Contents
Table of Contents for the Proceedings of AUUG 2004 — Who Are You?
AUUG 2004 - Who Are You?
Identification and Authentication Issues in Computing
1-3 September 2004
The Duxton Hotel
Melbourne, Victoria, Australia
Wednesday, 1 September 2004
End to End Identity Management Architecture for the Enterprise by Chanaka Kannangara
Issues in User Account Management in Academic Environments by Brajesh Pande
A Review of Yahoo!’s DomainKeys Technology by David Purdue
Kara - A Distributed Configuration Management System for OpenBSD by Adrian Close
Scalable Remote Firewalls by Michael Paddon, Philip Hawkes, Greg Rose
Australia's Stand on Spam by Jeremy Malcolm
A User Level Networking Infrastructure for Linux by Andrew McRae
Identity Assurance with Voice over IP by Andrew Rutherford
Comparing C Code Trees by Warren Toomey
Thursday, 2 September 2004
How to Eat an Elephant by Arjen Lentz
ICAP - The Internet Content Adaption Protocol by Enno Davids
Combatting Email Borne Pests using Open Source Tools by Joel Sing
OzTiVo — Toys, Tools, Hacks by Warren Toomey, Dennis Boylan, Michael Edwards, Keith Wilkinson
A Survey of Identity-Based Cryptography by Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo and Jan Newmarch
Design Principles and Security of Authentication Protocols with Trusted Third Party by Xianxian Li, Jun Han and Zhaohao Sun
Myth or Fact: Is Open Source Software More Secure than Closed Source Software? by Daniel Saffioti, Gene Awyzio and Robert BK Brown
Friday, 3 September 2004
Automated and Centralised UNIX Authentication, Account Provisioning and Account Administration by Anton Koren and Luke Howard
Building Australia's Fastest Computer by Frank Crawford
Achieving Parallelism easily
through Pshell — Architecture and Overview
by Daniel F. Saffioti
A Convert to the Fold by David Newall
Characterising Sun Ray™ Thin Client Performance by Richard Smith
ipbench — A Framework for Distributed Network Benchmarking by Ian Wienand and Luke Macpherson
Using JAAS and Sun Java System Access Manager to authenticate federally-identified users of a web-application by David Bullock