QUT ePrints

Browse By Person: Suriadi, Suriadi

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
Number of items: 31.

2007

Suriadi, Suriadi, Ashley, Paul, & Josang, Audun (2007) Future standardization areas in identity management systems. In 2nd PRIME Standardization Workshop, 14-15 June 2007, Zurich, Switzerland.
Number of full-text downloads 190

Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 506
Number of citations in Scopus 8

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Number of full-text downloads 201

2008

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 114
Number of citations in Scopus 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 97

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 137

Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Number of full-text downloads 250

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-centric Protocol for Conditional Anonymity Revocation. (In Press)
Number of full-text downloads 144

2009

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 2

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 227

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 433
Number of citations in Scopus 23
Number of citations in Web of Science® 14

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 64

2010

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 439

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 518
Number of citations in Scopus 2

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1

Suriadi, Suriadi (2010) Strengthening and formally verifying privacy in identity management systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 154

2011

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 192
Number of citations in Scopus 6

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 212

2012

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 112

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.
Number of full-text downloads 99

2013

Partington, Andrew, Wynn, Moe T., Suriadi, Suriadi, Ouyang, Chun, & Karnon, Jonathan (2013) Process mining for clinical processes : a comparative analysis of four Australian hospitals. [Working Paper] (Unpublished)

Suriadi, Suriadi, Ouyang, Chun, van der Aalst, Wil M.P., & ter Hofstede, Arthur (2013) Root cause analysis with enriched process logs. Lecture Notes in Business Information Processing [Business Process Management Workshops: BPM 2012 International Workshops Revised Papers], 132, pp. 174-186.
Number of full-text downloads 443
Number of citations in Scopus 5

Suriadi, Suriadi, Wynn, Moe T., Ouyang, Chun, ter Hofstede, Arthur H.M., & van Dijk, Nienke (2013) Understanding process behaviours in a large insurance company in Australia : a case study. In Advanced Information Systems Engineering - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, Valencia, Spain, pp. 449-464.
Number of full-text downloads 247

2014

Nguyen, Hoang, Dumas, Marlon, La Rosa, Marcello, Maggi, Fabrizio Maria, & Suriadi, Suriadi (2014) Mining business process deviance : a quest for accuracy. In 22nd International Conference on Cooperative Information Systems (CoopIS 2014), 27-31 October 2014, Amantea, Italy. (In Press)

Suriadi, Suriadi, Ouyang, Chun, van der Aalst, Wil M.P., & ter Hofstede, Arthur H.M. (2014) Event gap analysis : understanding why processes take time. (Unpublished)
Number of full-text downloads 21

Amoah, Raphael, Suriadi, Suriadi, Camtepe, Seyit A., & Foo, Ernest (2014) Security analysis of the non-aggressive challenge response of the DNP3 Protocol using a CPN Model. In IEEE International Conference on Communications (ICC 2014), 10-14 June 2014, Sydney, NSW.
Number of full-text downloads 24

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2014) Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security. (In Press)

Suriadi, Suriadi, Weiss, Burkhard, Winkelmann, Axel, ter Hofstede, Arthur H.M., Adams, Michael, Conforti, Raffaele, et al. (2014) Current research in risk-aware business process management : overview, comparison, and gap analysis. Communications of the Association for Information Systems, 34(1), pp. 933-984.
Number of full-text downloads 52

Suriadi, Suriadi, Mans, Ronny S., Wynn, Moe T., Partington, Andrew, & Karnon, Jonathan (2014) Measuring patient flow variations : a cross-organisational process mining approach. Asia Pacific Business Process Management, 181, pp. 43-58.

Seifi, Y, Suriadi, S, Foo, E, & Boyd, C (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks, 9(2), pp. 85-103.

This list was generated on Sat Sep 27 07:13:44 2014 EST.