4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.

Article

Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24

Paper

Wireless handheld device and LAN security issues: a case study
Gururajan, Raj and Hafeez-Baig, Abdul. 2011. "Wireless handheld device and LAN security issues: a case study." Kerr, Don, Gammack, John G. and Bryant, Kay (ed.) Digital business security development: management technologies. Hershey, PA, USA. IGI Global. pp. 129-151

Edited book (chapter)

Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193

Edited book (chapter)

A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28

Paper

A Survey on Latest Botnet Attack and Defense
Zhang, Lei, Yu, Shui, Wu, Di and Watters, Paul. 2011. "A Survey on Latest Botnet Attack and Defense ." 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 China. https://doi.org/10.1109/TrustCom.2011.11

Paper

Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880

Paper

Specify and enforce the policies of quantified risk adaptive access control
Chen, Chen, Han, Weili and Yong, Jianming. 2010. "Specify and enforce the policies of quantified risk adaptive access control." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 United States.

Paper

Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11

Paper

Digital identity control mechanism for e-learning
Yong, Jianming. 2009. "Digital identity control mechanism for e-learning." IEEE International Symposium on IT in Medicine and Education (ITME 2009) . Jinan, China 14 - 16 Aug 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ITIME.2009.5236204

Paper

The adoption of single sign-on and multifactor authentication in organisations: a critical evaluation using TOE framework
D'Costa-Alphonso, Marise-Marie and Lane, Michael. 2010. "The adoption of single sign-on and multifactor authentication in organisations: a critical evaluation using TOE framework." Issues in Informing Science and Information Technology. 7, pp. 161-190.

Article

Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.

Paper

Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.

Paper

Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.

Paper

Joomla! 1.6 security
Moffatt, Sam. 2010. "Joomla! 1.6 security." MSC Malaysia Open Source Conference (2010). Kuala Lumpur, Malaysia 29 Jun - 01 Jul 2010 Kuala Lumpur, Malaysia.

Presentation

Securing your Joomla! site
Moffatt, Sam. 2009. "Securing your Joomla! site." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.

Presentation

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.

Paper

Chinese government and software copyright: manipulating the boundaries between public and private
Lu, Jia and Weber, Ian. 2008. "Chinese government and software copyright: manipulating the boundaries between public and private ." International Journal of Communication. 2, pp. 81-99.

Article

Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.

Paper

A trust degree based access control in grid environments
Luo, Junzhou, Ni, Xudong and Yong, Jianming. 2009. "A trust degree based access control in grid environments." Information Sciences. 179 (15), pp. 2618-2628. https://doi.org/10.1016/j.ins.2009.01.039

Article

Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.

Paper

Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782

Article

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

An Achilles heel: denial of service attacks on Australian critical information infrastructures
Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059

Article

Continuous fraud detection in enterprise systems through audit trial analysis
Best, Peter J., Rikhardsson, Pall and Toleman, Mark. 2009. "Continuous fraud detection in enterprise systems through audit trial analysis." Journal of Digital Forensics, Security and Law. 4 (1), pp. 39-60.

Article

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article

Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective
Ally, Mustafa and Toleman, Mark. 2004. "Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective." IEEE International Conference on E-Commerce Technology 2004. San Diego, United States 06 - 09 Jul 2004 Piscataway, NJ, USA. https://doi.org/10.1109/ICECT.2004.1319756

Paper

A critical analysis of buyer authenticated credit card payment programs: the online merchant's perspective
Ally, Mustafa and Toleman, Mark. 2004. "A critical analysis of buyer authenticated credit card payment programs: the online merchant's perspective." e-Biz World Conference 2004. Seoul, Korea 25 Feb 2004

Paper

Acts of faith
Ally, Mustafa and Toleman, Mark. 2003. "Acts of faith." Australian CPA. 73 (10), pp. 60-61.

Article

Self-authentication of encrypted channels in service network graph
Lai, David and Zhang, Zhongwei. 2008. "Self-authentication of encrypted channels in service network graph." Cao, Jiang, Li, Minglu, Weng, Chuliang, Xiang, Yang, Wang, Xin, Tang, Hong, Hong, Feng, Liu, Hong and Wang, Yinglin (ed.) IFIP International Conference on Network and Parallel Computing (NPC 2008). Shanghai, China 18 - 21 Oct 2008 Los Alamitos, CA. United States. https://doi.org/10.1109/NPC.2008.20

Paper

Improving efficiency and scalability of service network graph by re-routing service routes
Lai, David and Zhang, Zhongwei. 2009. "Improving efficiency and scalability of service network graph by re-routing service routes." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ACIIDS.2009.31

Paper

Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).

Article

Micro-chipping away at privacy: privacy implications created by the new Queensland driver licence proposal
Hart, Caroline. 2007. "Micro-chipping away at privacy: privacy implications created by the new Queensland driver licence proposal." QUT Law Review. 7 (2), pp. 305-324.

Article

Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19

Paper

An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.

Paper

Replacing lost or stolen e-passports
Yong, Jianming and Bertino, Elisa. 2007. "Replacing lost or stolen e-passports." Computer. 40 (10), pp. 89-91. https://doi.org/10.1109/MC.2007.360

Article

Enforcing secure access control in integrated systems over the internet
Yong, Jianming, Lane, Michael S., Toleman, Mark and Yang, Yun. 2003. "Enforcing secure access control in integrated systems over the internet." 1st Australian Information Security Management Conference. Perth, Western Australia 24 Nov 2003 Perth, Western Australia.

Paper

Security modelling for e-learning
Yong, Jianming. 2007. "Security modelling for e-learning." Liu, Hong, Hu, Bin and Zheng, Xiangwei (ed.) 1st International Symposium on Information Technologies and Applications in Education (ISITAE 07). Kunming, China 23 - 25 Nov 2007 Beijing, China.

Paper

XML undeniable signatures
Sun, Lili and Li, Yan. 2005. "XML undeniable signatures." Mohammadian, M. (ed.) International Conference on Intelligent Agents, Web Technologies & Internet Commerce (2005). Vienna, Austria 28 - 30 Nov 2005 USA.

Paper