Skip to content

>AUUG–The Organisation for Unix, Linux and Open Source Professionals


Table of Contents for the Proceedings of AUUG 2004 — Who Are You?

AUUG 2004 - Who Are You?

Identification and Authentication Issues in Computing

1-3 September 2004

The Duxton Hotel
Melbourne, Victoria, Australia


Programme Committee

Wednesday, 1 September 2004

End to End Identity Management Architecture for the Enterprise by Chanaka Kannangara

Issues in User Account Management in Academic Environments by Brajesh Pande

A Review of Yahoo!’s DomainKeys Technology by David Purdue

Kara - A Distributed Configuration Management System for OpenBSD by Adrian Close

Scalable Remote Firewalls by Michael Paddon, Philip Hawkes, Greg Rose

Australia's Stand on Spam by Jeremy Malcolm

A User Level Networking Infrastructure for Linux by Andrew McRae

Identity Assurance with Voice over IP by Andrew Rutherford

Comparing C Code Trees by Warren Toomey

Thursday, 2 September 2004

How to Eat an Elephant by Arjen Lentz

ICAP - The Internet Content Adaption Protocol by Enno Davids

Combatting Email Borne Pests using Open Source Tools by Joel Sing

OzTiVo — Toys, Tools, Hacks by Warren Toomey, Dennis Boylan, Michael Edwards, Keith Wilkinson

A Survey of Identity-Based Cryptography by Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo and Jan Newmarch

Design Principles and Security of Authentication Protocols with Trusted Third Party by Xianxian Li, Jun Han and Zhaohao Sun

Myth or Fact: Is Open Source Software More Secure than Closed Source Software? by Daniel Saffioti, Gene Awyzio and Robert BK Brown

Friday, 3 September 2004

Automated and Centralised UNIX Authentication, Account Provisioning and Account Administration by Anton Koren and Luke Howard

Building Australia's Fastest Computer by Frank Crawford

Achieving Parallelism easily through Pshell — Architecture and Overview by Daniel F. Saffioti

A Convert to the Fold by David Newall

Characterising Sun Ray™ Thin Client Performance by Richard Smith

ipbench — A Framework for Distributed Network Benchmarking by Ian Wienand and Luke Macpherson

Using JAAS and Sun Java System Access Manager to authenticate federally-identified users of a web-application by David Bullock