William J. Caelli
Affiliations:- Queensland University of Technology, Brisbane, QLD, Australia
According to our database1,
William J. Caelli
authored at least 63 papers
between 1979 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market.
IEEE Access, 2021
2020
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market.
IEEE Access, 2020
2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
2018
Proceedings of the 26th International Conference on Software, 2018
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
2017
Modeling for performance and security balanced trading communication systems in the cloud.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the 17th International Conference on E-health Networking, 2015
2013
Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems.
Int. J. E Health Medical Commun., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.
Proceedings of the Information Assurance and Security Education and Training, 2013
2012
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs.
Int. J. Inf. Secur. Priv., 2012
Comput. Secur., 2012
A viable and sustainable key management approach for a national e-health environment.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012
2011
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Society - Totally Dependent Upon ICT? Introduction to the CIP-2010 Conference Proceedings.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
2009
ACM SIGCSE Bull., 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the Australasian Conference on Information Systems, 2007
2006
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Computer Science 2004, 2004
Proceedings of the Computer Science 2004, 2004
2002
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security.
Comput. Secur., 2002
2001
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
1999
A Secure Electronic Commerce Environment: Only with 'Smart Cards'.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Comput. Secur., 1994
1993
1992
Comput. Secur., 1992
Measuring the Strength of Ciphers.
Proceedings of the IT Security: The Need for International Cooperation, 1992
A Methodology for Describing Information and Physical Security Architectures.
Proceedings of the IT Security: The Need for International Cooperation, 1992
1991
1990
Implications of the tax file number legislation for computer professionals.
Aust. Comput. J., 1990
1988
Electronic Funds Transfer Systems.
Aust. Comput. J., 1988
1987
Guidelines for Privacy and Security in Computer Systems.
Aust. Comput. J., 1987
1985
Privacy and security in Office Automation Systems.
Aust. Comput. J., 1985
1979
The CODASYL 1978 Data Base Proposals: An Overview and Discussion.
Aust. Comput. J., 1979