Jason Reid

According to our database1, Jason Reid authored at least 29 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Floating-base manipulation on zero-perturbation manifolds.
CoRR, 2023

2022
Machine Learning to Optimize TCP Communications Over High Frequency Communications Links.
IEEE Access, 2022

2020
On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems.
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020

2018
A policy model for access control using building information models.
Int. J. Crit. Infrastructure Prot., 2018

SPCC: a security policy compliance checker plug-in for YAWL.
Int. J. Bus. Process. Integr. Manag., 2018

Characterizing TCP/IP for High Frequency Communication Systems.
Proceedings of the 2018 Military Communications and Information Systems Conference, 2018

2015
JPL BioSleeve for gesture-based control: Technology development and field trials.
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015

BP-XACML an Authorisation Policy Language for Business Processes.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2013
Budget-aware Role Based Access Control.
Comput. Secur., 2013

2012
An Authorization Framework using Building Information Models.
Comput. J., 2012

Physical Access Control Administration Using Building Information Models.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A taint marking approach to confidentiality violation detection.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
A Model for Constraint and Delegation Management.
Proceedings of the Information Security Practice and Experience, 2011

An Approach to Access Control under Uncertainty.
Proceedings of the Sixth International Conference on Availability, 2011

Optimal Budget Allocation in Budget-based Access Control.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Authorization models for secure information sharing: a survey and research agenda.
ISC Int. J. Inf. Secur., 2010

On a taxonomy of delegation.
Comput. Secur., 2010

Encryption safe harbours and data breach notification laws.
Comput. Law Secur. Rev., 2010

If it's encrypted its secure! The viability of US state-based encryption exemptions.
Proceedings of the 2010 IEEE International Symposium on Technology and Society, 2010

Towards a Game Theoretic Authorisation Model.
Proceedings of the Decision and Game Theory for Security, 2010

An Administrative Model for UCON ABC.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Information Sharing in the 21st century: Progress and Challenges.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

2008
Commitment Issues in Delegation Process.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Detecting relay attacks with timing-based protocols.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2005
DRM, Trusted Computing and Operating System Architecture.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004

2003
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2000
Linkability in Practical Electronic Cash Design.
Proceedings of the Information Security, Third International Workshop, 2000

Making Sense of Smart Card Security Certifications.
Proceedings of the Smart Card Research and Advanced Applications, 2000


  Loading...