Vijay Varadharajan
Orcid: 0000-0002-3621-9114Affiliations:
- Macquarie University, Sydney, Australia
According to our database1,
Vijay Varadharajan
authored at least 421 papers
between 1983 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ensuring Fairness and Gradient Privacy in Personalized Heterogeneous Federated Learning.
ACM Trans. Intell. Syst. Technol., June, 2024
ACM Trans. Cyber Phys. Syst., January, 2024
Eng. Appl. Artif. Intell., 2024
Comput. J., 2024
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment.
Comput. Electr. Eng., 2024
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme.
Ad Hoc Networks, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Comput. Networks, December, 2023
IEEE Internet Things J., July, 2023
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
IEEE Trans. Serv. Comput., 2023
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption.
IEEE Trans. Cloud Comput., 2023
J. Mach. Learn. Res., 2023
Output feedback stabilization of large-scale networked cyberphysical systems using cryptographic techniques.
J. Frankl. Inst., 2023
Eng. Appl. Artif. Intell., 2023
2022
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures.
IEEE Trans. Netw. Serv. Manag., 2022
SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure.
IEEE Internet Things J., 2022
A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks.
Eng. Appl. Artif. Intell., 2022
Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN.
Proceedings of the 13th International Conference on Network of the Future, 2022
Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022
2021
Distributed Consensus-Based Economic Dispatch in Power Grids Using the Paillier Cryptosystem.
IEEE Trans. Smart Grid, 2021
Mutual Information and Feature Importance Gradient Boosting: Automatic byte n-gram feature reranking for Android malware detection.
Softw. Pract. Exp., 2021
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments.
Peer-to-Peer Netw. Appl., 2021
A novel secure observer-based controller and attack detection scheme for Networked Control Systems.
Inf. Sci., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
IEEE J. Biomed. Health Informatics, 2020
On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain.
IEEE Trans. Ind. Informatics, 2020
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment.
IEEE Trans. Cloud Comput., 2020
IEEE Internet Things J., 2020
On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation.
IEEE Internet Things J., 2020
IET Cyper-Phys. Syst.: Theory & Appl., 2020
Digit. Commun. Networks, 2020
CoRR, 2020
Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures.
CoRR, 2020
A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
CoRR, 2020
Secure Networked Control of Large-Scale Cyberphysical Systems Using Cryptographic Techniques.
CoRR, 2020
IEEE Access, 2020
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure.
Proceedings of the NOMS 2020, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Policy-based access control for constrained healthcare resources in the context of the Internet of Things.
J. Netw. Comput. Appl., 2019
Int. J. High Perform. Comput. Netw., 2019
IEEE Commun. Lett., 2019
An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection.
CoRR, 2019
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 13th International Conference on Sensing Technology, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance.
Proceedings of the Advanced Information Networking and Applications, 2019
2018
IEEE Trans. Cloud Comput., 2018
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018
IEEE Access, 2018
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
Proceedings of the 12th International Conference on Sensing Technology, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Wirel. Pers. Commun., 2017
IEEE Trans. Dependable Secur. Comput., 2017
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience.
IEEE Trans. Cloud Comput., 2017
J. Netw. Comput. Appl., 2017
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
J. Intell. Fuzzy Syst., 2017
Concurr. Comput. Pract. Exp., 2017
SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Securing communication in multiple Autonomous System domains with Software Defined Networking.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the Eleventh International Conference on Sensing Technology, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Softw. Pract. Exp., 2016
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
Comput. J., 2016
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification.
Comput. J., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Cascading attacks against smart grid using control command disaggregation and services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
On the Design and Implementation of a Security Architecture for Software Defined Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
A New Extension to Kernel Entropy Component Analysis for Image-based Authentication Systems.
J. WSCG, 2015
Concurr. Comput. Pract. Exp., 2015
Comput. J., 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 22nd International Conference on Telecommunications, 2015
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT).
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
Proceedings of the 38th Australasian Computer Science Conference, 2015
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication.
Proceedings of the 38th Australasian Computer Science Conference, 2015
2014
IEEE Trans. Netw. Serv. Manag., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Counteracting security attacks in virtual machines in the cloud using property based attestation.
J. Netw. Comput. Appl., 2014
Secure administration of cryptographic role-based access control for large-scale cloud storage systems.
J. Comput. Syst. Sci., 2014
J. Comput. Syst. Sci., 2014
Dynamic delegation framework for role based access control in distributed data management systems.
Distributed Parallel Databases, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the Ninth Eurosys Conference 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the 23rd Australian Software Engineering Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures.
Proceedings of the 12th IEEE International Conference on Trust, 2013
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the First Australasian Web Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
A flexible cryptographic approach for secure data storage in the cloud using role-based access control.
Int. J. Cloud Comput., 2012
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.
Comput. J., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 19th International Conference on High Performance Computing, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Future Gener. Comput. Syst., 2011
Comput. J., 2011
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
Proceedings of the Database Systems for Advanced Applications, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011
2010
J. Netw. Comput. Appl., 2010
Int. J. Inf. Sec., 2010
A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems.
Distributed Parallel Databases, 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009
Serv. Oriented Comput. Appl., 2009
Proceedings of the Trusted Computing, 2009
Evolution and challenges in trust and security in information system infrastructures.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
2008
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments.
Inf. Syst. E Bus. Manag., 2008
A hybrid model against TCP. SYN and reflection DDoS attacks.
Comput. Syst. Sci. Eng., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
Proceedings of the Data and Applications Security XXII, 2008
2007
Int. J. Wirel. Mob. Comput., 2007
On the design, implementation and application of an authorisation architecture for web services.
Int. J. Inf. Comput. Secur., 2007
Int. J. Agent Oriented Softw. Eng., 2007
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007
Proceedings of ICEBE 2007, 2007
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing.
J. Comput., 2006
ID-based Secure PIM-SM Schemes.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Improving Software Security Through an Integrated Approach.
Proceedings of the SECRYPT 2006, 2006
Design and Implementation of a Practical Secure Distributed Healthcare Application.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Secure route structures for parallel mobile agents based systems using fast binary dispatch.
Mob. Inf. Syst., 2005
Int. J. Web Serv. Res., 2005
Int. J. High Perform. Comput. Netw., 2005
Architectural Framework for Web Services Authorization.
Proceedings of the Web Services and Model-Driven Enterprise Information Services, 2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security.
Proceedings of the Trust, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
Proceedings of the International Conference on Pervasive Services 2005, 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments.
Proceedings of the ICEIS 2005, 2005
A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
2004
Tech. Sci. Informatiques, 2004
Inf. Secur. J. A Glob. Perspect., 2004
Proceedings of the Web Information Systems, 2004
Proceedings of the Web Information Systems, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Fair Trading Protocol With Off-line Anonymous Credit Card Payment.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Distributed Computing, 2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
IEEE Trans. Syst. Man Cybern. Part A, 2003
A formal graph based framework for supporting authorization delegations and conflict resolutions.
Int. J. Inf. Sec., 2003
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Evaluation of Authorization with Delegation and Negation.
Proceedings of the Intelligent Information Processing and Web Mining, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Authorisation Service in .Net My Services.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Delegatable Authorization Program and Its Application.
Proceedings of the International Conference on Security and Management, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
Proceedings of the Computer Science 2003, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
J. Netw. Syst. Manag., 2002
Group Cryptography: Signature and Encryption.
Informatica (Slovenia), 2002
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Security Policy Management in Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce.
Proceedings of the E-Commerce Security and Privacy, 2001
ACM SIGOPS Oper. Syst. Rev., 2001
Proceedings of the Policies for Distributed Systems and Networks, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Integrating Network Services for Virtual Teams.
Proceedings of the ICEIS 2001, 2001
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Int. J. Comput. Math., 2000
IEE Proc. Softw., 2000
Elements of a Language for Role-Based Access Control.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Information Security and Cryptology, 2000
Towards a Generic Logic for Analysing Network Protocols.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
Proceedings of the Australasian Database Conference, 2000
Proceedings of the Current Issues in Databases and Information Systems, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Theor. Comput. Sci., 1999
Proceedings of the TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 1999
Proceedings of the Computer Safety, 1999
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Multiagent Platforms, 1998
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
ACM SIGOPS Oper. Syst. Rev., 1997
A Formal Security Design Approach for Transformation of Authorizations in Information Systems.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
A language for specifying sequences of authorization transformations and its applications.
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
An Access Control Model and Its Use in Representing Mental Health Application Access Policy.
IEEE Trans. Knowl. Data Eng., 1996
Proceedings of the 5th Workshop on Enabling Technologies, 1996
Security model for distributed object framework and its applicability to CORBA.
Proceedings of the Information Systems Security, 1996
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996
Design of Secure End-toEnd Protocols for Mobile Systems.
Proceedings of the Mobile Communications: Technology, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
1993
ACM SIGOPS Oper. Syst. Rev., 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Proceedings of the Proceedings IEEE INFOCOM '90, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
1987
Net-Based System Design Representation and Analysis.
Comput. Syst. Sci. Eng., 1987
1985
Comput. Commun., 1985
Proceedings of the Advances in Cryptology, 1985
1983