4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54

Paper

Wireless applications: influences and risks of location identification technologies
Gururajan, Raj. 2001. "Wireless applications: influences and risks of location identification technologies." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001

Paper

On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14

Paper

Student-accessible tools and techniques to aid in teaching network protocols
Norman, Mark and Leis, John. 2004. "Student-accessible tools and techniques to aid in teaching network protocols." 15th Annual Conference of the Australasian Association for Engineering Education (AAEE 2004). Toowoomba, Australia 27 - 29 Sep 2004 Melbourne, Australia.

Paper

An analysis of information security in selected Australian organisations
Darragh, Warren J.. 2009. An analysis of information security in selected Australian organisations. Masters Thesis Master of Information Technology (Research). University of Southern Queensland.

Masters Thesis

A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Xiang, Wei, Desai, Bhavin, Wen, Paul, Wang, Yafeng and Peng, Tianshu. 2009. "A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_33

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48

Paper

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

Enhancing the privacy of e-learning systems with alias and anonymity
Yong, Jianming. 2008. "Enhancing the privacy of e-learning systems with alias and anonymity." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-92719-8

Paper

Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121

Paper

The current state of information technology governance literature
Buckby, Sherrena, Best, Peter and Stewart, Jenny. 2009. "The current state of information technology governance literature." Cater-Steel, Aileen (ed.) Information technology governance and service management: frameworks and adaptations. Hershey, PA. USA. IGI Global. pp. 1-43

Edited book (chapter)

Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011

Article

An intelligent scheme of secure routing for mobile ad hoc networks
Zhang, Zhongwei. 2009. "An intelligent scheme of secure routing for mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813739

Poster

ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707

Paper

(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650

Paper

Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29

Paper

On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30

Paper

XML and web services security
Sun, Lili and Li, Yan. 2008. "XML and web services security." CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design. Xi'an, China 16 - 18 Apr 2008 Piscataway, NJ, USA. https://doi.org/10.1109/CSCWD.2008.4537075

Paper

Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29

Paper

New data integration workflow design for e-learning
Xi, Shengtian and Yong, Jianming. 2007. "New data integration workflow design for e-learning." Lecture Notes in Computer Science (Book series). 4402, pp. 699-707. https://doi.org/10.1007/978-3-540-72863-4_71

Article

Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917

Article

Digital identity design and privacy preservation for e-learning
Yong, Jianming. 2007. "Digital identity design and privacy preservation for e-learning." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Melbourne, Australia. https://doi.org/10.1109/CSCWD.2007.4281549

Paper

Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30

Paper

A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.

Paper

Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469

Edited book (chapter)

Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288

Article

Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20

Paper

Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66

Paper

Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21

Paper

A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111

Paper

A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007

Article

Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239

Edited book (chapter)

Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13

Paper