Five examples of web-services for illustrating requirements for security architecture

Paper


Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929
Paper/Presentation Title

Five examples of web-services for illustrating requirements for security architecture

Presentation TypePaper
AuthorsAddie, Ronald G. (Author), Moffatt, Sam (Author), Dekeyser, Stijn (Author) and Colman, Alan (Author)
EditorsZhang, Ji and Livraga, Giovanni
Journal or Proceedings TitleProceedings of the 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011)
ERA Conference ID50549
Number of Pages8
Year2011
Place of PublicationPiscataway, NJ. United States
ISBN9781457708657
Digital Object Identifier (DOI)https://doi.org/10.1109/ICDKE.2011.6053929
Web Address (URL) of Paperhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6053929
Conference/Event2nd International Conference on Data and Knowledge Engineering (ICDKE 2011)
International Conference on Data and Knowledge Engineering
Event Details
2nd International Conference on Data and Knowledge Engineering (ICDKE 2011)
Event Date
06 to end of 08 Sep 2011
Event Location
Milan, Italy
Event Details
International Conference on Data and Knowledge Engineering
ICDKE
Abstract

The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary
access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more expressiveness in the rules used to express policies in three cases, and in the other the fact that XACML appears to have nearly adequate expressiveness without
undue complexity. Each example is expressed first informally, by describing a service which could concievably be provided in a web services architecture, then the example is also outlined using either XACML, first order logic or both.

Keywordsweb-services; web-security; XACML; computational complexity; security architecture
ANZSRC Field of Research 2020460507. Information extraction and fusion
460612. Service oriented computing
460499. Cybersecurity and privacy not elsewhere classified
Public Notes

© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Byline AffiliationsDepartment of Mathematics and Computing
Swinburne University of Technology
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q106v/five-examples-of-web-services-for-illustrating-requirements-for-security-architecture

Download files


Accepted Version
Addie_Moffatt_Dekeyser_Colman_AV.pdf
File access level: Anyone

  • 2517
    total views
  • 751
    total downloads
  • 6
    views this month
  • 2
    downloads this month

Export as

Related outputs

Tree shade within urban parks and nature strips: standards and perspectives from measurement campaigns conducted in Queensland
Downs, Nathan, Antrobus, Jodie, Dekeyser, Stijn, Butler, Harry, Downs, Melanie, Hickmott, Darren, Madigan, Chris, Brown, Alexandra, Amar, Abdurazaq, Dearnaley, John, Parisi, Alfio V, Vanos, Jennifer, Raj, Nawin, Harrison, Simone and Igoe, Damien. 2024. "Tree shade within urban parks and nature strips: standards and perspectives from measurement campaigns conducted in Queensland ." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch
Mohammed, Chand Pasha, Chopra, Shakti Raj, Albadri, Nehad, Dekeyser, Stijn, Jha, Sudan, Roy, Ajay and Pradhan, Nihar Ranjan. 2024. "Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch." Internet Technology Letters. https://doi.org/10.1002/itl2.596
Ultraviolet radiation thin film dosimetry: A review of properties and applications
Parisi, Alfio V., Downs, Nathan J., Schouten, Peter, Igoe, Damien P., Turner, Joanna, Amar, Abdurazaq, Wainwright, Lisa, Dawes, Adrian, Butler, Harry and Dekeyser, Stijn. 2024. "Ultraviolet radiation thin film dosimetry: A review of properties and applications." Photochemistry and Photobiology. https://doi.org/10.1111/php.14022
A playground shade index for standardising ultraviolet protection assessments of open, mixed and protected outdoor recreational spaces
Downs, Nathan, Butler, Harry, Dexter, Benjamin, Raj, Nawin, Downs, Melanie, Turner, Joanna, Dekeyser, Stijn, Deo, Ravinesh, Vanos, Jennifer, Igoe, Damien and Parisi, Alfio V. 2024. "A playground shade index for standardising ultraviolet protection assessments of open, mixed and protected outdoor recreational spaces." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
The mitigating effect of street trees, urban flora, and the suburban environment on seasonal peak UV indices: A case study from Brisbane, Australia
Downs, Nathan James, Amar, Abdurazaq, Dearnaley, John, Butler, Harry, Dekeyser, Stijn, Igoe, Damien, Parisi, Alfio V., Raj, Nawin, Deo, Ravinesh and Turner, Joanna. 2024. "The mitigating effect of street trees, urban flora, and the suburban environment on seasonal peak UV indices: A case study from Brisbane, Australia." Photochemistry and Photobiology. https://doi.org/10.1111/php.13988
A legacy of more than two decades of UV radiation measurement studies at the University of Southern Queensland
Amar, Abdurazaq, Parisi, Alfio, Downs, Nathan, Turner, Joanna, Igoe, Damien, Butler, Harry and Dekeyser, Stijn. 2024. "A legacy of more than two decades of UV radiation measurement studies at the University of Southern Queensland." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds
Downs, Nathan, Raj, Nawin, Vanos, Jennifer, Parisi, Alfio, Butler, Harry, Deo, Ravinesh, Igoe, Damien, Dexter, Benjamin, Beckman-Downs, Melanie, Turner, Joanna and Dekeyser, Stijn. 2023. "The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds." Photochemistry and Photobiology. 99 (4), pp. 1193-1207. https://doi.org/10.1111/php.13745
Inference of Social Network Behavior from Internet Traffic Traces
Albdair, Mostfa, Addie, Ronald G. and Fatseas, David. 2016. "Inference of Social Network Behavior from Internet Traffic Traces." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 United States. https://doi.org/10.1109/ATNAC.2016.7878773
A novel file system supporting rich file classification
Albadri, Nehad and Dekeyser, Stijn. 2022. "A novel file system supporting rich file classification." Computers and Electrical Engineering. 103, pp. 1-9. https://doi.org/10.1016/j.compeleceng.2022.108081
Bi-Directional Grid Constrained Stochastic Processes' Link to Multi-Skew Brownian Motion
Taranto, Aldo, Addie, Ron and Khan, Shahjahan. 2022. "Bi-Directional Grid Constrained Stochastic Processes' Link to Multi-Skew Brownian Motion." Journal of Applied Probability and Statistics. 17 (1), pp. 101-133.
A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166
Sum-rate optimal communication under different power constraints
Alhasnawi, Mohammad Kaisb Layous and Addie, Ronald G.. 2019. "Sum-rate optimal communication under different power constraints." Obaidat, Mohammad, Callegari, Christian, van Sinderen, Marten, Novais, Paulo, Sarigiannidis, Panagiotis, Battiato, Sebastiano, de leon, Angel Serrano Sanchez, Lorenz, Pascal and Davoli, Franco (ed.) 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019). Prague, Czech Republic 26 - 28 Jul 2019 https://doi.org/10.5220/0007957203730380
Experiments and proofs in web-service security
Sheniar, Dawood, Hadaad, Nabeel, Martin, David, Addie, Ron and Abdulla, Shahab. 2018. "Experiments and proofs in web-service security." Harris, Richard, Gregory, Mark, Tran-Gia, Phuoc and Pawlikowski, Krys (ed.) 28th International Telecommunication Networks and Application Conference: Experiments and Proofs in Web-service Security (ITNAC 2018). Sydney, Australia 21 - 23 Nov 2018 New York, United States. https://doi.org/10.1109/ATNAC.2018.8615367
Iterated logarithm bounds of bi-directional grid constrained stochastic processes
Taranto, Aldo, Khan, Shahjahan and Addie, Ron. 2021. "Iterated logarithm bounds of bi-directional grid constrained stochastic processes." Global and Stochastic Analysis. 8 (3), pp. 19-39.
Better Service from Understanding the Social Network Behaviour in the Internet
Albdair, Mostfa, Addie, Ronald G. and Kist, Alexander. 2019. "Better Service from Understanding the Social Network Behaviour in the Internet." 2018 IEEE Region 10 Conference (TENCON 2018). Jeju, South Korea 28 - 31 Oct 2018 Piscataway, United States. https://doi.org/10.1109/TENCON.2018.8650301
Spectral density constraints on wireless communication
Alhasnawi, Mohammad Kaisb Layous, Abdulla, Shahab, Fatseas, David and Addie, Ronald G.. 2020. "Spectral density constraints on wireless communication." Heliyon. 6 (5), pp. 1-7. https://doi.org/10.1016/j.heliyon.2020.e03979
Mathematica code for implementing the aggregate EMF
Alhasnawi, Mohammad and Addie, Ron. 2020. Mathematica code for implementing the aggregate EMF. Heliyon Journal.
Emergency Network Design – Saving Lives by Saving Power
Hadaad, Nabeel, Pitsillides, Andreas, Kolios, Panayiotis, Addie, Ronald G. and Kuras, Alan. 2016. "Emergency Network Design – Saving Lives by Saving Power." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 United States. https://doi.org/10.1109/ATNAC.2016.7878775
It’s part of my life and the modelling process
Galligan, Linda, Axelsen, Taryn, Pennicott, Toni, Addie, Ron, Galbraith, Peter and Woolcott, Geoff. 2019. "It’s part of my life and the modelling process ." Journal of Mathematics Teacher Education. 22 (4), pp. 355-378. https://doi.org/10.1007/s10857-019-09426-3
VennTags: A file management system based on overlapping sets of tags
Albadri, Nehad, Dekeyser, Stijn and Watson, Richard. 2017. "VennTags: A file management system based on overlapping sets of tags." Sterzer, Wjatscheslaw and van de Sandt, Stephanie (ed.) iConference 2017 Effect, Expand, Evolve: Global Collaboration Across the Information Community. Wuhan, China 22 - 25 Mar 2017 United States. https://doi.org/10.9776/17002
Estimation of relative intensity and relative finality of fBm
Addie, Ron. 2019. Estimation of relative intensity and relative finality of fBm. Toowoomba, Australia. University of Southern Queensland.
Resource provisioning for a multi-layered network
Xing, Chang, Addie, Ronald G., Peng, Yu, Lin, Ronping, Li, Fan, Hu, Wenjie, Abramov, Vyacheslav M. and Zukerman, Moshe. 2019. "Resource provisioning for a multi-layered network." IEEE Access. 7 (1), pp. 16226-16245. https://doi.org/10.1109/ACCESS.2019.2894396
A new approach to spread-spectrum OFDM
Alhasnawi, Mohammad Kaisb Layous, Addie, Ronald G. and Abdulla, Shahab. 2018. "A new approach to spread-spectrum OFDM." 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 1: DCNET, ICE-B, OPTICS, SIGMAP and WINSYS. Porto, Portugal 26 - 28 Jul 2018 https://doi.org/10.5220/0006828602810288
Statistical characteristics of queue with fractional Brownian motion input
Chen, J., Bhatia, H. S., Addie, R. G. and Zukerman, M.. 2015. "Statistical characteristics of queue with fractional Brownian motion input." Electronics Letters. 51 (9), pp. 699-701. https://doi.org/10.1049/el.2015.0349
Exploring the design space of metadata-focused file management systems
Watson, Richard, Dekeyser, Stijn and Albadri, Nehad. 2017. "Exploring the design space of metadata-focused file management systems." Australasian Computer Science Week 2017 (ACSW 2017). Geelong, Australia 31 Jan - 03 Feb 2017 New York, United States. https://doi.org/10.1145/3014812.3014833
Matlab code for implementing SS-OFDM
Alhasnawi, Mohammad and Addie, Ron. 2018. Matlab code for implementing SS-OFDM.
Antraff traffic analysis software user manual, June 11, 2018
Addie, Ron and Albdair, Mostfa. 2018. Antraff traffic analysis software user manual, June 11, 2018. Toowoomba, Australia. University of Southern Queensland.
Face-to-face and virtual mathematics enrichment for rural schools: intersection of teachers, students, technology and pedagogy
Galligan, Linda, Addie, Ron, Axelsen, Taryn and Stern, Linda. 2017. "Face-to-face and virtual mathematics enrichment for rural schools: intersection of teachers, students, technology and pedagogy." Partridge, H., Davis, K. and Thomas, J. (ed.) 34th International Conference on Innovation, Practice and Research in the Use of Educational Technologies in Tertiary Education (ASCILITE 2017). Toowoomba, Australia 04 - 06 Dec 2017 Tugun, Australia.
Instance independent concurrency control for semistructured databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2003. "Instance independent concurrency control for semistructured databases." Flesca, Sergio and Sacca, Domenico (ed.) 11th Italian Symposium on Advanced Database Systems. Cetraro, Italy 24 - 27 Jun 2003
Social network behaviour inferred from O-D Pair traffic
Albdair, Mostfa, Addie, Ron and Fatseas, David. 2017. "Social network behaviour inferred from O-D Pair traffic." Australian Journal of Telecommunications and the Digital Economy. 5 (2), pp. 131-150. https://doi.org/10.18080/ajtde.v5n2.106
Guaranteeing correctness for collaboration on documents using an optimal locking protocol
Dekeyser, Stijn and Hidders, Jan. 2011. "Guaranteeing correctness for collaboration on documents using an optimal locking protocol." International Journal of Distributed Systems and Technologies. 2 (4), pp. 17-29. https://doi.org/10.4018/jdst.2011100102
TreeTags: bringing tags to the hierarchical file system
Albadri, Nehad, Watson, Richard and Dekeyser, Stijn. 2016. "TreeTags: bringing tags to the hierarchical file system." 2016 Australasian Computer Science Week Multiconference (ACSW '16). Canberra, Australia 02 - 05 Feb 2016 United States. https://doi.org/10.1145/2843043.2843868
NetML: networking networks
Addie, Ronald G., Peng, Yu and Zukerman, Moshe. 2011. "NetML: networking networks." Chen, Jinjun, Dou, Wanchun, Liu, Jianxun, Yang, Laurence T. and Ma, Jianhua (ed.) ACGS 2011: International Symposium on Advances in Cloud and Green Systems. Sydney, Australia 12 - 14 Dec 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/DASC.2011.173
Cost modelling and validation in network optimization
Addie, Ronald G., Peng, Yu, Albdair, Mostfa, Xing, Chang, Fatseas, David and Zukerman, Moshe. 2015. "Cost modelling and validation in network optimization." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366782
Comparing academic workload models: how Australian universities resource teaching activities
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2016. "Comparing academic workload models: how Australian universities resource teaching activities." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2016: From Rhetoric to Reality (TEMC 2016). Auckland, New Zealand 11 - 14 Sep 2016 Australia.
Implementing shortest job first order of service in the internet
Addie, Ron, Li, Zhi and McNickle, Don. 2005. "Implementing shortest job first order of service in the internet." Zerger, Andre and Argent, Robert M. (ed.) 16th International Congress on Modelling and Simulation (MODSIM05). Melbourne, Australia 12 - 15 Dec 2005 Australia. Modelling and Simulation Society of Australia and New Zealand .
Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router
Addie, Ronald and Natarajan, Joshua. 2017. "Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router." 8th EAI International Conference on Simulation Tools and Techniques (SIMUTOOLS 2015). Athens, Greece 24 - 26 Aug 2015 Belgium . Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). https://doi.org/10.4108/eai.24-8-2015.2260965
Antraff traffic analysis software user manual, June 21, 2016
Addie, Ronald. 2016. Antraff traffic analysis software user manual, June 21, 2016. Toowoomba, Australia. University of Southern Queensland.
Protecting services from security mis-configuration
Hadaad, Nabeel, Drury, Luke and Addie, Ronald G.. 2015. "Protecting services from security mis-configuration." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366799
Current practice in academic workload allocation processes in Australia
Watson, Richard, King, Rachel, Dekeyser, Stijn, Bare, Liz and Baldock, Clive. 2015. "Current practice in academic workload allocation processes in Australia." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2015: Leading Locally Competing Globally (TEMC 2015). Wollongong, Australia 30 Aug - 02 Sep 2015 Australia.
How do students use their mobile devices to support learning? A case study from an Australian regional university
Farley, Helen, Murphy, Angela, Johnson, Chris, Carter, Brad, Lane, Michael, Midgley, Warren, Hafeez-Baig, Abdul, Dekeyser, Stijn and Koronios, Andy. 2015. "How do students use their mobile devices to support learning? A case study from an Australian regional university." Journal of Interactive Media in Education. 15 (1), pp. 1-13. https://doi.org/10.5334/jime.ar
Performance evaluation of a queue fed by a Poisson Lomax Burst process
Chen, Jiongze, Addie, Ronald G., Zukerman, Moshe and Neame, Timothy D.. 2015. "Performance evaluation of a queue fed by a Poisson Lomax Burst process." IEEE Communications Letters. 19 (3), pp. 367-370. https://doi.org/10.1109/LCOMM.2014.2385083
Validation of multi-layer network optimization
Peng, Yu, Lin, Rongping, Li, Fan, Xing, Chang, Guo, Jun, Hu, Wenjie, Abramov, Vyacheslav, Addie, Ronald G. and Zukerman, Moshe. 2016. "Validation of multi-layer network optimization." 18th International Conference on Transparent Optical Networks (ICTON 2016). Trento, Italy 10 - 14 Jul 2016 IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICTON.2016.7550543
The Inference Graph of Cybersecurity Rules
Sheniar, Dawood, Hadaad, Nabeel and Addie Ron. 2016. "The Inference Graph of Cybersecurity Rules." 29th International Telecommunication Networks and Applications Conference (ITNAC 2019). Auckland, New Zealand 27 - 29 Nov 2019 New Zealand. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ITNAC46935.2019.9077958
Designing an academic workload model in the age of blended learning
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2014. "Designing an academic workload model in the age of blended learning." Dobson, Ian R., Conway, Maree and Sharma, Raj (ed.) Tertiary Education and Management Conference 2014: Rainforest to Reef (TEMC 2014). Cairns, Australia 31 Aug - 03 Sep 2014 Australia.
Listening to the student voice: how are students really using mobile technologies for learning?
Murphy, Angela, Farley, Helen, Johnson, Chris, Lane, Michael, Carter, Brad, Hafeez-Baig, Abdul, Midgley, Warren, Dekeyser, Stijn, Rees, Sharon, Mitchell, Maxine, Doyle, Joanne and Koronios, Andy. 2013. "Listening to the student voice: how are students really using mobile technologies for learning?" Carter, Helen, Gosper, Maree and Hedberg, John (ed.) 30th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2013). Sydney, Australia 01 - 04 Dec 2013
Metadata manipulation interface design
Dekeyser, Stijn and Watson, Richard. 2013. "Metadata manipulation interface design." Smith, Ross T. and Wunsche, Burkhard C. (ed.) 14th Australasian User Interface Conference (AUIC 2013): User Interfaces 2013. Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Performance evaluation and service rate provisioning for a queue with fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2013. "Performance evaluation and service rate provisioning for a queue with fractional Brownian input." Performance Evaluation. 70 (11), pp. 1028-1045. https://doi.org/10.1016/j.peva.2013.07.002
A new teletraffic approach for network planning and evolution prediction
Abramov, Vyacheslav, Addie, Ronald G., Li, Fan, Peng, Yu and Zukerman, Moshe. 2012. "A new teletraffic approach for network planning and evolution prediction." 2012 Optical Fiber Communication Conference (OFC 2012). Los Angeles, United States 04 - 08 Mar 2012 Washington, DC. United States.
How good (or bad) is shortest path routing in layered networks
Addie, Ronald G., Fatseas, David, Peng, Yu, Li, Fan and Zukerman, Moshe. 2012. "How good (or bad) is shortest path routing in layered networks." Chilamkurti, Naveen, Tian, Yu-Chu and Gregory, Mark (ed.) Australasian Telecommunication Networks and Applications Conference (ATNAC 2012). Brisbane, Australia 07 - 09 Nov 2012 Piscataway, NJ. United States. https://doi.org/10.1109/ATNAC.2012.6398056
Optimal choice of test signals for linear channel estimation using second order statistics
Braithwaite, Stephen and Addie, Ronald Geoffrey. 2014. "Optimal choice of test signals for linear channel estimation using second order statistics." Optimization and Engineering. 15 (1), pp. 93-118. https://doi.org/10.1007/s11081-012-9193-3
Layered design of mobile backhaul networks
Fatseas, David and Addie, Ron. 2011. "Layered design of mobile backhaul networks." 17th IEEE International Conference on Networks (ICON 2011). Singapore 14 - 16 Dec 2011 https://doi.org/10.1109/ICON.2011.6168491
Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019
Building a distributed authenticating CDN
Moffatt, Sam. 2011. "Building a distributed authenticating CDN ." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053930
Designing effective mobile web presence
Moffatt, Sam. 2012. "Designing effective mobile web presence." Ally, Mohamed and Needham, Gill (ed.) 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 London, United Kingdom.
Five criteria for web-services security architecture
Addie, R. G. and Colman, Alan. 2010. "Five criteria for web-services security architecture." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 https://doi.org/10.1109/NSS.2010.100
A new teletraffic approach for network planning and evolution prediction
Abramov, Vyacheslav, Addie, Ronald G., Li, Fi, Peng, Yu and Zukerman, Moshe. 2012. "A new teletraffic approach for network planning and evolution prediction." 2012 Optical Fiber Communication Conference (OFC 2012). Los Angeles, United States 04 - 08 Mar 2012 United States. https://doi.org/10.1364/ofc.2012.oth1a.3
Optimizing multi-layered networks towards a transparently optical internet
Addie, Ronald G., Fatseas, David and Zukerman, Moshe. 2010. "Optimizing multi-layered networks towards a transparently optical internet." Jaworski, Marek and Marciniak, Marian (ed.) ICTON 2010: 12th International Conference on Transparent Optical Networks. Munich, Germany 27 Jun - 01 Jul 2010 Warsaw, Poland. https://doi.org/10.1109/ICTON.2010.5549023
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
Optimal choice of test signals for channel estimation
Braithwaite, Stephen and Addie, Ron. 2010. "Optimal choice of test signals for channel estimation." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558839
A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98
A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8
A simple time-management tool for students' online learning activities
de Raadt, Michael and Dekeyser, Stijn. 2009. "A simple time-management tool for students' online learning activities." Atkinson, Roger J. and McBeath, Clare (ed.) 26th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2009). Auckland, New Zealand 06 - 09 Dec 2009 Auckland, New Zealand.
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715
Quantum simulation - rare event simulation by means of cloning, thinning and distortion
Addie, R. G.. 2002. "Quantum simulation - rare event simulation by means of cloning, thinning and distortion." European Transactions on Telecommunications. 13 (4), pp. 387-397. https://doi.org/10.1002/ett.4460130410
A system employing peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Y.. 2007. "A system employing peer review and enhanced computer assisted assessment of querying skills." Informatics in Education. 6 (1), pp. 163-178.
Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Yu. 2006. "Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills." Berglund, Anders and Wiggberg, Mattias (ed.) 6th Baltic Sea Conference on Computing Education Research (Koli Calling 2006). Koli, Finland 09 - 12 Nov 2006 Sweden. https://doi.org/10.1145/1315803.1315821
Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Peer-to-peer form based web information systems
Dekeyser, Stijn, Hidders, Jan, Watson, Richard and Addie, Ron. 2006. "Peer-to-peer form based web information systems." Dobbie, Gillian and Bailey, James (ed.) ADC 2006: 17th Australasian Database Conference. Hobart, Australia 16 - 19 Jan 2006 Australia.
Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Piecemeal: a formal collaborative editing technique guaranteeing correctness
Dekeyser, Stijn and Hidders, Jan. 2010. "Piecemeal: a formal collaborative editing technique guaranteeing correctness." Bessis, Nik, Kommers, Piet and Isaias, Pedro (ed.) IADIS International Conference on Collaborative Technologies 2010 (IADIS 2010). Freiburg, Germany 26 - 31 Jul 2010 Germany.
Integrating mobile into existing applications
Moffatt, Sam. 2011. "Integrating mobile into existing applications." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.
A priority-based processor sharing model for TDM passive optical networks
Wang, Yan, Zukerman, Moshe, Addie, Ronald G., Chan, Sammy and Harris, Richard J.. 2010. "A priority-based processor sharing model for TDM passive optical networks." IEEE Journal on Selected Areas in Communications. 28 (6), pp. 863-874. https://doi.org/10.1109/JSAC.2010.100811
There and back again: a history of access control systems
Moffatt, Sam. 2010. "There and back again: a history of access control systems." MSC Malaysia Open Source Conference (2010). Kuala Lumpur, Malaysia 29 Jun - 01 Jul 2010 Kuala Lumpur, Malaysia.
Joomla! 1.6 security
Moffatt, Sam. 2010. "Joomla! 1.6 security." MSC Malaysia Open Source Conference (2010). Kuala Lumpur, Malaysia 29 Jun - 01 Jul 2010 Kuala Lumpur, Malaysia.
Securing your Joomla! site
Moffatt, Sam. 2009. "Securing your Joomla! site." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.
Summer of Code 2009
Moffatt, Sam. 2009. "Summer of Code 2009." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.
ECOOSE: an echo cancellation object oriented simulation environment
Braithwaite, Stephen and Addie, Ron. 2009. "ECOOSE: an echo cancellation object oriented simulation environment." 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems and Workshops. Rome, Italy 02 - 06 Mar 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.SIMUTOOLS2009.5775
Joomla! 1.6 preview
Moffatt, Sam. 2009. "Joomla! 1.6 preview." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.
Joopal and Drumla: not your usual mashup
Moffatt, Sam. 2009. "Joopal and Drumla: not your usual mashup." Open Source Developers' Conference 2009 (OSDC 2009). Brisbane, Australia 25 - 27 Nov 2009 Brisbane, Australia.
Application level replication in Joomla! using graphs
Moffatt, Sam. 2009. "Application level replication in Joomla! using graphs." Open Source Developers' Conference 2009 (OSDC 2009). Brisbane, Australia 25 - 27 Nov 2009 Brisbane, Australia.
Performance analysis of a Poisson-Pareto queue over the full range of system parameters
Addie, Ron, Neame, Timothy D. and Zukerman, Moshe. 2009. "Performance analysis of a Poisson-Pareto queue over the full range of system parameters." Computer Networks. 53 (7), pp. 1099-1113. https://doi.org/10.1016/j.comnet.2008.12.016
On asymptotic accuracy in queueing theory - the tale of the misleading tail
Addie, Ronald G., Neame, Timothy D. and Zukerman, Moshe. 2003. "On asymptotic accuracy in queueing theory - the tale of the misleading tail." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Melbourne, Australia.
Asymptotically accurate flow completion time distributions under fair queueing
Addie, R. G. and Yevdokimov, Oleksiy. 2008. "Asymptotically accurate flow completion time distributions under fair queueing." Green, Richard (ed.) Australasian Telecommunication Networks and Applications Conference (ATNAC 2007): Next Generation Networks: Enabling Closer International Cooperation. Christchurch, New Zealand 02 - 05 Dec 2007 Piscataway, NJ. United States. https://doi.org/10.1109/ATNAC.2007.4665290
Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows
Addie, Ron. 2008. "Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows." 1st International Workshop on the Evaluation of Quality of Service through Simulation in the Future Internet (QoSim 2008). Marseille, France 03 - 08 Mar 2008 Marseille, France.
On weak convergence of long-range-dependent traffic processes
Addie, R. G.. 1999. "On weak convergence of long-range-dependent traffic processes." Journal of Statistical Planning and Inference. 80 (1), pp. 155-171.
Netml - an XML-based language for describing networks
Zareer, A. and Addie, Ron. 2004. "Netml - an XML-based language for describing networks." 3rd International Information and Telecommunication Technologies Symposium (I2TS 2004). Sao Carlos, Brazil 06 - 09 Dec 2004 Sao Carlos, Brazil.
Admission control schemes for bursty multimedia traffic
Lee, Teck Kiong, Zukerman, Moshe and Addie, Ronald G.. 2001. "Admission control schemes for bursty multimedia traffic." Cruz, R. and Pacifici, G. (ed.) 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001). Anchorage, United States 22 - 26 Apr 2001 Piscataway, NJ. United States. https://doi.org/10.1109/INFCOM.2001.916739
A tradeoff between increased network speed and reduced effective bandwidths
Neame, Timothy D., Zukerman, Moshe and Addie, Ronald G.. 2001. "A tradeoff between increased network speed and reduced effective bandwidths." Nuevo, Y. (ed.) IEEE International Conference on Communications (ICC 2001): Where Minds Meet. Helsinki, Finland 11 - 14 Jun 2000 Piscataway, NJ. United States. https://doi.org/10.1109/ICC.2001.936741
Performance evaluation of a queue fed by a Poisson Pareto burst process
Addie, Ron, Neame, Timothy D. and Zukerman, Moshe. 2002. "Performance evaluation of a queue fed by a Poisson Pareto burst process." Computer Networks. 40 (3), pp. 377-397.
Most probable paths and performance formulae for buffers with Gaussian input traffic
Addie, Ron, Mannersalo, Petteri and Norros, Ilkka. 2002. "Most probable paths and performance formulae for buffers with Gaussian input traffic." European Transactions on Telecommunications. 13 (3), pp. 183-196.
Internet traffic modeling and future technology implications
Zukerman, Moshe, Neame, Timothy D. and Addie, Ron. 2003. "Internet traffic modeling and future technology implications." 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, United States 30 Mar - 03 Apr 2003 San Francisco, United States.
A model, schema, and interface for metadata file systems
Dekeyser, Stijn, Watson, Richard and Motroen, Lasse. 2008. "A model, schema, and interface for metadata file systems." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Wollongong, Australia.
Protecting small flows from large ones for quality of service
Addie, R. G., Yevdokimov, Oleksiy, Braithwaite, Stephen and Millsom, David. 2007. "Protecting small flows from large ones for quality of service." Bernstein, David, Dini, Petre, Hladka, Eva, Reza, Hassan, Romascanu, Dan and Sankar, Krishna (ed.) 2nd International Conference on Digital Telecommunications (ICDT 2007). San Jose, United States 01 - 06 Jul 2007 Piscataway, NJ. United States. https://doi.org/10.1109/ICDT.2007.68
Time variation characteristics of MIMO-OFDM broadband channels in populated indoor environments
Das Gupta, Jishu, Ziri-Castro, Karla and Addie, Ron. 2006. "Time variation characteristics of MIMO-OFDM broadband channels in populated indoor environments." Ellershaw, John (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2006). Melbourne, Australia 04 - 06 Dec 2006 Melbourne, Australia.
Netml: a language and website for collaborative work on networks and their algorithms
Addie, Ron, Braithwaite, Stephen and Zareer, Abdulla. 2006. "Netml: a language and website for collaborative work on networks and their algorithms." Ellershaw, John (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2006). Melbourne, Australia 04 - 06 Dec 2006 Melbourne Australia.
Aggregate flows: for efficient management of large flows in the internet
Addie, Ron, Braithwaite, Stephen, Das Gupta, Jishu and Leis, John W.. 2006. "Aggregate flows: for efficient management of large flows in the internet." WITSP 2006: 5th Workshop on the Internet, Telecommunications and Signal Processing. Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Computer assisted assessment of SQL query skills
Dekeyser, Stijn, de Raadt, Michael and Lee, Tien Yu. 2007. "Computer assisted assessment of SQL query skills." Bailey, James and Fekete, Alan (ed.) 18th Australasian Database Conference (ADC 2007). Ballarat, Australia 29 Jan - 02 Feb 2007 Bedford Park, South Australia.
A metadata collection technique for documents in WinFS
Dekeyser, Stijn. 2005. "A metadata collection technique for documents in WinFS." Kay, Judy, Turpin, Andrew and Wilkinson, Ross (ed.) 10th Australasian Document Computing Symposium (ADCS 2005). Sydney, Australia 12 Dec 2005 Sydney, Australia.
Comparing different approaches to the use of DiffServ in the internet
McNickle, Don and Addie, Ron. 2005. "Comparing different approaches to the use of DiffServ in the internet." Vinnal, E. (ed.) 2005 IEEE Region 10 International Conference (TENCON 2005). Melbourne, Australia 21 - 24 Nov 2005 Melbourne, Australia. https://doi.org/10.1109/TENCON.2005.301038