymity: Security issues in UNIX and Open Source
1550
1615
AFTERNOON TEA
1615
1630
KEYNOTE
Ms Jess Healy
Candidate for the Federal Senate
Australian Democrats
1630
1715
FOOTNOTE: Trust in Debian
Bdale Garbee
Linux CTO
Hewlett Packard

1900
2330
CONFERENCE DINNER



Friday, 3 September 2004

0900
0945
KEYNOTE: Current State of Play of ICT and Open Source in the Australian Government
Steve Alford
General Manager, Sourcing & Security Branch
AGIMO
0945
1030
PLENARY: Automated and Centralised UNIX Authentication, Account Provisioning and Account Administration
Anton Koren
Manager Development - eTrust Directory
Computer Associates
1030
1100
MORNING TEA
STREAMS High Powered Computing Open Source Adoption
1100
1140
Frank Crawford, ac3
Building Australia's Fastest Computer
Peter Alexander, Manager - Security and Emerging Technologies, AGIMO
OSS Contract And Legal Considerations In The Australian Government
1140
1220
Daniel Saffioti, University of Wollongong
Achieving Parallelism 'easily' through Pshell
David Newall,
A Convert to the Fold: Replacing Windows infrastructure with Linux
1220
1300
Anshul Gupta, HP
Designing and Managing High Availability and Load Balancing Linux Clusters
David Oram, Centrelink
Linux at Centrelink; Identity and Access Management at Centrelink
1300
1430
LUNCH
STREAMS Performance Java (presented by AJUG)
1430
1510
Richard Smith, Sun Microsystems
Characterising SunRay Thin Client Performance
David Bullock, Australian Java Users Group
Using JAAS and Sun Java System Access Manager to authenticate federally-identified users of a web-application: A Case Study
1510
1550
Ian Wienand, Gelato@UNSW
ipbench - A Framework for Distributed Network Benchmarking
Scott Farquhar, Atlassian
Seraph: Deficiencies of the Servlet API with respect to security, and an Open Source Supplement.
1550
1615
AFTERNOON TEA
1615
1630
KEYNOTE
Chris Pearce MP
Federal Member for Aston
representing Senator Helen Coonan, Minister for Communications, Information Technology and the Arts
Liberal Party of Australia
1630
1715
FOOTNOTE: It's Security, Stupid!
Michael Paddon
Qualcomm





Selected Abstracts

Abstracts will be added to this section over time. Check back here for updates.


Privacy, Anonymity, and Security on the Internet

Steve Bellovin

The Internet provides both more and less anonymity than some would desire. Similarly, we have both more and less privacy than we would like. Conflicting desires, plus a strong need for security, interact in complex ways, affecting the nature of the Web, email (including spam), and copyright law. I'll wax rhapsodic on the different trends, tools, techniques, and possible futures.

Steve is an AT&T Fellow in the Network Services Research Lab at AT&T Labs Research, New Jersey. Steve does research on networks, security and why the two don't get along. He is the co-author, with Bill Cheswick, of the book Firewalls and Internet Security: Repelling the Wily Hacker.


How To Eat An Elephant

Arjen Lentz

Developers/geeks, business people and politicians struggle to come to grips with crucial aspects of the real world. Particularly for those of us who are involved with open source, there are many lessons to learn. Some of these will be explored here.

Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.

Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.

Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.


Permissive Action Links

Steve Bellovin

From a security perspective, command and control of nuclear weapons presents a challenge. The security mechanisms are supposed to be so good that they're impossible to bypass. But how do they work? Beyond that, there are reports linking these mechanisms to the early history of public key cryptography. We'll explore the documented history of both fields, and speculate on just how permissive action links - the "combination locks" on nuclear weapons - actually work.


Trust in Debian

Bdale Garbee

The Debian project is one of the world's largest and most trusted software development communities. This presentation will describe the tools and processes used to secure the creation and distribution of Debian GNU/Linux.

Bdale Garbee is the Linux CTO for HP, helping to ensure that Linux works well on HP computer systems, and helping with other HP Open Source projects. He has been a contributor to the Debian project since 1995, including serving as Project Leader in the past.


Current State of Play of ICT and Open Source in the Australian Government

Steve Alford

Since the last time we spoke at this conference the Australian Government has made many advances in the area of open source and emergent technologies. This presentation provides a series of snapshots of significant developments in the area of open source and innovative ICT solutions within the Australian Government. It will also explain the role of AGIMO in the current ICT environment.

Tony Judge is General Manager, Sourcing & Security Branch, in the Australian Government Information Management Office (AGIMO).

Steve Alford joined NOIE (AGIMO's predecessor) in 2002 following 12 years working with various Federal Agencies on employment, education and small business programs.

Over the last seven years he has taken a leadership role in the development and implementation of Online business systems including document management systems, financial and HR systems and Web publishing. He has extensive experience in the development of portals for specific target audiences including the Australian business community through the Business Entry point, the education sector through Education Network Australia and department staff through the corporate Intranet.

Steve currently leads the Sourcing & Security Branch, which focuses on governance and investment issues at a whole of government level, security, sourcing and emerging technologies. Some of the current projects Steve is handling include Open Source initiatives, the Fedlink rollout and application security.


OSS Contract And Legal Considerations In The Australian Government

Peter Alexander

NOIE/AGIMO commissioned an Australian SME to implement a pure open source Content Management System to manage its Internet and intranet. In doing so we also wrote a case study on the implementation. This presentation details the similarities and the differences we encountered when dealing with a 'new' technology in the contracts and legal areas.

Peter has been with AGIMO (formerly NOIE) since September 2002. He manages an AGIMO team responsible for the security and emerging technology - including FedLink.

He has worked in the Australian Government for ten years - prior to joining AGIMO he has worked at Finance, Industry and Workplace Relations. He has developed broad experience in policy, program and project development, implementation and management.

Peter has a Bachelor of Commerce and Graduate Diploma in Information Systems both from the University of Canberra. He is currently undertaking the CPA Program to achieve the CPA professional accreditation.


Linux at Centrelink; Identity and Access Management at Centrelink

David Oram

Perspective on the progress of introducing Linux as a production platform at Centrelink, including discussion of business and migration issues. Potted history of identity management at Centrelink, considering application of technology to management of customer and staff identity.

David has over twenty years with the Australian IT industry, predominantly working with the Australian Government. During the 80s he was a data and voice communications specialist with IBM, during the 90s he was a systems integrator with BHP IT and is now the planner for Infrastructure strategy with Centrelink.





Information Disclaimer

The information on this page is accurate as at the time of posting. Updates to this page will be made if necessary due to changed circumstances.

AUUG reserves the right to alter this timetable or to cancel sessions or the event.

Please also read the general disclaimer.