460499. Cybersecurity and privacy not elsewhere classified


Title460499. Cybersecurity and privacy not elsewhere classified
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
Efficient intrusion detection scheme based on SVM
Zhou, Guangping and Shrestha, Anup. 2013. "Efficient intrusion detection scheme based on SVM." Journal of Networks. 8 (9), pp. 2128-2134. https://doi.org/10.4304/jnw.8.9.2128-2134

Article

Medico legal issues
Mackenzie, Geraldine and Carter, Hugh. 2010. "Medico legal issues." Hovenga, Evelyn J. S., Kidd, Michael R., Garde, Sebastian, Hullin, Carola and Cossio, Lucay (ed.) Health informatics: an overview. Amsterdam, Netherlands . IOS Press. pp. 176-182

Edited book (chapter)

Metadata in organisational surveys
Machin, Tony. 2013. "Metadata in organisational surveys." Lacey, Ron (ed.) Advances in organisational research methods and analysis. New York, United States. Chamber & Row. pp. 74-85

Edited book (chapter)

A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1

Article

A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717

Article

A model for security and privacy in e-health
Wang, Peishun and Soar, Jeffrey. 2012. "A model for security and privacy in e-health." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Irvine, CA. United States.

Paper

Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423

Article

Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings
Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wang, Hua (ed.) 2012. Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings . Heidelberg, Germany. Springer.

Edited book

Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028

Article

An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223

Article

On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724

Article

Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449

Article

Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment
Zhang, Zhongwei and Zhou, Hong. 2012. "Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment." Hochin, Teruhisa and Lee, Rodger (ed.) 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012). Kyoto, Japan 08 - 10 Aug 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2012.103

Paper

Conflict of laws and the cloud
Gray, Anthony. 2013. "Conflict of laws and the cloud." Computer Law and Security Review: the International Journal of Technology Law and Practice. 29 (1), pp. 58-65. https://doi.org/10.1016/j.clsr.2012.11.004

Article

Does the android permission system provide adequate information privacy protection for end-users of mobile apps?
Lane, Michael. 2012. "Does the android permission system provide adequate information privacy protection for end-users of mobile apps?" Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth Western Australia.

Paper

An information security awareness capability model (ISACM)
Poepjes, Robert and Lane, Michael. 2012. "An information security awareness capability model (ISACM)." Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth, Western Australia.

Paper

Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24

Paper

Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8

Article

Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866

Paper

Using automated individual white list to protect web digital identities
Han, Weili, Cao, Ye, Bertino, Elisa and Yong, Jianming. 2012. "Using automated individual white list to protect web digital identities ." Expert Systems with Applications. 39 (15), pp. 11861-11869. https://doi.org/10.1016/j.eswa.2012.02.020

Article

Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705

Paper

Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34

Paper

Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748

Article

Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4

Article

A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057

Article

Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005

Article

Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020

Article

Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6

Article

A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007

Article

A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928

Paper

Building a distributed authenticating CDN
Moffatt, Sam. 2011. "Building a distributed authenticating CDN ." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053930

Paper

Constructing robust digital identity infrastructure for future networked society
Yong, Jianming, Tiwari, Sanjib, Huang, Xiaodi and Jin, Qun. 2011. "Constructing robust digital identity infrastructure for future networked society." Shen, Weiming, Barth├Ęs, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960129

Paper

A novel secure routing protocol for MANETs
Zhang, Zhongwei. 2011. "A novel secure routing protocol for MANETs." Wang, Xin (ed.) Mobile ad-hoc networks: protocol design. Rijeka, Croatia. In-Tech. pp. 455-466

Edited book (chapter)

Five criteria for web-services security architecture
Addie, R. G. and Colman, Alan. 2010. "Five criteria for web-services security architecture." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 https://doi.org/10.1109/NSS.2010.100

Paper

A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains
Zhang, Zhongwei and Zhou, Hong. 2011. "A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains." Chowdhury, Morshed, Ray, Sid and Lee, Roger (ed.) 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011). Sydney, Australia 06 - 08 Jul 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2011.32

Paper

Security and privacy preservation for mobile e-learning via digital identity attributes
Yong, Jianming. 2011. "Security and privacy preservation for mobile e-learning via digital identity attributes." Journal of Universal Computer Science. 17 (2), pp. 296-310. https://doi.org/10.3217/jucs-017-02-0296

Article

Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8

Article

Privacy preserving data sharing in data mining environment
Sun, Xiaoxun. 2010. Privacy preserving data sharing in data mining environment. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis