Browse By Person: Reid, Jason
|Up a level|
Group by: Item Type | Date
Number of items: 33.
Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Reid, Jason (2004) Towards Practical Trusted Computing. In Kozan, E (Ed.) The Fifth Asia Pacific Industrial Engineering and Management Systems Conference (APIEMS) 2004, 12-15 December 2004, Gold Coast, Australia.
Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.
Fitzgerald, Brian F. & Reid, Jason F. (2005) Digital rights management (DRM) : managing digital rights for open access. In Rooney, David, Hearn, Greg, & Ninan, Abraham (Eds.) Handbook On The Knowledge Economy. Edward Elgar, Cheltenham, U.K., pp. 268-277.
Reid, Jason F., Senadji, Bouchra, & Tang, Tee G. (2005) Security Considerations for Conducted and Radiated Emissions. In Asia Pacific Symposium on EMC Taipei - APEMC 2005, Taipei, Taiwan.
Reid, Jason F., Gonzalez Neito, Juan M., Tang, Tee, & Senadji, Bouchra (2006) Detecting Relay Attacks with Timing Based Protocols. .
Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Reid, Jason Frederick (2007) Enhancing security in distributed systems with trusted computing hardware. PhD thesis, Queensland University of Technology.
Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.
Reid, Jason F. (2009) A matter of confidence : privacy compliance for connected-up enterprises. In 2nd International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2009), 1 September 2009, Auckland, New Zealand. (Unpublished)
Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Burdon, Mark, Reid, Jason F., & Low, Rouhshi (2010) Encryption safe harbours and data breach notification laws. Computer Law and Security Review, 26(5), pp. 520-534.
Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Burdon, Mark, von Nessen, Paul, Reid, Jason F., & Lane, William B. (2010) Australian data breach notification : avoiding the State/Federal overlap. In Proceedings of 5th International Conference on Legal, Security and Privacy Issues in IT Law, Universitat Pompeu Fabra, Barcelona.
Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.
Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.
Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Skandhakumar, Nimalaprakasan, Salim, Farzad, Reid, Jason F., & Dawson, Edward (2012) Physical access control administration using building information models. Lecture Notes in Computer Science : Cyberspace Safety and Security, 7672, pp. 236-250.
Skandhakumar, Nimalaprakasan, Reid, Jason F., Dawson, Ed, Drogemuller, Robin, & Salim, Farzad (2012) An authorization framework using building information models. The Computer Journal, 55(10), 1244 -1264.
Hauser, Christophe, Tronel, Frederic, Reid, Jason F., & Fidge, Colin J. (2012) A taint marking approach to confidentiality violation detection. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 83-90.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.