Vijay Varadharajan

According to our database1, Vijay Varadharajan
  • authored at least 348 papers between 1983 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2018

A Policy based Security Architecture for Software Defined Networks.
CoRR, 2018

Malytics: A Malware Detection Scheme.
CoRR, 2018

Secure Monitoring of Patients With Wandering Behavior in Hospital Environments.
IEEE Access, 2018

2017
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wireless Personal Communications, 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Sec. Comput., 2017

On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience.
IEEE Trans. Cloud Computing, 2017

Intrusion detection techniques in cloud environment: A survey.
J. Network and Computer Applications, 2017

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
Journal of Intelligent and Fuzzy Systems, 2017

Cryptography and Data Security in Cloud Computing.
Inf. Sci., 2017

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud.
Concurrency and Computation: Practice and Experience, 2017

SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Mitigating attacks in Software Defined Network (SDN).
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Towards a Secure Access Control Architecture for the Internet of Things.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Securing communication in multiple Autonomous System domains with Software Defined Networking.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Autoencoder-based feature learning for cyber security applications.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Fast, Automatic and Scalable Learning to Detect Android Malware.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A trust model based energy detection for cognitive radio networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

An efficient and provably secure RFID grouping proof protocol.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.
IEEE Trans. Knowl. Data Eng., 2016

A novel malware for subversion of self-protection in anti-virus.
Softw., Pract. Exper., 2016

A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
Comput. J., 2016

Rethinking Software Component Security: Software Component Level Integrity and Cross Verification.
Comput. J., 2016

Integrated Security for Services Hosted in Virtual Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Cascading attacks against smart grid using control command disaggregation and services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Policy based security architecture for software defined networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

On the Design and Implementation of a Security Architecture for Software Defined Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
IEEE Trans. Information Forensics and Security, 2015

Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Information Forensics and Security, 2015

A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Security and Communication Networks, 2015

Generic constructions for role-based encryption.
Int. J. Inf. Sec., 2015

Shared RFID ownership transfer protocols.
Computer Standards & Interfaces, 2015

Securing wireless mobile nodes from distributed denial-of-service attacks.
Concurrency and Computation: Practice and Experience, 2015

Trust Enhanced Security for Tenant Transactions in the Cloud Environment.
Comput. J., 2015

Design, implementation and evaluation of a novel anti-virus parasitic malware.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Improved detection of primary user emulation attacks in cognitive radio networks.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage.
Proceedings of the Information Security - 18th International Conference, 2015

Botnet detection using software defined networking.
Proceedings of the 22nd International Conference on Telecommunications, 2015

Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT).
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Secure Dynamic Software Loading and Execution Using Cross Component Verification.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015

Hypervisor-based Security Architecture to Protect Web Applications.
Proceedings of the 13th Australasian Information Security Conference, 2015

An Enhanced Model for Network Flow Based Botnet Detection.
Proceedings of the 38th Australasian Computer Science Conference, 2015

A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication.
Proceedings of the 38th Australasian Computer Science Conference, 2015

2014
Security as a Service Model for Cloud Environment.
IEEE Trans. Network and Service Management, 2014

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
IEEE Trans. Information Forensics and Security, 2014

CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Information Forensics and Security, 2014

Antivirus security: naked during updates.
Softw., Pract. Exper., 2014

Counteracting security attacks in virtual machines in the cloud using property based attestation.
J. Network and Computer Applications, 2014

Secure administration of cryptographic role-based access control for large-scale cloud storage systems.
J. Comput. Syst. Sci., 2014

Trust enhanced distributed authorisation for web services.
J. Comput. Syst. Sci., 2014

Dynamic delegation framework for role based access control in distributed data management systems.
Distributed and Parallel Databases, 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Trust Enhanced Cloud Security for Healthcare Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Design and Analysis of a New Feature-Distributed Malware.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Simple and Novel Technique for Counteracting Exploit Kits.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Secure monitoring for dementia patients.
Proceedings of the Symposium on Applied Computing, 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Practical k nearest neighbor queries with location privacy.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Techniques for detecting attacks on critical infrastructure.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

TrustLite: a security architecture for tiny embedded devices.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Feature-Distributed Malware Attack: Risk and Defence.
Proceedings of the Computer Security - ESORICS 2014, 2014

Dynamic Workload Balancing for Hadoop MapReduce.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Hypervisor-based Security Architecture for Validating DNS Services (Poster).
Proceedings of the Twelfth Australasian Information Security Conference, 2014

A New Technique for Counteracting Web Browser Exploits.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

2013
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2013

Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Trust Enhanced Security Architecture for Detecting Insider Threats.
Proceedings of the 12th IEEE International Conference on Trust, 2013

On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Integrated Security Architecture for Virtual Machines.
Proceedings of the Security and Privacy in Communication Networks, 2013

Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control.
Proceedings of the SECRYPT 2013, 2013

A framework for evaluating trust of service providers in cloud marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013

Design and Analysis of a Sophisticated Malware Attack Against Smart Grid.
Proceedings of the Information Security, 16th International Conference, 2013

Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013

A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Security Techniques for Counteracting Attacks in Mobile Healthcare Services.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Securing Mobile Devices from DoS Attacks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

On the Security of Tenant Transactions in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

On Malware Characterization and Attack Classification.
Proceedings of the First Australasian Web Conference, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
A flexible cryptographic approach for secure data storage in the cloud using role-based access control.
IJCC, 2012

Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.
Comput. J., 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

TREASURE: Trust Enhanced Security for Cloud Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Distributed service control technique for detecting security attacks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Intrusion detection techniques for virtual domains.
Proceedings of the 19th International Conference on High Performance Computing, 2012

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Proceedings of the Computer Security - ESORICS 2012, 2012

Security and Trust in the Web.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2011

Dynamic trust enhanced security model for trusted platform based services.
Future Generation Comp. Syst., 2011

Enforcing Role-Based Access Control for Secure Data Storage in the Cloud.
Comput. J., 2011

TVDSEC: Trusted Virtual Domain Security.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

TVLAN: Trusted and Virtualised Local Area Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Hybrid Trust Model for Authorisation Using Trusted Platforms.
Proceedings of the IEEE 10th International Conference on Trust, 2011

CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Rethinking cyber security.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Counteracting DDoS attacks in WLAN.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Security techniques for zero day attacks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

On the design of Virtual machine Intrusion detection system.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Security Architecture for Virtual Machines.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Security Techniques for Beyond 3G Wireless Mobile Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

Reasoning about Dynamic Delegation in Role Based Access Control Systems.
Proceedings of the Database Systems for Advanced Applications, 2011

Intrusion Detection Techniques for Infrastructure as a Service Cloud.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Techniques for Analysing PDF Malware.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Wireless sensor network key management survey and taxonomy.
J. Network and Computer Applications, 2010

MobileTrust: a trust enhanced security architecture for mobile agent systems.
Int. J. Inf. Sec., 2010

Internet Filtering Issues and Challenges.
IEEE Security & Privacy, 2010

A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems.
Distributed and Parallel Databases, 2010

Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Purpose-Based Access Control Policies and Conflicting Analysis.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A trust management architecture for hierarchical wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Detecting Security Attacks in Trusted Virtual Domains.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Analysis of Property Based Attestation in Trusted Platforms.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Trust management towards service-oriented applications.
Service Oriented Computing and Applications, 2009

A Note on Trust-Enhanced Security.
IEEE Security & Privacy, 2009

A Property-Dependent Agent Transfer Protocol.
Proceedings of the Trusted Computing, 2009

Evolution and challenges in trust and security in information system infrastructures.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

DoSTRACK: a system for defending against DoS attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Property Based Attestation and Trusted Computing: Analysis and Challenges.
Proceedings of the Third International Conference on Network and System Security, 2009

Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Critical Issues in Trust Management for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

SBAC: Service Based Access Control.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Trust Enhanced Authorization for Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

Reasoning on Weighted Delegatable Authorizations.
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009

Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Trust Relationship Modelling in E-commerce-Based Social Network.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

ALOPA: Authorization Logic for Property Attestation in Trusted Platforms.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

Fuzzy Regression Based Trust Prediction in Service-Oriented Applications.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments.
Inf. Syst. E-Business Management, 2008

A hybrid model against TCP. SYN and reflection DDoS attacks.
Comput. Syst. Sci. Eng., 2008

Subjective logic based trust model for mobile ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Trust Management for Web Services.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

A Novel Approach of Web Search Based on Community Wisdom.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

A New Security Scheme for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
Proceedings of the Data and Applications Security XXII, 2008

2007
DDoS: design, implementation and analysis of automated model.
IJWMC, 2007

On the design, implementation and application of an authorisation architecture for web services.
IJICS, 2007

Trust-enhanced secure mobile agent-based system design.
IJAOSE, 2007

Role-based Recommendation and Trust Evaluation.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Mobile Agent and Web Service Integration Security Architecture.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007

Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Trust and Recommendations in Mobile Ad hoc Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

A New Security Scheme for Integration of Mobile Agents and Web Services.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

The Design of A Rule-based and Event-driven Trust Management Framework.
Proceedings of ICEBE 2007, 2007

A Novel Security Risk Evaluation for Information Systems.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

Trust management for trusted computing platforms in web services.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Trust Enhanced Secure Mobile Ad-Hoc Network Routing.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Hybrid Trust Model for Enhancing Security in Distributed Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing.
JCP, 2006

ID-based Secure PIM-SM Schemes.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

A Unified Framework for Trust Management.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Improving Software Security Through an Integrated Approach.
Proceedings of the SECRYPT 2006, 2006

Design and Implementation of a Practical Secure Distributed Healthcare Application.
Proceedings of the SECRYPT 2006, 2006

Fellowship: Defense against Flooding and Packet Drop Attacks in MANET.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Integration of Graph Based Authorization Policies.
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006

Implementing Authorization Delegations Using Graph.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

A Scalable Multi-service Group Key Management Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Analysis of traceback techniques.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Trust Based Risk Management for Distributed System Security - A New Approach.
Proceedings of the The First International Conference on Availability, 2006

2005
Secure route structures for parallel mobile agents based systems using fast binary dispatch.
Mobile Information Systems, 2005

Authorization Service for Web Services and its Application in a Health Care Domain.
Int. J. Web Service Res., 2005

On the sequence of authorization policy transformations.
Int. J. Inf. Sec., 2005

Secure distribution and access of XML documents.
IJHPCN, 2005

Architectural Framework for Web Services Authorization.
Proceedings of the Web Services and Model-Driven Enterprise Information Services, 2005

Trust Enhanced Security for Mobile Agents.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security.
Proceedings of the Trust, 2005

Short Paper: Fellowship in Mobile Ad hoc Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Efficient TTP-Free Mental Poker Protocols.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Data Protection in Distributed Database Systems.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Trust and authorization in the grid: a recommendation model.
Proceedings of the International Conference on Pervasive Services 2005, 2005

A Middleware-Based Script Language.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Business-Process-Oriented Software Requirements Automatic Generator.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Evaluating the Performance and Scalability of Web Application Systems.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Security and Trust Enhanced Mobile Agent Based System Design.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Analysis and Modelling of Trust in Distributed Information Systems.
Proceedings of the Information Systems Security, First International Conference, 2005

Authorization and Trust Enhanced Security for Distributed Applications.
Proceedings of the Information Systems Security, First International Conference, 2005

Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments.
Proceedings of the ICEIS 2005, 2005

A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

A Trust based Access Control Framework for P2P File-Sharing Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Two-Phase Peer Evaluation in P2P E-Commerce Environments.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

An Authorization Architecture for Web Services.
Proceedings of the Data and Applications Security XIX, 2005

Designing Secure Wireless Mobile Ad Hoc Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Trust2: Developing Trust in Peer-to-Peer Environments.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Gestion efficace de la sécurité des communications de groupe pour le service SSM.
Technique et Science Informatiques, 2004

Tracing DoS Floods: An Automated Approach.
J. Network Syst. Manage., 2004

Fair Trading Protocol with Offline Anonymous Credit Card Payment.
Information Systems Security, 2004

Security for cluster based ad hoc networks.
Computer Communications, 2004

A Time-Based Peer Trust Evaluation in P2P E-commerce Environments.
Proceedings of the Web Information Systems, 2004

Trustworthy Computing (Extended Abstract).
Proceedings of the Web Information Systems, 2004

Modelling Trust Relationships in Distributed Environments.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

On the Design of a New Trust Model for Mobile Agent Security.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Fair Trading Protocol With Off-line Anonymous Credit Card Payment.
Proceedings of the Security In Information Systems, 2004

A Secure PIM-SM Multicast Routing Protocol.
Proceedings of the Distributed Computing, 2004

Authorization Service for Web Services and its Implementation.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Efficient secure group management for SSM.
Proceedings of IEEE International Conference on Communications, 2004

Counteracting TCP SYN DDoS attacks using automated model.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Interaction Trust Evaluation in Decentralized Environments.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004

Securing XML Document Sources and Their Distribution.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

Enhancing Grid Security with Trust Management.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
A Security Architecture for Mobile Agent Based Applications.
World Wide Web, 2003

Achieving secure and flexible M-services through tickets.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003

A formal graph based framework for supporting authorization delegations and conflict resolutions.
Int. J. Inf. Sec., 2003

Robust non-interactive oblivious transfer.
IEEE Communications Letters, 2003

On transformation of authorization policies.
Data Knowl. Eng., 2003

A secure multicast support framework for Mobile IP.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

A Logic Model for Temporal Authorization Delegation with Negation.
Proceedings of the Information Security, 6th International Conference, 2003

Supporting E-consent on Health Data by Logic.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

A Controller Agent Model to Counteract DoS Attacks in Multiple Domains.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Evaluation of Authorization with Delegation and Negation.
Proceedings of the Intelligent Information Processing and Web Mining, 2003

A novel dynamic key management scheme for secure multicasting.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Role-Based Access Control and the Access Control Matrix.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Authorisation Service in .Net My Services.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Reducing the scope of denial of service attacks in QoS routing.
Proceedings of the Global Telecommunications Conference, 2003

Decentralized Temporal Authorization Administration.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Secure Authorisation for Web Services.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Delegatable Authorization Program and Its Application.
Proceedings of the International Conference on Security and Management, 2003

A Secure Mental Poker Protocol Over The Internet.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

A Practical Method to Counteract Denial of Service Attacks.
Proceedings of the Computer Science 2003, 2003

An Authorization Model for E-consent Requirement in a Health Care Application.
Proceedings of the Applied Cryptography and Network Security, 2003

Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Management for eBusiness in the New Millennium: A Report on APNOMS 2001.
J. Network Syst. Manage., 2002

Group Cryptography: Signature and Encryption.
Informatica (Slovenia), 2002

Object Oriented Database with Authorization Policies.
Fundam. Inform., 2002

Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Security Policy Management in Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Logic-Based Reasoning on Delegatable Authorizations.
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002

A Secure Object Sharing Scheme for Java Card.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Resolving Conflicts in Authorization Delegations.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

m out of n Oblivious Transfer.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

Policy Administration Domains.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce.
Proceedings of the E-Commerce Security and Privacy, 2001

Role-Based Access Control and the Access Control Matrix.
Operating Systems Review, 2001

Tower: A Language for Role Based Access Control.
Proceedings of the Policies for Distributed Systems and Networks, 2001

Secure Networked Computing.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Secure Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

A Fair Electronic Cash Scheme.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

Robust and Secure Broadcasting.
Proceedings of the Progress in Cryptology, 2001

A Secure Transaction Environment for Workflows in Distributed Systems.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

A Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

Fair Exchange of Digital Signatures with Offline Trusted Third Party.
Proceedings of the Information and Communications Security, Third International Conference, 2001

RBAC for XML Document Stores.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Integrating Network Services for Virtual Teams.
Proceedings of the ICEIS 2001, 2001

A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols.
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001

A Strategy for MLS Workflow.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Public key cryptosystems based on boolean permutations and their applications.
Int. J. Comput. Math., 2000

Design and specification of role based access control policies.
IEE Proceedings - Software, 2000

Elements of a Language for Role-Based Access Control.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Distributed Signcryption.
Proceedings of the Progress in Cryptology, 2000

An Internet Anonymous Auction Scheme.
Proceedings of the Information Security and Cryptology, 2000

Towards a Generic Logic for Analysing Network Protocols.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Security enhanced mobile agents.
Proceedings of the CCS 2000, 2000

Towards a Protection Model for Supporting Multiple Access Control Policies.
Proceedings of the Australasian Database Conference, 2000

On the Analysis of On-Line Database Reorganization.
Proceedings of the Current Issues in Databases and Information Systems, 2000

Fair On-line Gambling.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Fail-Stop Confirmer Signatures.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes.
Theor. Comput. Sci., 1999

On the design of secure ATM networks.
Computer Communications, 1999

Towards Perfect Objects.
Proceedings of the TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 1999

On Formal Languages for Sequences of Authorization Transformations.
Proceedings of the Computer Safety, 1999

Secure Multicast Extensions for Mobile Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

Undeniable Confirmer Signature.
Proceedings of the Information Security, Second International Workshop, 1999

Delegated Decryption.
Proceedings of the Cryptography and Coding, 1999

Modified Chinese Remainder Theorem and Its Application to Proxy Signatures.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Message from the IWSEC Workshop Co-Chairs.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Issues in the Design of a Language for Role Based Access Control.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Batching Proofs of Knowledge and Its Applications.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

How to Prove That a Committed Number Is Prime.
Proceedings of the Advances in Cryptology, 1999

An Analysis of Access Control Models.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Authorization in Object Oriented Databases.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A Secure Communication Scheme for Multiagent Systems.
Proceedings of the Multiagent Platforms, 1998

A New Scheme of Credit based Payment for Electronic Commerce.
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998

Authorization in Enterprise-Wide Distributed System: A Practical Design and Application.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

Secure Signaling and Access Control for ATM Networks.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

Anonymous Secure E-Voting Over a Network.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

A High Level Language for Conventional Access Control Models.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Extending the Schematic Protection Model II: Revocation.
Operating Systems Review, 1997

High-speed network security. I. SMDS and frame relay.
Computer Communications, 1997

A Formal Security Design Approach for Transformation of Authorizations in Information Systems.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

Security services and public key infrastructure for ATM networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature.
Proceedings of the Information Security, First International Workshop, 1997

A New Efficient Off-line Anonymous Cash Scheme.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

A language for specifying sequences of authorization transformations and its applications.
Proceedings of the Information and Communication Security, First International Conference, 1997

A Logic For State Transformations in Authorization Policies.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Secure and Efficient Digital Coins.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Micro-Digital Money for Electronic Commerce.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Security Issues in Asynchronous Transfer Mode.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

New Micropayment Schemes Based on PayWords.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

Analysis and Implementation of a Formal Authorisation Policy Design Approach.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
An Access Control Model and Its Use in Representing Mental Health Application Access Policy.
IEEE Trans. Knowl. Data Eng., 1996

Joint Actions Based Authorization Schemes.
Operating Systems Review, 1996

Extending the schematic protection model - II. Revocation.
Computers & Security, 1996

Key management for a secure LAN-SMDS network.
Computer Communications, 1996

Design of enterprise-wide secure networked system.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Security model for distributed object framework and its applicability to CORBA.
Proceedings of the Information Systems Security, 1996

Security in High-Speed Networks.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996

Design of Secure End-toEnd Protocols for Mobile Systems.
IFIP World Conference on Mobile Communications, 1996

On The Design Of Secure Electronic Payment Schemes For Internet.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Support for joint action based security policies.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On the design of security protocols for mobile communications.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1994
A Secure Frame Relay Service.
Computer Networks and ISDN Systems, 1994

Extending the schematic protection model. I. Conditional tickets and authentication.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

1993
Authentication and Revocation in SPM (Extended Abstract).
Operating Systems Review, 1993

Security protocol for Frame Relay.
Computer Communication Review, 1993

Representation of mental health application access policy in a monotonic model.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
An Analysis of some Delegation Protocols for Distributed Systems.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
A petri net model for system design and refinement.
Journal of Systems and Software, 1991

Multilevel security in a distributed object-oriented system.
Computers & Security, 1991

Modified forms of cipher block chaining.
Computers & Security, 1991

An Analysis of the Proxy Problem in Distributed Systems.
IEEE Symposium on Security and Privacy, 1991

Hook-Up Property of Information Flow Secure Nets.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
A Multilevel Security Policy for Networks.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990

Petri Net Based Modelling of Information Flow Security Requirements.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

Network Security Policy Models.
Proceedings of the Advances in Cryptology, 1990

A multilevel security model for a distributed object-oriented system.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Verification of network security protocols.
Computers & Security, 1989

1987
Directed graph based representation for software system design.
Software Engineering Journal, 1987

Net-Based System Design Representation and Analysis.
Comput. Syst. Sci. Eng., 1987

1985
Extension of RSA Cryptosystems to Matrix Rings.
Cryptologia, 1985

Practical secure electronic mail system with public key distribution.
Computer Communications, 1985

Trapdoor Rings and Their Use in Cryptography.
Proceedings of the Advances in Cryptology, 1985

1983
Secure communications between microcomputer systems.
Computer Communications, 1983


  Loading...