On this page:
0900 0910 |
CONFERENCE
OPENING David Purdue President and AUUG'2004 Programme Chair AUUG Incorporated |
||||
0910 0950 |
KEYNOTE Senator Kate Lundy Shadow Minister for Information Technology Australian Labor Party |
||||
0950 1030 |
PLENARY Angus McDonald CTO Sun Microsystems |
||||
1030 1100 |
MORNING TEA | ||||
STREAMS | Identity Management | System Configuration | |||
---|---|---|---|---|---|
1100 1140 |
Chanaka Kannangara, Sun Microsystems End to End Identity Management Architecture for the Enterprise |
Adrian Close, Fernhill Technology Kara - A Distributed Configuration Management System for OpenBSD |
|||
1140 1220 |
Brajesh Pande, Indian Institute of Technology Issues in User Account Management in Academic Environments |
Michael Paddon, Qualcomm Scalable Remote Firewalls |
|||
1220 1300 |
David Purdue, Sun Microsystems A Review of Domain Keys Email Authentication Technology |
Martin Schwenke, IBM OzLabs Linux Technology Center Using Vital Product Data For Persistent Device Naming |
|||
1300 1415 |
LUNCH | ||||
1415 1430 |
KEYNOTE
|
||||
STREAMS | ISOC-AU | Identity Management Case Studies | |||
1430 1510 |
Jeremy Malcolm The Australian Spam Act and Spam Code |
Andrew Rutherford, Iagu Networks Identity Assurance with Voice over IP |
|||
1510 1550 |
Andrew McRae, NetDevices Inc A User Level Networking Infrastructure for Linux |
Warren Toomey, Bond University Comparing C Code Trees |
|||
1550 1615 |
AFTERNOON TEA | ||||
1615 1700 |
FOOTNOTE:
Privacy, Anonymity, and Security
on the Internet Steve Bellovin AT&T Fellow Network Services Research Lab, AT&T Labs Research |
1700 1800 |
AUUG Incorporated Annual General Meeting |
1800 2000 |
NETWORKING RECEPTION |
0900 0945 |
KEYNOTE:
How To Eat An Elephant Arjen Lentz MySQL AB |
|
0945 1030 |
PLENARY:
Exploit Mitigation Techniques Theo de Raadt Project Lead OpenBSD Project |
|
1030 1100 |
MORNING TEA | |
STREAMS | On The Internet | Identity and Cryptology |
---|---|---|
1100 1140 |
Enno Davids, Metva ICAP - The Internet Content Adaption Protocol |
Joonsang Baek, School of Information Technology and Computer
Science, University of Wollongong A Survey of Identity-Based Cryptography |
1140 1220 |
Joel Sing, Ionix Technology Combatting Email Borne Pests using Open Source Tools |
Ben Elliston, CAcert: Certificates for the masses |
1220 1300 |
Warren Toomey, Bond University OzTiVo - Toys, Tools, TWikis and a Community |
Steve Bellovin, AT&T Labs Research Permissive Action Links |
1300 1430 |
LUNCH | |
1430 1500 |
Daniel Saffioti, University of
Wollongong Myth or Fact: Is Open Source Software More Secure than Closed Source Software? |
|
1500 1550 |
PANEL SESSION: Authorisation, Privacy, Anonymity: Security issues in UNIX and Open Source | |
1550 1615 |
AFTERNOON TEA | |
1615 1630 |
KEYNOTE Ms Jess Healy Candidate for the Federal Senate Australian Democrats |
|
1630 1715 |
FOOTNOTE:
Trust in Debian Bdale Garbee Linux CTO Hewlett Packard |
1900 2330 |
CONFERENCE DINNER |
0900 0945 |
KEYNOTE:
Current State of Play of ICT and Open Source
in the Australian Government Steve Alford General Manager, Sourcing & Security Branch AGIMO |
|
0945 1030 |
PLENARY:
Automated and Centralised UNIX Authentication, Account Provisioning
and Account Administration Anton Koren Manager Development - eTrust Directory Computer Associates |
|
1030 1100 |
MORNING TEA | |
STREAMS | High Powered Computing | Open Source Adoption |
---|---|---|
1100 1140 |
Frank Crawford, ac3 Building Australia's Fastest Computer |
Peter Alexander, Manager - Security and Emerging Technologies,
AGIMO OSS Contract And Legal Considerations In The Australian Government |
1140 1220 |
Daniel Saffioti, University of Wollongong Achieving Parallelism 'easily' through Pshell |
David Newall, A Convert to the Fold: Replacing Windows infrastructure with Linux |
1220 1300 |
Anshul Gupta, HP Designing and Managing High Availability and Load Balancing Linux Clusters |
David Oram, Centrelink Linux at Centrelink; Identity and Access Management at Centrelink |
1300 1430 |
LUNCH | |
STREAMS | Performance | Java (presented by AJUG) |
1430 1510 |
Richard Smith, Sun Microsystems Characterising SunRay Thin Client Performance |
David Bullock, Australian Java Users Group Using JAAS and Sun Java System Access Manager to authenticate federally-identified users of a web-application: A Case Study |
1510 1550 |
Ian Wienand, Gelato@UNSW ipbench - A Framework for Distributed Network Benchmarking |
Scott Farquhar, Atlassian Seraph: Deficiencies of the Servlet API with respect to security, and an Open Source Supplement. |
1550 1615 |
AFTERNOON TEA | |
1615 1630 |
KEYNOTE Chris Pearce MP Federal Member for Aston representing Senator Helen Coonan, Minister for Communications, Information Technology and the Arts Liberal Party of Australia |
|
1630 1715 |
FOOTNOTE:
It's Security, Stupid! Michael Paddon Qualcomm |
Abstracts will be added to this section over time. Check back here for updates.
The Internet provides both more and less anonymity than some would desire. Similarly, we have both more and less privacy than we would like. Conflicting desires, plus a strong need for security, interact in complex ways, affecting the nature of the Web, email (including spam), and copyright law. I'll wax rhapsodic on the different trends, tools, techniques, and possible futures.
Steve is an AT&T Fellow in the Network Services Research Lab at AT&T Labs Research, New Jersey. Steve does research on networks, security and why the two don't get along. He is the co-author, with Bill Cheswick, of the book Firewalls and Internet Security: Repelling the Wily Hacker.
Developers/geeks, business people and politicians struggle to come to grips with crucial aspects of the real world. Particularly for those of us who are involved with open source, there are many lessons to learn. Some of these will be explored here.
Arjen Lentz (35) is originally from Amsterdam, The Netherlands. Since marrying an Aussie, he decided that Australia is a very nice place to live, so together with their black cat they now reside in Kenmore, a Western suburb of Brisbane, QLD.
Arjen started with programming, but has since branched out to writing, translating, marketing, training and consultancy. He has been working for MySQL AB (the Swedish company that owns, develops and supports the MySQL database software, www.mysql.com) since 2001, primarily as technical writer for MySQL Documentation Team.
Arjen is always keen to be involved in open discussions with interested parties about MySQL and the possibilities for Open Source.
From a security perspective, command and control of nuclear weapons presents a challenge. The security mechanisms are supposed to be so good that they're impossible to bypass. But how do they work? Beyond that, there are reports linking these mechanisms to the early history of public key cryptography. We'll explore the documented history of both fields, and speculate on just how permissive action links - the "combination locks" on nuclear weapons - actually work.
The Debian project is one of the world's largest and most trusted software development communities. This presentation will describe the tools and processes used to secure the creation and distribution of Debian GNU/Linux.
Bdale Garbee is the Linux CTO for HP, helping to ensure that Linux works well on HP computer systems, and helping with other HP Open Source projects. He has been a contributor to the Debian project since 1995, including serving as Project Leader in the past.
Since the last time we spoke at this conference the Australian Government has made many advances in the area of open source and emergent technologies. This presentation provides a series of snapshots of significant developments in the area of open source and innovative ICT solutions within the Australian Government. It will also explain the role of AGIMO in the current ICT environment.
Tony Judge is General Manager, Sourcing & Security Branch, in the Australian Government Information Management Office (AGIMO).
Steve Alford joined NOIE (AGIMO's predecessor) in 2002 following 12 years working with various Federal Agencies on employment, education and small business programs.
Over the last seven years he has taken a leadership role in the development and implementation of Online business systems including document management systems, financial and HR systems and Web publishing. He has extensive experience in the development of portals for specific target audiences including the Australian business community through the Business Entry point, the education sector through Education Network Australia and department staff through the corporate Intranet.
Steve currently leads the Sourcing & Security Branch, which focuses on governance and investment issues at a whole of government level, security, sourcing and emerging technologies. Some of the current projects Steve is handling include Open Source initiatives, the Fedlink rollout and application security.
NOIE/AGIMO commissioned an Australian SME to implement a pure open source Content Management System to manage its Internet and intranet. In doing so we also wrote a case study on the implementation. This presentation details the similarities and the differences we encountered when dealing with a 'new' technology in the contracts and legal areas.
Peter has been with AGIMO (formerly NOIE) since September 2002. He manages an AGIMO team responsible for the security and emerging technology - including FedLink.
He has worked in the Australian Government for ten years - prior to joining AGIMO he has worked at Finance, Industry and Workplace Relations. He has developed broad experience in policy, program and project development, implementation and management.
Peter has a Bachelor of Commerce and Graduate Diploma in Information Systems both from the University of Canberra. He is currently undertaking the CPA Program to achieve the CPA professional accreditation.
Perspective on the progress of introducing Linux as a production platform at Centrelink, including discussion of business and migration issues. Potted history of identity management at Centrelink, considering application of technology to management of customer and staff identity.
David has over twenty years with the Australian IT industry, predominantly working with the Australian Government. During the 80s he was a data and voice communications specialist with IBM, during the 90s he was a systems integrator with BHP IT and is now the planner for Infrastructure strategy with Centrelink.
The information on this page is accurate as at the time of posting. Updates to this page will be made if necessary due to changed circumstances.
AUUG reserves the right to alter this timetable or to cancel sessions or the event.
Please also read the general disclaimer.