Browse By Person: Caelli, William
|Up a level|
Group by: Item Type | Date
Number of items: 47.
Ang, Kok-Ming & Caelli, William (2001) Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? In Trusted Information: The New Decade Challenge. Kluwer Academic publishers, Boston, USA, pp. 19-34.
Georgiades, Jenny, Caelli, William, Christensen, Sharon, & Duncan, William D. (2013) Crisis on impact : responding to cyber attacks on critical information infrastructures. The John Marshall Journal of Information Technology and Privacy Law, 30(1), pp. 31-66.
Liu, Vicky, Caelli, William, & Chen, Yu-Nien Maggie (2013) Using a public key registry for improved trust and scalability in national E-health systems. International Journal of E-Health and Medical Communications, 4(4), pp. 66-83.
Goonasekera, Nuwan A., Caelli, William, & Fidge, Colin (2012) A hardware virtualization-based component sandboxing architecture. Journal of Software, 7(9), pp. 2107-2118.
Shen, Pei Yuan, Tang, Maolin, Liu, Vicky, & Caelli, William (2012) Performance and scalability assessment for non-certificate-based public key management in VANETS. International Journal of Information Security and Privacy, 6(1), pp. 33-56.
Christensen, Sharon, Duncan, William, Caelli, Bill, & Georgiades, Jenny (2010) An achilles heel: Denial of service attacks on Australian critical information infrastructures. Information and Communication Technology Law, 19(1), pp. 61-85.
Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2008) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. electronic Journal of Health Informatics, 3(1), pp. 1-14.
Cradduck, Lucy, Caelli, Bill, & McCullagh, Adrian (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy Online, Spring, pp. 1-43.
Caelli, William (2007) Application Security - Myth or Reality? Lecture Notes in Computer Science, 4464, pp. 1-10.
Caelli, William, Gaskell, Gary, Kwok, Lam For, & Longley, Dennis (2006) A Model to Support Information Security Governance. Information Risk Management & Audit Journal, 16(1), pp. 7-24.
Caelli, William, Gaskell, Gary, & Longley, Dennis (2005) High Trust Integrity Controls. Information Risk Management & Audit (IRMS) Journal, 15(3), pp. 5-8.
Caelli, William (2002) Trusted ... Or ... Trustworthy: The Search For A New Paradigm For Computer And Network Security. Computers and Security, 21(5), pp. 413-420.
Caelli, William, Little, Peter, & McCullagh, Adrian (2001) Signature Stripping: A Digital Dilemna. Journal of Information Law & Technology (JILT), pp. 1-13.
Tesfamicael, Aklilu Daniel, Liu, Vicky, & Caelli, William (2015) Design and implementation of unified communications as a service based on the OpenStack cloud environment. In IEEE International Conference on Computational Intelligence and Communication Technology (CICT-2015), 13 - 14 February 2015, Ghaziabad U.P., India.
Tesfamicael, Aklilu Daniel, Liu, Vicky, Caelli, William, & Zureo, Jonathan (2014) Implementation and evaluation of open source unified communications for SMBs. In IEEE International Conference on Computational Intelligence and Communication Networks, 14-16 November 2014, Udaipur, India.
Wong, Andrew, Liu, Vicky, Caelli, William, & Camtepe, Seyit (2014) Dataset validation within big data security architecture. In International Workshop of Information Technology and Internet Finance (PACIS 2014), 24-28 June 2014, Chengdu, China.
Caelli, William, Liu, Vicky, & Chang, She-I (2014) Trust in merged ERP and open data schemes in the “Cloud”. In 2014 International Conference on Accounting and Information Technology, 21-23 February 2014, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Caelli, William, Liu, Vicky, & Longley, Dennis (2013) Background to the development of a curriculum for the history of “cyber” and “communications” security. In Dodge Jr., R.C. & Futcher, L. (Eds.) Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8 Proceedings [IFIP Advances in Information and Communication Technology, Volume 406], Springer, Auckland, New Zealand, pp. 39-47.
Caelli, William, Liu, Vicky, & Chang, She-I (2013) Identity, addressing, authenticity and audit requirements for trust in ERP, analytics and big/open data in a “Cloud” computing environment : a review and proposal. In 2013 Forensic Accounting and Personal Information Protection International Forum, 22-23 November 2013, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Shen , Pei-Yuan , Liu, Vicky, & Caelli, William (2012) A viable and sustainable key management approach for a national e-health environment. In Proceedings of the 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), IEEE, Beijing, China, pp. 347-352.
Liu, Vicky, Caelli, William, Yang, Yingsen, & May, Lauren (2011) A test vehicle for compliance with resilience requirements in index-based e-health systems. In Chang, She-I (Ed.) Pacific Asia Conference on Information Systems (PACIS) 2011, 7-11 July 2011, Queensland University of Technology, Brisbane, Qld.
Albeshri, Aiiad Ahmad & Caelli, William (2010) Mutual protection in a cloud computing environment. In IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), IEEE Computer Society, Melbourne, 641-646 .
Liu, Vicky, Caelli, William, Smith, Jason, May, Lauren J., Lee, Min Hui, Ng, Zi Hao, et al. (2010) A secure architecture for Australia’s index based e-health environment. In Maeder , Anthony & Hansen, David (Eds.) Proceedings of The Australasian Workshop on Health Informatics and Knowledge Management (part of Australasian Computer Science Week ACSW 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland.
Caelli, William J., Kwok, Lam-For, & Longley, Dennis (2010) A Business Continuity Management Simulator. In Security and Privacy – Silver Linings in the Cloud, Brisbane, QLD, pp. 9-18.
Goonasekera, Nuwan A., Caelli, William J., & Sahama, Tony R. (2009) 50 Years of Isolation. In IEEE Computer Society, IEEE Computer Society Conference Publishing Services (CPS), Brisbane, Australia, pp. 54-60.
Liu, Vicky, Franco, Luis , Caelli, William, May, Lauren, & Sahama , Tony (2009) Open and trusted information systems/health informatics access control (OTHIS/HIAC). In Brankovic, Ljiljana & Susilo, Willy (Eds.) Seventh Australasian Information Security Conference (AISC 2009), Australian Computer Science, Wellington, New Zealand, pp. 99-108.
Liu, Vicky, Caelli, William J., May , Lauren , & Sahama , Tony (2009) Privacy and security in open and trusted health information systems. In Warren, James R. (Ed.) Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2009), Australian Computer Society, Wellington, New Zealand, pp. 25-30.
Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis (2008) Feasibility of automated information security compliance auditing. In Jajodia, S, Samarati, P, & Cimato, S (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Caelli, Bill, McNair, Neil, & Smith, Leslie (2008) Information assurance education in a specialist defence environment. In Dodge, Ron (Ed.) Proceedings from the Twelfth Colloquium for Information Systems Security Education, 2-4 June 2008, United States of America, Dallas, Texas.
Liu, Vicky, Caelli, William J., May, Lauren J., & Croll, Peter R. (2008) Open Trusted Health Informatics Structure(OTHIS). In Yu, Ping, Warren, James R., Yearwood, John, & Patrick, Jon (Eds.) Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 22nd - 25th January 2008, University of Wollongong NSW Australia.
Henricksen, Matthew P. W., Caelli, William J., & Croll, Peter R. (2007) Securing grid data using mandatory access controls. In Brankovic, L., Coddington, P., & Roddick, J. (Eds.) ACSW Frontiers 2007, Australian Computer Society, Ballarat, Australia, pp. 25-32.
Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2007) A Sustainable Approach to Security and Privacy in Health Information Systems. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, Dave (Eds.) 18th Australasian Conference on Information Systems, 5-7 December, Toowoomba, Qld, Australia.
Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Caelli, William & Holford, John (2006) The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Liu, Vicky, Caelli, William J., & May, Lauren J. (2006) Strengthening legal compliance for privacy in electronic health information systems : a review and analysis. In Croll, P., Morarji, H., & Au, R. (Eds.) National E-Health Privacy and Security Symposium 2006, 24-25 October 2006, Brisbane, Qld, Australia.
Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.
Branagan, Mark, Caelli, William, & Longley, Dennis (2005) Security Modelling for Risk Assessment. In Mendis, P, Lai, J, & Dawson, E (Eds.) Rcent Advances in Counter-Terrorism Technology and Infrastructure Protection, July 2005, Australia, Canberra.
Caelli, William & McCullagh, Adrian (2005) Who Goes There? Internet Banking: A Matter of Risk and Reward. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Caelli, William, Holford, John, Looi, Mark, & Vasanta, Hari (2004) Architecture for Securing Critical Infrastructure Using Content-Aware Self-Defending Objects. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.
Caelli, William (2004) Trusted Systems: The Major Need for Enterprise Interaction on a Global Basis. In Ip, H, Shi, Y, & Zhang, X (Eds.) Proceedings of the Tenth Joint International Computer Conference (JICC 2004), 4-6 November 2004, Kunming, China.
Caelli, William, Holford, John, & Rhodes, Anthony (2004) Using Self-Defending Objects to Develop Security Aware Applications in Java. In Estivill-Castro, Vladimir (Ed.) Computer Science 2004, January 2004, Dunedin, New Zealand.
Liu, Vicky, Caelli, William J., Foo, Ernest, & Russell, Selwyn V. (2004) Visually Sealed and Digitally Signed Documents. In 27th Australasian Computer Science Conference, 19 - 23 January 2004, The University of Otago, Dunedin, New Zealand.
Caelli, William (2003) Big Cuckoos, Giant Eggs: The Home Computer as NIIP Threat. In Slay, J (Ed.) 4th Australian Information Warfare & IT Security Conference Enhancing Trust, 20-21 November, 2003, Adelaide, Australia.
Holford, John W., Caelli, William J., & Rhodes, Anthony W. (2003) The Concept of Self-Defending Objects in the Development of Security Aware Applications. In 4th Australian Information Warfare and IT Security Conference, 20-21 November 2003, Adelaide, Australia.
Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.
Caelli, William & Rhodes, Anthony (2001) R2ML: A Roles and Rights Mark Up Language for Role Based Access Control in a J2EE Based Distributed E-Commerce Environment. In Seventh International Conference on Distributed Multimedia Systems, 26-28 September 2001.
Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.