William J. Caelli

According to our database1, William J. Caelli authored at least 59 papers between 1979 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market.
IEEE Access, 2021

2020
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market.
IEEE Access, 2020

2019
An Adaptive and Autonomous LoRa Gateway for Throughput Optimisation.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
A Viable LoRa Framework for Smart Cities.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
Modeling for performance and security balanced trading communication systems in the cloud.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2015
LibVM: an architecture for shared library sandboxing.
Softw. Pract. Exp., 2015

An Architecture for Trustworthy Open Data Services.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Network security metrics and performance for healthcare systems management.
Proceedings of the 17th International Conference on E-health Networking, 2015

2013
Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems.
Int. J. E Health Medical Commun., 2013

Evolving a Secure Internet.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.
Proceedings of the Information Assurance and Security Education and Training, 2013

2012
A Hardware Virtualization Based Component Sandboxing Architecture.
J. Softw., 2012

Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs.
Int. J. Inf. Secur. Priv., 2012

Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners.
Comput. Secur., 2012

A viable and sustainable key management approach for a national e-health environment.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

2010
A Business Continuity Management Simulator.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Mutual Protection in a Cloud Computing Environment.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Society - Totally Dependent Upon ICT? Introduction to the CIP-2010 Conference Proceedings.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC).
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Feasibility of Automated Information Security Compliance Auditing.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM.
Proceedings of the New Approaches for Security, 2007

Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

Application Security - Myth Or Reality?
Proceedings of the Information Security Practice and Experience, 2007

Securing Grid Data Using Mandatory Access Controls.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

2006
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
DRM, Trusted Computing and Operating System Architecture.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

Who Goes There? Internet Banking: A Matter of Risk and Reward.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Visually Sealed and Digitally Signed Documents.
Proceedings of the Computer Science 2004, 2004

Using Self-Defending Objects to Develop Security Aware Applications in Java.
Proceedings of the Computer Science 2004, 2004

2002
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security.
Comput. Secur., 2002

2001
Signature Stripping: A Digital Dilemma.
J. Inf. Law Technol., 2001

Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Non-Repudiation in the Digital Environment.
First Monday, 2000

1999
PKI, elliptic curve cryptography, and digital signatures.
Comput. Secur., 1999

A Secure Electronic Commerce Environment: Only with 'Smart Cards'.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
A Data Driven Model for Designing Applications with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997

Information Security in electronic Commerce.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

1995
The CASS Shell.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Commercial Key Escrow: An Australian Perspective.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Security in Open and Distributed Systems.
Inf. Manag. Comput. Secur., 1994

A framework for information security evaluation.
Inf. Manag., 1994

A note on supplying a trusted clock via a secure device.
Comput. Secur., 1994

A computer package for measuring the strength of encryption algorithms.
Comput. Secur., 1994

1993
A Model for Information Security Management.
Inf. Manag. Comput. Secur., 1993

Cryptographic Application Programming Interfaces (APIs).
Comput. Secur., 1993

1992
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC.
Comput. Secur., 1992

Measuring the Strength of Ciphers.
Proceedings of the IT Security: The Need for International Cooperation, 1992

A Methodology for Describing Information and Physical Security Architectures.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1991
File Security in Wordperfect 5.0.
Cryptologia, 1991

1990
Implications of the tax file number legislation for computer professionals.
Aust. Comput. J., 1990

Comparison of Block Ciphers.
Proceedings of the Advances in Cryptology, 1990

1988
Electronic Funds Transfer Systems.
Aust. Comput. J., 1988

1987
Guidelines for Privacy and Security in Computer Systems.
Aust. Comput. J., 1987

1985
Privacy and security in Office Automation Systems.
Aust. Comput. J., 1985

1979
The CODASYL 1978 Data Base Proposals: An Overview and Discussion.
Aust. Comput. J., 1979


  Loading...