A framework for role-based group delegation in distributed environments

Paper


Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Paper/Presentation Title

A framework for role-based group delegation in distributed environments

Presentation TypePaper
AuthorsWang, Hua (Author), Li, Jiuyong (Author), Addie, Ron (Author), Dekeyser, Stijn (Author) and Watson, Richard (Author)
EditorsEstivill-Castro, Vladimir and Dobbie, Gillian
Journal or Proceedings TitleConferences in Research and Practice in Information Technology
Journal Citation48, pp. 321-328
Number of Pages8
Year2006
Place of PublicationAustralia
ISBN1920682309
Web Address (URL) of Paperhttps://dl.acm.org/doi/10.5555/1151699.1151735
Web Address (URL) of Conference Proceedingshttps://dl.acm.org/doi/proceedings/10.5555/1151699
Conference/Event29th Australasian Computer Science Conference (ACSC 2006)
Event Details
29th Australasian Computer Science Conference (ACSC 2006)
Event Date
16 to end of 19 Jan 2006
Event Location
Hobart, Australia
Abstract

Role-based delegation model(RBDM) based on the role-based access model (RBAM) has proven to be a flexible and useful access control model for information sharing in a distributed collaborative environment. In today's highly dynamic distributed systems, a user often needs to delegate a role to all members of a group at the same time. It presents the challenge of how to build a role-based group delegation framework within RBAC in distributed environment.
This paper aims to build a group delegation framework within RBAC. The framework includes a role-based group delegation granting model, group delegation revocation model, granting authorization and revocation authorization. We analyse various revocations and the impact of revocations on role heirarchies. The implementation with XML based tools demonstrates the framework and authorization methods. Finally comparisons with other related work are indicated.

Keywordsgroup delegation, RBAC, RBDM, group authorization.
ANZSRC Field of Research 2020460902. Decision support and group support systems
Public Notes

File reproduced in accordance with the copyright policy of the publisher/author.

Byline AffiliationsDepartment of Mathematics and Computing
Permalink -

https://research.usq.edu.au/item/9x992/a-framework-for-role-based-group-delegation-in-distributed-environments

Download files


Published Version
  • 2325
    total views
  • 504
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds
Downs, Nathan, Raj, Nawin, Vanos, Jennifer, Parisi, Alfio, Butler, Harry, Deo, Ravinesh, Igoe, Damien, Dexter, Benjamin, Beckman-Downs, Melanie, Turner, Joanna and Dekeyser, Stijn. 2023. "The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds." Photochemistry and Photobiology. 99 (4), pp. 1193-1207. https://doi.org/10.1111/php.13745
Inference of Social Network Behavior from Internet Traffic Traces
Albdair, Mostfa, Addie, Ronald G. and Fatseas, David. 2016. "Inference of Social Network Behavior from Internet Traffic Traces." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 United States. https://doi.org/10.1109/ATNAC.2016.7878773
A novel file system supporting rich file classification
Albadri, Nehad and Dekeyser, Stijn. 2022. "A novel file system supporting rich file classification." Computers and Electrical Engineering. 103, pp. 1-9. https://doi.org/10.1016/j.compeleceng.2022.108081
Bi-Directional Grid Constrained Stochastic Processes' Link to Multi-Skew Brownian Motion
Taranto, Aldo, Addie, Ron and Khan, Shahjahan. 2022. "Bi-Directional Grid Constrained Stochastic Processes' Link to Multi-Skew Brownian Motion." Journal of Applied Probability and Statistics. 17 (1), pp. 101-133.
A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166
Sum-rate optimal communication under different power constraints
Alhasnawi, Mohammad Kaisb Layous and Addie, Ronald G.. 2019. "Sum-rate optimal communication under different power constraints." Obaidat, Mohammad, Callegari, Christian, van Sinderen, Marten, Novais, Paulo, Sarigiannidis, Panagiotis, Battiato, Sebastiano, de leon, Angel Serrano Sanchez, Lorenz, Pascal and Davoli, Franco (ed.) 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019). Prague, Czech Republic 26 - 28 Jul 2019 https://doi.org/10.5220/0007957203730380
Experiments and proofs in web-service security
Sheniar, Dawood, Hadaad, Nabeel, Martin, David, Addie, Ron and Abdulla, Shahab. 2018. "Experiments and proofs in web-service security." Harris, Richard, Gregory, Mark, Tran-Gia, Phuoc and Pawlikowski, Krys (ed.) 28th International Telecommunication Networks and Application Conference: Experiments and Proofs in Web-service Security (ITNAC 2018). Sydney, Australia 21 - 23 Nov 2018 New York, United States. https://doi.org/10.1109/ATNAC.2018.8615367
Iterated logarithm bounds of bi-directional grid constrained stochastic processes
Taranto, Aldo, Khan, Shahjahan and Addie, Ron. 2021. "Iterated logarithm bounds of bi-directional grid constrained stochastic processes." Global and Stochastic Analysis. 8 (3), pp. 19-39.
Better Service from Understanding the Social Network Behaviour in the Internet
Albdair, Mostfa, Addie, Ronald G. and Kist, Alexander. 2019. "Better Service from Understanding the Social Network Behaviour in the Internet." 2018 IEEE Region 10 Conference (TENCON 2018). Jeju, South Korea 28 - 31 Oct 2018 Piscataway, United States. https://doi.org/10.1109/TENCON.2018.8650301
Spectral density constraints on wireless communication
Alhasnawi, Mohammad Kaisb Layous, Abdulla, Shahab, Fatseas, David and Addie, Ronald G.. 2020. "Spectral density constraints on wireless communication." Heliyon. 6 (5), pp. 1-7. https://doi.org/10.1016/j.heliyon.2020.e03979
Mathematica code for implementing the aggregate EMF
Alhasnawi, Mohammad and Addie, Ron. 2020. Mathematica code for implementing the aggregate EMF. Heliyon Journal.
Emergency Network Design – Saving Lives by Saving Power
Hadaad, Nabeel, Pitsillides, Andreas, Kolios, Panayiotis, Addie, Ronald G. and Kuras, Alan. 2016. "Emergency Network Design – Saving Lives by Saving Power." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 United States. https://doi.org/10.1109/ATNAC.2016.7878775
It’s part of my life and the modelling process
Galligan, Linda, Axelsen, Taryn, Pennicott, Toni, Addie, Ron, Galbraith, Peter and Woolcott, Geoff. 2019. "It’s part of my life and the modelling process ." Journal of Mathematics Teacher Education. 22 (4), pp. 355-378. https://doi.org/10.1007/s10857-019-09426-3
VennTags: A file management system based on overlapping sets of tags
Albadri, Nehad, Dekeyser, Stijn and Watson, Richard. 2017. "VennTags: A file management system based on overlapping sets of tags." Sterzer, Wjatscheslaw and van de Sandt, Stephanie (ed.) iConference 2017 Effect, Expand, Evolve: Global Collaboration Across the Information Community. Wuhan, China 22 - 25 Mar 2017 United States. https://doi.org/10.9776/17002
Estimation of relative intensity and relative finality of fBm
Addie, Ron. 2019. Estimation of relative intensity and relative finality of fBm. Toowoomba, Australia. University of Southern Queensland.
Resource provisioning for a multi-layered network
Xing, Chang, Addie, Ronald G., Peng, Yu, Lin, Ronping, Li, Fan, Hu, Wenjie, Abramov, Vyacheslav M. and Zukerman, Moshe. 2019. "Resource provisioning for a multi-layered network." IEEE Access. 7 (1), pp. 16226-16245. https://doi.org/10.1109/ACCESS.2019.2894396
A new approach to spread-spectrum OFDM
Alhasnawi, Mohammad Kaisb Layous, Addie, Ronald G. and Abdulla, Shahab. 2018. "A new approach to spread-spectrum OFDM." 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 1: DCNET, ICE-B, OPTICS, SIGMAP and WINSYS. Porto, Portugal 26 - 28 Jul 2018 https://doi.org/10.5220/0006828602810288
Statistical characteristics of queue with fractional Brownian motion input
Chen, J., Bhatia, H. S., Addie, R. G. and Zukerman, M.. 2015. "Statistical characteristics of queue with fractional Brownian motion input." Electronics Letters. 51 (9), pp. 699-701. https://doi.org/10.1049/el.2015.0349
Exploring the design space of metadata-focused file management systems
Watson, Richard, Dekeyser, Stijn and Albadri, Nehad. 2017. "Exploring the design space of metadata-focused file management systems." Australasian Computer Science Week 2017 (ACSW 2017). Geelong, Australia 31 Jan - 03 Feb 2017 New York, United States. https://doi.org/10.1145/3014812.3014833
Matlab code for implementing SS-OFDM
Alhasnawi, Mohammad and Addie, Ron. 2018. Matlab code for implementing SS-OFDM.
Antraff traffic analysis software user manual, June 11, 2018
Addie, Ron and Albdair, Mostfa. 2018. Antraff traffic analysis software user manual, June 11, 2018. Toowoomba, Australia. University of Southern Queensland.
Face-to-face and virtual mathematics enrichment for rural schools: intersection of teachers, students, technology and pedagogy
Galligan, Linda, Addie, Ron, Axelsen, Taryn and Stern, Linda. 2017. "Face-to-face and virtual mathematics enrichment for rural schools: intersection of teachers, students, technology and pedagogy." Partridge, H., Davis, K. and Thomas, J. (ed.) 34th International Conference on Innovation, Practice and Research in the Use of Educational Technologies in Tertiary Education (ASCILITE 2017). Toowoomba, Australia 04 - 06 Dec 2017 Tugun, Australia.
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
Comparing decision tree and optimal risk pattern mining for analysing Emergency Ultra Short Stay Unit data
Petrus, Khaleel, Li, Jiuyong and Fahey, Paul. 2008. "Comparing decision tree and optimal risk pattern mining for analysing Emergency Ultra Short Stay Unit data." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 https://doi.org/10.1109/ICMLC.2008.4620410
Instance independent concurrency control for semistructured databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2003. "Instance independent concurrency control for semistructured databases." Flesca, Sergio and Sacca, Domenico (ed.) 11th Italian Symposium on Advanced Database Systems. Cetraro, Italy 24 - 27 Jun 2003
Social network behaviour inferred from O-D Pair traffic
Albdair, Mostfa, Addie, Ron and Fatseas, David. 2017. "Social network behaviour inferred from O-D Pair traffic." Australian Journal of Telecommunications and the Digital Economy. 5 (2), pp. 131-150. https://doi.org/10.18080/ajtde.v5n2.106
Guaranteeing correctness for collaboration on documents using an optimal locking protocol
Dekeyser, Stijn and Hidders, Jan. 2011. "Guaranteeing correctness for collaboration on documents using an optimal locking protocol." International Journal of Distributed Systems and Technologies. 2 (4), pp. 17-29. https://doi.org/10.4018/jdst.2011100102
TreeTags: bringing tags to the hierarchical file system
Albadri, Nehad, Watson, Richard and Dekeyser, Stijn. 2016. "TreeTags: bringing tags to the hierarchical file system." 2016 Australasian Computer Science Week Multiconference (ACSW '16). Canberra, Australia 02 - 05 Feb 2016 United States. https://doi.org/10.1145/2843043.2843868
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
NetML: networking networks
Addie, Ronald G., Peng, Yu and Zukerman, Moshe. 2011. "NetML: networking networks." Chen, Jinjun, Dou, Wanchun, Liu, Jianxun, Yang, Laurence T. and Ma, Jianhua (ed.) ACGS 2011: International Symposium on Advances in Cloud and Green Systems. Sydney, Australia 12 - 14 Dec 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/DASC.2011.173
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Cost modelling and validation in network optimization
Addie, Ronald G., Peng, Yu, Albdair, Mostfa, Xing, Chang, Fatseas, David and Zukerman, Moshe. 2015. "Cost modelling and validation in network optimization." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366782
Comparing academic workload models: how Australian universities resource teaching activities
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2016. "Comparing academic workload models: how Australian universities resource teaching activities." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2016: From Rhetoric to Reality (TEMC 2016). Auckland, New Zealand 11 - 14 Sep 2016 Australia.
Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router
Addie, Ronald and Natarajan, Joshua. 2017. "Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router." 8th EAI International Conference on Simulation Tools and Techniques (SIMUTOOLS 2015). Athens, Greece 24 - 26 Aug 2015 Belgium . Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). https://doi.org/10.4108/eai.24-8-2015.2260965
Antraff traffic analysis software user manual, June 21, 2016
Addie, Ronald. 2016. Antraff traffic analysis software user manual, June 21, 2016. Toowoomba, Australia. University of Southern Queensland.
Protecting services from security mis-configuration
Hadaad, Nabeel, Drury, Luke and Addie, Ronald G.. 2015. "Protecting services from security mis-configuration." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366799
Current practice in academic workload allocation processes in Australia
Watson, Richard, King, Rachel, Dekeyser, Stijn, Bare, Liz and Baldock, Clive. 2015. "Current practice in academic workload allocation processes in Australia." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2015: Leading Locally Competing Globally (TEMC 2015). Wollongong, Australia 30 Aug - 02 Sep 2015 Australia.
How do students use their mobile devices to support learning? A case study from an Australian regional university
Farley, Helen, Murphy, Angela, Johnson, Chris, Carter, Brad, Lane, Michael, Midgley, Warren, Hafeez-Baig, Abdul, Dekeyser, Stijn and Koronios, Andy. 2015. "How do students use their mobile devices to support learning? A case study from an Australian regional university." Journal of Interactive Media in Education. 15 (1), pp. 1-13. https://doi.org/10.5334/jime.ar
Performance evaluation of a queue fed by a Poisson Lomax Burst process
Chen, Jiongze, Addie, Ronald G., Zukerman, Moshe and Neame, Timothy D.. 2015. "Performance evaluation of a queue fed by a Poisson Lomax Burst process." IEEE Communications Letters. 19 (3), pp. 367-370. https://doi.org/10.1109/LCOMM.2014.2385083
Validation of multi-layer network optimization
Peng, Yu, Lin, Rongping, Li, Fan, Xing, Chang, Guo, Jun, Hu, Wenjie, Abramov, Vyacheslav, Addie, Ronald G. and Zukerman, Moshe. 2016. "Validation of multi-layer network optimization." 18th International Conference on Transparent Optical Networks (ICTON 2016). Trento, Italy 10 - 14 Jul 2016 IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICTON.2016.7550543
The Inference Graph of Cybersecurity Rules
Sheniar, Dawood, Hadaad, Nabeel and Addie Ron. 2016. "The Inference Graph of Cybersecurity Rules." 29th International Telecommunication Networks and Applications Conference (ITNAC 2019). Auckland, New Zealand 27 - 29 Nov 2019 New Zealand. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ITNAC46935.2019.9077958
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Designing an academic workload model in the age of blended learning
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2014. "Designing an academic workload model in the age of blended learning." Dobson, Ian R., Conway, Maree and Sharma, Raj (ed.) Tertiary Education and Management Conference 2014: Rainforest to Reef (TEMC 2014). Cairns, Australia 31 Aug - 03 Sep 2014 Australia.
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
Listening to the student voice: how are students really using mobile technologies for learning?
Murphy, Angela, Farley, Helen, Johnson, Chris, Lane, Michael, Carter, Brad, Hafeez-Baig, Abdul, Midgley, Warren, Dekeyser, Stijn, Rees, Sharon, Mitchell, Maxine, Doyle, Joanne and Koronios, Andy. 2013. "Listening to the student voice: how are students really using mobile technologies for learning?" Carter, Helen, Gosper, Maree and Hedberg, John (ed.) 30th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2013). Sydney, Australia 01 - 04 Dec 2013
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Metadata manipulation interface design
Dekeyser, Stijn and Watson, Richard. 2013. "Metadata manipulation interface design." Smith, Ross T. and Wunsche, Burkhard C. (ed.) 14th Australasian User Interface Conference (AUIC 2013): User Interfaces 2013. Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Performance evaluation and service rate provisioning for a queue with fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2013. "Performance evaluation and service rate provisioning for a queue with fractional Brownian input." Performance Evaluation. 70 (11), pp. 1028-1045. https://doi.org/10.1016/j.peva.2013.07.002
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
A new teletraffic approach for network planning and evolution prediction
Abramov, Vyacheslav, Addie, Ronald G., Li, Fan, Peng, Yu and Zukerman, Moshe. 2012. "A new teletraffic approach for network planning and evolution prediction." 2012 Optical Fiber Communication Conference (OFC 2012). Los Angeles, United States 04 - 08 Mar 2012 Washington, DC. United States.
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
How good (or bad) is shortest path routing in layered networks
Addie, Ronald G., Fatseas, David, Peng, Yu, Li, Fan and Zukerman, Moshe. 2012. "How good (or bad) is shortest path routing in layered networks." Chilamkurti, Naveen, Tian, Yu-Chu and Gregory, Mark (ed.) Australasian Telecommunication Networks and Applications Conference (ATNAC 2012). Brisbane, Australia 07 - 09 Nov 2012 Piscataway, NJ. United States. https://doi.org/10.1109/ATNAC.2012.6398056
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Optimal choice of test signals for linear channel estimation using second order statistics
Braithwaite, Stephen and Addie, Ronald Geoffrey. 2014. "Optimal choice of test signals for linear channel estimation using second order statistics." Optimization and Engineering. 15 (1), pp. 93-118. https://doi.org/10.1007/s11081-012-9193-3
Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Layered design of mobile backhaul networks
Fatseas, David and Addie, Ron. 2011. "Layered design of mobile backhaul networks." 17th IEEE International Conference on Networks (ICON 2011). Singapore 14 - 16 Dec 2011 https://doi.org/10.1109/ICON.2011.6168491
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
Five criteria for web-services security architecture
Addie, R. G. and Colman, Alan. 2010. "Five criteria for web-services security architecture." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 https://doi.org/10.1109/NSS.2010.100
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
A new teletraffic approach for network planning and evolution prediction
Abramov, Vyacheslav, Addie, Ronald G., Li, Fi, Peng, Yu and Zukerman, Moshe. 2012. "A new teletraffic approach for network planning and evolution prediction." 2012 Optical Fiber Communication Conference (OFC 2012). Los Angeles, United States 04 - 08 Mar 2012 United States. https://doi.org/10.1364/ofc.2012.oth1a.3
Optimizing multi-layered networks towards a transparently optical internet
Addie, Ronald G., Fatseas, David and Zukerman, Moshe. 2010. "Optimizing multi-layered networks towards a transparently optical internet." Jaworski, Marek and Marciniak, Marian (ed.) ICTON 2010: 12th International Conference on Transparent Optical Networks. Munich, Germany 27 Jun - 01 Jul 2010 Warsaw, Poland. https://doi.org/10.1109/ICTON.2010.5549023
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
Optimal choice of test signals for channel estimation
Braithwaite, Stephen and Addie, Ron. 2010. "Optimal choice of test signals for channel estimation." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558839
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98
A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A simple time-management tool for students' online learning activities
de Raadt, Michael and Dekeyser, Stijn. 2009. "A simple time-management tool for students' online learning activities." Atkinson, Roger J. and McBeath, Clare (ed.) 26th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2009). Auckland, New Zealand 06 - 09 Dec 2009 Auckland, New Zealand.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) APWeb 2008: 10th Asia-Pacific Web Conference. Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
Quantum simulation - rare event simulation by means of cloning, thinning and distortion
Addie, R. G.. 2002. "Quantum simulation - rare event simulation by means of cloning, thinning and distortion." European Transactions on Telecommunications. 13 (4), pp. 387-397. https://doi.org/10.1002/ett.4460130410
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
Introductory programming languages at Australian universities at the beginning of the twenty first century
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2003. "Introductory programming languages at Australian universities at the beginning of the twenty first century." Journal of Research and Practice in Information Technology. 35 (3), pp. 163-167.
A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68
A system employing peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Y.. 2007. "A system employing peer review and enhanced computer assisted assessment of querying skills." Informatics in Education. 6 (1), pp. 163-178.
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Classification using multiple and negative target rules
Li, Jiuyong and Jones, Jason. 2006. "Classification using multiple and negative target rules." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. https://doi.org/10.1007/11892960_26
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728
Robust rule-based prediction
Li, Jiuyong. 2006. "Robust rule-based prediction." IEEE Transactions on Knowledge and Data Engineering. 18 (8), pp. 1043-1054. https://doi.org/10.1109/TKDE.2006.129
On optimal rule discovery
Li, Jiuyong. 2006. "On optimal rule discovery." IEEE Transactions on Knowledge and Data Engineering. 18 (4), pp. 460-471. https://doi.org/10.1109/TKDE.2006.1599385
Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Yu. 2006. "Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills." Berglund, Anders and Wiggberg, Mattias (ed.) 6th Baltic Sea Conference on Computing Education Research (Koli Calling 2006). Koli, Finland 09 - 12 Nov 2006 Sweden. https://doi.org/10.1145/1315803.1315821
Electronic peer review: a large cohort teaching themselves?
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2005. "Electronic peer review: a large cohort teaching themselves?" Goss, Halima (ed.) 22nd Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2005). Brisbane, Australia 04 - 07 Dec 2005 Brisbane, Australia. Australasian Society for Computers in Learning in Tertiary Education (ASCILITE).
Finding similar patterns in microarray data
Chen, Xiangsheng, Li, Jiuyong, Daggard, Grant and Huang, Xiaodi. 2005. "Finding similar patterns in microarray data." Zhang, Shichao and Jarvis, Ray (ed.) AI 2005: Advances in artificial intelligence. Berlin, Germany. Springer. pp. 1272-1276
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365
Peer-to-peer form based web information systems
Dekeyser, Stijn, Hidders, Jan, Watson, Richard and Addie, Ron. 2006. "Peer-to-peer form based web information systems." Dobbie, Gillian and Bailey, James (ed.) ADC 2006: 17th Australasian Database Conference. Hobart, Australia 16 - 19 Jan 2006 Australia.
Efficient discovery of risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-chee and Fahey, Paul. 2009. "Efficient discovery of risk patterns in medical data." Artificial Intelligence in Medicine. 45 (1), pp. 77-89. https://doi.org/10.1016/j.artmed.2008.07.008
Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).
A robust ensemble classification method analysis
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "A robust ensemble classification method analysis." Arabnia, Hamid R. (ed.) Advances in computational biology. New York, NY. United States. Springer. pp. 149-155
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Piecemeal: a formal collaborative editing technique guaranteeing correctness
Dekeyser, Stijn and Hidders, Jan. 2010. "Piecemeal: a formal collaborative editing technique guaranteeing correctness." Bessis, Nik, Kommers, Piet and Isaias, Pedro (ed.) IADIS International Conference on Collaborative Technologies 2010 (IADIS 2010). Freiburg, Germany 26 - 31 Jul 2010 Germany.
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
A priority-based processor sharing model for TDM passive optical networks
Wang, Yan, Zukerman, Moshe, Addie, Ronald G., Chan, Sammy and Harris, Richard J.. 2010. "A priority-based processor sharing model for TDM passive optical networks." IEEE Journal on Selected Areas in Communications. 28 (6), pp. 863-874. https://doi.org/10.1109/JSAC.2010.100811
On the effectiveness of gene selection for microarray classification methods
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "On the effectiveness of gene selection for microarray classification methods." Nguyen, Ngoc Thanh, Le, Manh Thanh and Swiatek, Jerzy (ed.) 2nd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010). Hue City, Vietnam 24 - 26 Mar 2010 Heidelberg, Germany. https://doi.org/10.1007/978-3-642-12101-2_31
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
ECOOSE: an echo cancellation object oriented simulation environment
Braithwaite, Stephen and Addie, Ron. 2009. "ECOOSE: an echo cancellation object oriented simulation environment." 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems and Workshops. Rome, Italy 02 - 06 Mar 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.SIMUTOOLS2009.5775
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Training strategic problem solvers
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2004. "Training strategic problem solvers." ACM SIGCSE Bulletin. 36 (2), pp. 48-51. https://doi.org/10.1145/1024338.1024370
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Prediction of student actions using weighted Markov models
Huang, Xiaodi, Yong, Jianming, Li, Jiuyong and Gao, Junbin. 2008. "Prediction of student actions using weighted Markov models." Li, Shaozi, Pan, Wei and Yong, Jianming (ed.) IEEE International Symposium on IT in Medicine and Education (ITME 2008) . Xiamen, China 12 - 14 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ITME.2008.4743842
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Language trends in introductory programming courses
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2002. "Language trends in introductory programming courses." Cohen, Eli B. and Boyd, E. (ed.) 2002 Informing Science + Information Technology Education Joint Conference (InSITE 2002). Cork, Ireland 19 - 21 Jun 2002 Santa Rosa, CA, United States.
Introductory programming: what's happening today and will there be any students to teach tomorrow?
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2004. "Introductory programming: what's happening today and will there be any students to teach tomorrow?" Lister, Raymond and Young, Alison (ed.) ACE 2004: 6th Australasian Computing Education Conference. Dunedin, New Zealand 18 - 24 Feb 2004 Bedford Park, South Australia.
Language trends in introductory programming courses
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2002. Language trends in introductory programming courses. Toowoomba, Australia. University of Southern Queensland.
Language tug-of-war: industry demand and academic choice
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2003. "Language tug-of-war: industry demand and academic choice." Greening, Tony and Lister, Raymond (ed.) ACE 2003: 5th Australasian Computing Education Conference. Adelaide, Australia 04 - 07 Feb 2003 Sydney, Australia.
Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.
Performance analysis of a Poisson-Pareto queue over the full range of system parameters
Addie, Ron, Neame, Timothy D. and Zukerman, Moshe. 2009. "Performance analysis of a Poisson-Pareto queue over the full range of system parameters." Computer Networks. 53 (7), pp. 1099-1113. https://doi.org/10.1016/j.comnet.2008.12.016
Teaching and assessing programming strategies explicitly
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2009. "Teaching and assessing programming strategies explicitly." Hamilton, Margaret and Clear, Tony (ed.) ACE 2009: 11th Australasian Computing Education Conference. Wellington, New Zealand 20 - 23 Jan 2009 Bedford Park, South Australia.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." APWeb 2008: 10th Asia Pacific Web Conference Workshop . Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
An evaluation of electronic individual peer assessment in an introductory programming course
de Raadt, Michael, Lai, David and Watson, Richard. 2008. "An evaluation of electronic individual peer assessment in an introductory programming course." Lister, Raymond (ed.) 7th Baltic Sea Conference on Computing Education Research (Koli Calling 2007). Koli National Park, Finland 15 - 18 Nov 2007 Sydney, Australia.
Incorporating programming strategies explicitly into curricula
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2008. "Incorporating programming strategies explicitly into curricula." Lister, Raymond (ed.) 7th Baltic Sea Conference on Computing Education Research (Koli Calling 2007). Koli National Park, Finland 15 - 18 Nov 2007 Sydney, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
On asymptotic accuracy in queueing theory - the tale of the misleading tail
Addie, Ronald G., Neame, Timothy D. and Zukerman, Moshe. 2003. "On asymptotic accuracy in queueing theory - the tale of the misleading tail." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Melbourne, Australia.
Asymptotically accurate flow completion time distributions under fair queueing
Addie, R. G. and Yevdokimov, Oleksiy. 2008. "Asymptotically accurate flow completion time distributions under fair queueing." Green, Richard (ed.) Australasian Telecommunication Networks and Applications Conference (ATNAC 2007): Next Generation Networks: Enabling Closer International Cooperation. Christchurch, New Zealand 02 - 05 Dec 2007 Piscataway, NJ. United States. https://doi.org/10.1109/ATNAC.2007.4665290
Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows
Addie, Ron. 2008. "Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows." 1st International Workshop on the Evaluation of Quality of Service through Simulation in the Future Internet (QoSim 2008). Marseille, France 03 - 08 Mar 2008 Marseille, France.
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
On weak convergence of long-range-dependent traffic processes
Addie, R. G.. 1999. "On weak convergence of long-range-dependent traffic processes." Journal of Statistical Planning and Inference. 80 (1), pp. 155-171.
Mining risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-Chee, He, Hongxing, Chen, Jie, Jin, Huidong, McAullay, Damien, Williams, Graham, Sparks, Ross and Kelman, Chris. 2005. "Mining risk patterns in medical data." Grossman, R., Bayardo, R., Bennett, K. and Vaidya, J. (ed.) 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005). Chicago, United States 21 - 24 Aug 2005 United States. https://doi.org/10.1145/1081870.1081971
Netml - an XML-based language for describing networks
Zareer, A. and Addie, Ron. 2004. "Netml - an XML-based language for describing networks." 3rd International Information and Telecommunication Technologies Symposium (I2TS 2004). Sao Carlos, Brazil 06 - 09 Dec 2004 Sao Carlos, Brazil.
Association rule discovery with unbalanced class distributions
Gu, Lifang, Li, Jiuyong, He, Hongxing, Williams, Graham, Hawkins, Simon and Kelman, Chris. 2003. "Association rule discovery with unbalanced class distributions." Gedeon, Tamas D. and Fung, Lance Chun Che (ed.) 16th Australian Conference on Artificial Intelligence (AI 2003). Perth, Australia 03 - 05 Dec 2003 Berlin, Germany. https://doi.org/10.1007/978-3-540-24581-0_19
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
Admission control schemes for bursty multimedia traffic
Lee, Teck Kiong, Zukerman, Moshe and Addie, Ronald G.. 2001. "Admission control schemes for bursty multimedia traffic." Cruz, R. and Pacifici, G. (ed.) 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001). Anchorage, United States 22 - 26 Apr 2001 Piscataway, NJ. United States. https://doi.org/10.1109/INFCOM.2001.916739
A tradeoff between increased network speed and reduced effective bandwidths
Neame, Timothy D., Zukerman, Moshe and Addie, Ronald G.. 2001. "A tradeoff between increased network speed and reduced effective bandwidths." Nuevo, Y. (ed.) IEEE International Conference on Communications (ICC 2001): Where Minds Meet. Helsinki, Finland 11 - 14 Jun 2000 Piscataway, NJ. United States. https://doi.org/10.1109/ICC.2001.936741
Mining the optimal class association rule set
Li, Jiuyong, Shen, Hong and Topor, Rodney. 2002. "Mining the optimal class association rule set." Knowledge-Based Systems. 15 (7), pp. 399-405. https://doi.org/10.1016/S0950-7051(02)00024-2
Mining informative rule set for prediction
Li, Jiuyong, Shen, Hong and Topor, Rodney. 2004. "Mining informative rule set for prediction." Journal of Intelligent Information Systems. 22 (2), pp. 155-174. https://doi.org/10.1023/B:JIIS.0000012468.25883.a5
Performance evaluation of a queue fed by a Poisson Pareto burst process
Addie, Ron, Neame, Timothy D. and Zukerman, Moshe. 2002. "Performance evaluation of a queue fed by a Poisson Pareto burst process." Computer Networks. 40 (3), pp. 377-397.
Most probable paths and performance formulae for buffers with Gaussian input traffic
Addie, Ron, Mannersalo, Petteri and Norros, Ilkka. 2002. "Most probable paths and performance formulae for buffers with Gaussian input traffic." European Transactions on Telecommunications. 13 (3), pp. 183-196.
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
Internet traffic modeling and future technology implications
Zukerman, Moshe, Neame, Timothy D. and Addie, Ron. 2003. "Internet traffic modeling and future technology implications." 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, United States 30 Mar - 03 Apr 2003 San Francisco, United States.
A model, schema, and interface for metadata file systems
Dekeyser, Stijn, Watson, Richard and Motroen, Lasse. 2008. "A model, schema, and interface for metadata file systems." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Wollongong, Australia.
Protecting small flows from large ones for quality of service
Addie, R. G., Yevdokimov, Oleksiy, Braithwaite, Stephen and Millsom, David. 2007. "Protecting small flows from large ones for quality of service." Bernstein, David, Dini, Petre, Hladka, Eva, Reza, Hassan, Romascanu, Dan and Sankar, Krishna (ed.) 2nd International Conference on Digital Telecommunications (ICDT 2007). San Jose, United States 01 - 06 Jul 2007 Piscataway, NJ. United States. https://doi.org/10.1109/ICDT.2007.68
Chick sexing and novice programmers: explicit instruction of problem solving strategies
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2006. "Chick sexing and novice programmers: explicit instruction of problem solving strategies." Tolhurst, Denise and Mann, Samuel (ed.) ACE 2006: 8th Australasian Computing Education Conference. Hobart, Australia 16 - 19 Jan 2006 Sydney, Australia.
An effective system for electronic peer review
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2006. "An effective system for electronic peer review." International Journal of Business and Management Education. 13 (9), pp. 48-62.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
Analysis of breast feeding data using data mining methods
He, Hongxing, Jin, Huidong, Chen, Jie, McAullay, Damien, Li, Jiuyong and Fallon, Tony. 2006. "Analysis of breast feeding data using data mining methods." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Sydney, Australia.
Time variation characteristics of MIMO-OFDM broadband channels in populated indoor environments
Das Gupta, Jishu, Ziri-Castro, Karla and Addie, Ron. 2006. "Time variation characteristics of MIMO-OFDM broadband channels in populated indoor environments." Ellershaw, John (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2006). Melbourne, Australia 04 - 06 Dec 2006 Melbourne, Australia.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Wong, Raymond Chi-Wing, Li, Jiuyong, Fu, Ada Wai-Chee and Wang, Ke. 2006. "(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing." Eliassi-Rad, Tina, Ungar, Lyle H., Craven, Mark and Gunopulos, Dimitrios (ed.) 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06). Philadelphia, USA 20 - 23 Aug 2006 New York, USA.
Using multiple and negative target rules to make classifiers more understandable
Li, Jiuyong and Jones, Jason. 2006. "Using multiple and negative target rules to make classifiers more understandable." Knowledge-Based Systems. 19 (6), pp. 438-444. https://doi.org/10.1016/j.knosys.2006.03.003
Netml: a language and website for collaborative work on networks and their algorithms
Addie, Ron, Braithwaite, Stephen and Zareer, Abdulla. 2006. "Netml: a language and website for collaborative work on networks and their algorithms." Ellershaw, John (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2006). Melbourne, Australia 04 - 06 Dec 2006 Melbourne Australia.
Aggregate flows: for efficient management of large flows in the internet
Addie, Ron, Braithwaite, Stephen, Das Gupta, Jishu and Leis, John W.. 2006. "Aggregate flows: for efficient management of large flows in the internet." WITSP 2006: 5th Workshop on the Internet, Telecommunications and Signal Processing. Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Computer assisted assessment of SQL query skills
Dekeyser, Stijn, de Raadt, Michael and Lee, Tien Yu. 2007. "Computer assisted assessment of SQL query skills." Bailey, James and Fekete, Alan (ed.) 18th Australasian Database Conference (ADC 2007). Ballarat, Australia 29 Jan - 02 Feb 2007 Bedford Park, South Australia.
Combining gene expression data and gene ontology with the use of a data mining tool
Petrus, Khaleel, Li, Jiuyong and Lopez, J.. 2005. "Combining gene expression data and gene ontology with the use of a data mining tool." Summer Symposium in Bioinformatics: Open Problems in Bioinformatics (BioInfoSummer 2005). Canberra, Australia 28 Nov - 02 Dec 2005 Australian National University (ANU).
A metadata collection technique for documents in WinFS
Dekeyser, Stijn. 2005. "A metadata collection technique for documents in WinFS." Kay, Judy, Turpin, Andrew and Wilkinson, Ross (ed.) 10th Australasian Document Computing Symposium (ADCS 2005). Sydney, Australia 12 Dec 2005 Sydney, Australia.
Implementing shortest job first order of service in the internet
Addie, Ron, Li, Zhi and McNickle, Don. 2005. "Implementing shortest job first order of service in the internet." Zerger, Andre and Argent, Robert M. (ed.) 16th International Congress on Modelling and Simulation (MODSIM05). Melbourne, Australia 12 - 15 Dec 2005 Melbourne, Australia. Modelling and Simulation Society of Australia and New Zealand .
Comparing different approaches to the use of DiffServ in the internet
McNickle, Don and Addie, Ron. 2005. "Comparing different approaches to the use of DiffServ in the internet." Vinnal, E. (ed.) 2005 IEEE Region 10 International Conference (TENCON 2005). Melbourne, Australia 21 - 24 Nov 2005 Melbourne, Australia. https://doi.org/10.1109/TENCON.2005.301038
Textbooks: under inspection
de Raadt, Michael, Watson, Richard and Toleman, Mark. 2005. Textbooks: under inspection. Toowoomba, Australia. University of Southern Queensland.
Tracing the evaluation of lazy functional languages: A model and its implementation
Watson, Richard and Salzman, Eric. 1997. "Tracing the evaluation of lazy functional languages: A model and its implementation." 3rd Asian Computing Science Conference (ASIAN 1997). Kathmandu, Nepal 09 - 11 Dec 1997 Germany. Springer. https://doi.org/10.1007/3-540-63875-X_63