Browse By Person: Reid, Jason
|Up a level|
Group by: Item Type | Date
Number of items: 33.
Fitzgerald, Brian F. & Reid, Jason F. (2005) Digital rights management (DRM) : managing digital rights for open access. In Rooney, David, Hearn, Greg, & Ninan, Abraham (Eds.) Handbook On The Knowledge Economy. Edward Elgar, Cheltenham, U.K., pp. 268-277.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Skandhakumar, Nimalaprakasan, Salim, Farzad, Reid, Jason F., & Dawson, Edward (2012) Physical access control administration using building information models. Lecture Notes in Computer Science : Cyberspace Safety and Security, 7672, pp. 236-250.
Skandhakumar, Nimalaprakasan, Reid, Jason F., Dawson, Ed, Drogemuller, Robin, & Salim, Farzad (2012) An authorization framework using building information models. The Computer Journal, 55(10), 1244 -1264.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.
Burdon, Mark, Reid, Jason F., & Low, Rouhshi (2010) Encryption safe harbours and data breach notification laws. Computer Law and Security Review, 26(5), pp. 520-534.
Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Reid, Jason F., Gonzalez Neito, Juan M., Tang, Tee, & Senadji, Bouchra (2006) Detecting Relay Attacks with Timing Based Protocols. .
Hauser, Christophe, Tronel, Frederic, Reid, Jason F., & Fidge, Colin J. (2012) A taint marking approach to confidentiality violation detection. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 83-90.
Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Burdon, Mark, von Nessen, Paul, Reid, Jason F., & Lane, William B. (2010) Australian data breach notification : avoiding the State/Federal overlap. In Proceedings of 5th International Conference on Legal, Security and Privacy Issues in IT Law, Universitat Pompeu Fabra, Barcelona.
Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.
Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Reid, Jason F. & Caelli, William J. (2005) DRM, Trusted Computing and Operating System Architecture. In Australasian Information Security Workshop (AISW) 2005, January 31 - February 3, Newcastle, Australia.
Reid, Jason F., Senadji, Bouchra, & Tang, Tee G. (2005) Security Considerations for Conducted and Radiated Emissions. In Asia Pacific Symposium on EMC Taipei - APEMC 2005, Taipei, Taiwan.
Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Reid, Jason (2004) Towards Practical Trusted Computing. In Kozan, E (Ed.) The Fifth Asia Pacific Industrial Engineering and Management Systems Conference (APIEMS) 2004, 12-15 December 2004, Gold Coast, Australia.
Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Reid, Jason F., Gonzalez Nieto, Juan M., Dawson, Edward P., & Okamoto, Eiji (2003) Privacy and Trusted Computing. In Fourteenth International Workshop on Database and Expert Systems Applications (DEXA 2003), September 1-5, 2003, Prague, Czech Republic.
Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.
Reid, Jason F. (2009) A matter of confidence : privacy compliance for connected-up enterprises. In 2nd International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2009), 1 September 2009, Auckland, New Zealand. (Unpublished)
Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Reid, Jason Frederick (2007) Enhancing security in distributed systems with trusted computing hardware. PhD thesis, Queensland University of Technology.