Browse by Fields of Research (ANZSRC 2008)

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Number of items at this level: 124.

Zhou, Guangping and Shrestha, Anup (2013) Efficient intrusion detection scheme based on SVM. Journal of Networks, 8 (9). pp. 2128-2134. ISSN 1796-2056

Yong, Jianming and Shen, Weiming and James, Anne (2013) Collaborative computing technologies and systems. Journal of Systems and Software, 86 (7). pp. 1725-1726. ISSN 0164-1212

Gray, Anthony (2013) Conflict of laws and the cloud. Computer Law and Security Review, 29 (1). pp. 58-65. ISSN 0267-3649

Long, Hang and Xiang, Wei and Wang, Jing and Zhang, Yueying and Zhao, Hui and Wang, Wenbo (2013) Cooperative jamming and power allocation in two-way relaying system with eavesdropper. In: IEEE 78th Vehicular Technology Conference (VTC 2013-Fall), 2-5 Sept 2013, Las Vegas, NV, USA.

Machin, Tony (2013) Metadata in organisational surveys. In: Advances in organisational research methods and analysis, Australian ed. Chamber & Row, New York, United States, pp. 74-85. ISBN 978-0-9896787-0-4

Lane, Michael (2012) Does the android permission system provide adequate information privacy protection for end-users of mobile apps? In: 10th Australian Information Security Management Conference (SECAU 2012), 3-5 Dec 2012, Perth, Western Australia.

Poepjes, Robert and Lane, Michael (2012) An information security awareness capability model (ISACM). In: 10th Australian Information Security Management Conference (SECAU 2012), 3-5 Dec 2012, Perth, Western Australia.

Xiang, Yang and Pathan, Mukaddim and Tao, Xiaohui and Wang, Hua, eds. (2012) Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings. Lecture Notes in Computer Science, v. 7646, 7646 . Springer-Verlag, Heidelberg, Germany. ISBN 978-3-642-34882-2

Kabir, Md Enamul and Wang, Hua (2012) Microdata protection method through microaggregation: a systematic approach. Journal of Software, 7 (11). pp. 2415-2422. ISSN 1796-217X

Han, Weili and Cao, Ye and Bertino, Elisa and Yong, Jianming (2012) Using automated individual white-list to protect web digital identities. Expert Systems with Applications, 39 (15). pp. 11861-11869. ISSN 0957-4174

Zhang, Zhongwei and Zhou, Hong (2012) Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment. In: 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012), 8-10 Aug 2012, Kyoto, Japan.

Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2012) On the identity anonymization of high-dimensional rating data. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1108-1122. ISSN 1532-0626

Sun, Lili and Wang, Hua (2012) A purpose-based access control in native XML databases. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1154-1166. ISSN 1532-0626

Wang, Peishun and Soar, Jeffrey (2012) A model for security and privacy in e-health. In: 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud, 23-25 Nov 2012, Nanjing, China.

Qin, Yongrui and Sheng, Quan Z. and Wang, Hua (2012) Effectively delivering XML information in periodic broadcast environments. Technical Report. University of Adelaide, Adelaide, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2012) Satisfying privacy requirements before data anonymization. The Computer Journal, 55 (4). pp. 422-437. ISSN 0010-4620

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2012) An approximate microaggregation approach for microdata protection. Expert Systems with Applications, 39 (2). pp. 2211-2219. ISSN 0957-4174

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Ding, Xiaofeng and Wang, Hua (2012) Data privacy against composition attack. In: DASFAA 2012: 17th International Conference on Database Systems for Advanced Applications, 15-18 Apr 2012, Busan, South Korea.

Wong, Yuk Kuen and Thite, Mohan (2012) Information security and privacy in human resource information systems. In: Human resource information systems: basics, applications, and future directions, 2nd ed. Sage Publications, London, United Kingdom, pp. 518-533. ISBN 9781412991667

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2012) Multi-level delegations with trust management in access control systems. Journal of Intelligent Information Systems. ISSN 0925-9902 (In Press)

Sun, Lili and Wang, Hua and Yong, Jianming and Wu, Guoxin (2012) Semantic access control for cloud computing based on e-healthcare. In: CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design, 23-25 May 2012, Wuhan, China.

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2012) A role-involved purpose-based access control model. Information Systems Frontiers, 14 (3). pp. 809-822. ISSN 1387-3326

Lane, Michael Steven and Shrestha, Anup (2011) An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities). In: 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011), 28 Nov - 2 Dec 2011, Bangkok, Thailand.

Sun, Lili and Wang, Hua (2011) Access control and authorization for protecting disseminative information in E-learning workflow. In: ICWM 2009: 4th International Workshop on Workflow Management, 4-8 May 2009, Geneva, Switzerland.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Pei, Jian (2011) Publishing anonymous survey rating data. Data Mining and Knowledge Discovery , 23 (3). pp. 379-406. ISSN 1384-5810

Moffatt, Sam (2011) Building a distributed authenticating CDN. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Addie, Ronald G. and Moffatt, Sam and Dekeyser, Stijn and Colman, Alan (2011) Five examples of web-services for illustrating requirements for security architecture. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Sun, Lili and Wang, Hua (2011) A purpose based usage access control model for e-healthcare services. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Zhang, Zhongwei and Zhou, Hong (2011) A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains. In: 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011), 6-8 Jul 2011, Sydney, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun and Zhang, Ji (2011) Privacy-aware access control with trust management in web service. World Wide Web, 14 (4). pp. 407-430. ISSN 1386-145X

Yong, Jianming and Tiwari, Sanjib and Huang, Xiaodi and Jin, Qun (2011) Constructing robust digital identity infrastructure for future networked society. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.

Qin, Yongrui and Wang, Hua and Sun, Lili (2011) Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments. In: 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011), 22-25 Mar 2011, Biopolis, Singapore.

Sun, Xiaoxun and Sun, Lili and Wang, Hua (2011) Extended k-anonymity models against sensitive attribute disclosure. Computer Communications , 34 (4). pp. 526-535. ISSN 0140-3664

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2011) Validating privacy requirements in large survey rating data. In: Next generation data technologies for collective computational intelligence. Studies in Computational Intelligence (352). Springer-Verlag Berlin and Heidelberg GmbH, Berlin, Germany, pp. 445-469. ISBN 978-3-642-20343-5

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional purpose-based access control model with dynamic roles. Expert Systems with Applications, 38 (3). pp. 1482-1489. ISSN 0957-4174

Sun, Xiaoxun and Li, Min and Wang, Hua (2011) A family of enhanced (L,alpha)- diversity models for privacy preserving data publishing. Future Generation Computer Systems: The International Journal of Grid Computing: Theory, Methods and Applications, 27 (3). pp. 348-356. ISSN 0167-739X

Yong, Jianming (2011) Security and privacy preservation for mobile e-learning via digital identity attributes. Journal of Universal Computer Science, 17 (2). pp. 296-310. ISSN 0948-695x

Kabir, Md Enamul and Wang, Hua (2011) Microdata protection method through microaggregation: a median-based approach. Information Security Journal: A Global Perspective, 20 (1). pp. 1-8. ISSN 1939-3555

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) Efficient systematic clustering method for k-anonymization. Acta Informatica, 48 (1). pp. 51-66. ISSN 0001-5903

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional role-involved purpose-based access control model. Journal of Organizational Computing and Electronic Commerce, 21 (1). pp. 71-91. ISSN 1091-9392

Zhang, Zhongwei (2011) A novel secure routing protocol for MANETs. In: Mobile ad-hoc networks: protocol design. InTech, Rijeka, Croatia, pp. 455-466. ISBN 978-953-307-402-3

Sun, Lili and Li, Yan and Wang, Hua (2011) Access control method with XML databases. In: Information systems and new applications in the service sector: models and methods. Business Science Reference (IGI Global), Hershey, PA, USA, pp. 227-239. ISBN 978-1-60960-138-6

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Wang, Hua (2011) Cloning for privacy protection in multiple independent data publications. In: CIKM 2011: 20th ACM Conference on Information and Knowledge Management , 24-28 Oct 2011, Glasgow, United Kingdom.

Sun, Lili and Wang, Hua and Tao, Xiaohui and Zhang, Yanchun and Yang, Jing (2011) Privacy preserving access control policy and algorithms for conflicting problems. In: TrustCom 2011: 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 16-18 Nov 2011, Changsha, China.

Gururajan, Raj and Hafeez-Baig, Abdul (2011) Wireless handheld device and LAN security issues: a case study. In: Digital business security development: management technologies. Business Science Reference (IGI Global), Hershey, PA, USA, pp. 129-151. ISBN 9781605668062

Rofiq, Ainur and Mula, Joseph M. (2010) Impact of cyber fraud and trust on e-commerce use: a proposed model by adopting theory of planned behaviour. In: ACIS 2010: 21st Australasian Conference on Information Systems: Information Systems: Defining and Establishing a High Impact Discipline, 1-3 Dec 2010, Brisbane, Australia. (Submitted)

Moffatt, Samuel Alexander (2010) Access control in semantic information systems. Coursework Masters thesis, University of Southern Queensland.

Sun, Lili and Wang, Hua and Jururajin, Raj and Sriprakash, Sri (2010) A purpose based access control in XML databases system. In: NSS 2010: 4th International Conference on Network and System Security, 1-3 Sep 2010, Melbourne, Australia.

Moffatt, Samuel Alexander (2010) Joomla! 1.6 security. In: MSC Malaysia Open Source Conference, 29 June - 1 July 2010, Berjaya Times Square Hotel, Kuala Lumpur.

Sun, Xiaoxun (2010) Privacy preserving data sharing in data mining environment. [Thesis (PhD/Research)] (Unpublished)

D'Costa-Alphonso, Marise-Marie and Lane, Michael (2010) The adoption of single sign-on and multifactor authentication in organisations: a critical evaluation using TOE framework. Issues in Informing Science and Information Technology, 7. pp. 161-190. ISSN 1547-5840

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2010) A role-involved conditional purpose-based access control model. In: E-Government and E-Services Conference (EGES) at the 2010 IFIP World Computer Conference (WCC 2010), 20-23 Sep 2010, Brisbane, Australia.

Wang, Hua and Sun, Lili (2010) Trust-involved access control in collaborative open social networks. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Mackenzie, Geraldine and Carter, Hugh (2010) Medico legal issues. In: Health informatics: an overview. Studies in Health Technology and Informatics (151). IOS Press, Amsterdam, Netherlands , pp. 176-182. ISBN 978-1-60750-092-6

Sun, Xiaoxun and Wang, Hua (2010) Towards identify anonymization in large survey rating data. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Sun, Lili (2010) XML documents and access control management. [Thesis (PhD/Research)] (Unpublished)

Kabir, Md Enamul (2010) Access control management and privacy-preserving. [Thesis (PhD/Research)] (Unpublished)

Zhang, Ji and Dekeyser, Stijn and Wang, Hua and Shu, Yanfeng (2010) DISTRO: a system for detecting global outliers from distributed data streams with privacy protection. In: DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications , 1-4 Apr 2010, Tsukuba, Japan.

Yong, Jianming and Bertino, Elisa (2010) Digital identity enrolment and assurance support for VeryIDX. In: CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design , 14-16 Apr 2010, Shanghai, China.

Addie, R. G. and Colman, Alan (2010) Five criteria for web-services security architecture. In: NSS 2010: 4th International Conference on Network and System Security, 1-3 Sep 2010, Melbourne, Australia.

Zhang, Ji and Shu, Yanfeng and Wang, Hua (2010) On memory and I/O efficient duplication detection for multiple self-clean data sources. In: DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications , 1-4 Apr 2010, Tsukuba, Japan.

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Wang, Hua and Wang, Junhu (2010) Privacy protection for genomic data: current techniques and challenges. In: Advances in intelligent information systems. Studies in Computational Intelligence (265). Springer-Verlag, Berlin, Germany, pp. 175-193. ISBN 978-3-642-05182-1

Luo, Yonglong and Shi, Lei and Zhang, Caiyun and Zhang, Ji (2010) Privacy-preserving protocols for string matching. In: 4th International Conference on Network and System Security (NSS 2010), 1-3 Sep 2010, Melbourne, Australia.

Wang, Hua and Sun, Lili and Varadharajan, Vijay (2010) Purpose-based access control policies and conflicting analysis. In: SEC 2010: Security and Privacy: Silver Linings in the Cloud, 20-23 Sep 2010, Brisbane, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2010) Satisfying privacy requirements: one step before anonymization. In: PAKDD 2010: 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining , 21-24 Jun 2010, Hyderabad, India.

Chen, Chen and Weili, Han and Yong, Jianming (2010) Specify and enforce the policies of quantified risk adaptive access control. In: CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design , 14-16 Apr 2010, Shanghai, China.

Kabir, Md Enamul and Wang, Hua (2010) Systematic clustering-based microaggregation for statistical disclosure control. In: NSS 2010: International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Kabir, Md Enamul and Wang, Hua and Zhang, Yanchun (2010) A pairwise-systematic microaggregation for statistical disclosure control. In: ICDM 2010: 10th IEEE International Conference on Data Mining , 14-17 Dec 2010, Sydney, Australia.

Sun, Lili and Wang, Hua (2010) A purpose based usage access control model. International Journal of Computer and Information Engineering, 4 (1). pp. 44-51. ISSN 2010-3921

Moffatt, Samuel Alexander (2009) Securing your Joomla! site. In: JoomlaDay Bangkok 2009, 22-23 Aug 2009, Sripatum University, Bangkok, Thailand.

Wang, Hua and Cao, Jinli and Zhang, Yanchun (2009) Delegating revocations and authorizations in collaborative business environments. Information Systems Frontiers, 11 (3). pp. 293-305. ISSN 1387-3326

Sun, Lili and Li, Yan (2009) Using usage control to access XML databases. International Journal of Information Systems in the Service Sector, 1 (3). pp. 32-44. ISSN 1935-5688

Xiang, Wei and Desai, Bhavin and Wen, Peng and Wang, Yafeng and Peng, Tianshu (2009) A prototype biometric security authentication system based upon fingerprint recognition. In: RSKT 2009: 4th International Conference on Rough Set and Knowledge Technology , 14-16 Jul 2009, Gold Coast, Australia.

Luo, Junzhou and Ni, Xudong and Yong, Jianming (2009) A trust degree based access control in grid environments. Information Sciences, 179 (15). pp. 2618-2628. ISSN 0020-0255

Li, Min and Wang, Hua and Plank, Ashley (2009) Privacy-aware access control with generalization boundaries. In: 32nd Australasian Computer Science Conference (ACSC 2009), 19-23 Jan 2009, Wellington, New Zealand.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Ross, David (2009) Achieving p-sensitive k-anonymity via anatomy. In: ICEBE 2009: IEEE International Conference on e-Business Engineering , 21-23 Oct 2009, Macau, China.

Sun, Lili and Wang, Hua and Yong, Jianming (2009) Authorization algorithms for permission-role assignments. Journal of Universal Computer Science, 15 (9). pp. 1782-1796. ISSN 0948-695X

Kabir, Md Enamul and Wang, Hua (2009) Conditional purpose based access control model for privacy protection. In: ADC 2009: 20th Australasian Conference on Australasian Database, 20-23 Jan 2009, Wellington, New Zealand.

Best, Peter J. and Rikhardsson, Pall and Toleman, Mark (2009) Continuous fraud detection in enterprise systems through audit trial analysis. Journal of Digital Forensics, Security and Law, 4 (1). pp. 39-60. ISSN 1558-7215

Yong, Jianming (2009) Digital identity control mechanism for e-learning. In: ITME 2009: IEEE International Symposium on IT in Medicine and Education, 14-16 Aug 2009, Jinan, China.

Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.

Lai, David and Zhang, Zhongwei (2009) Improving efficiency and scalability of service network graph by re-routing service routes. In: ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems, 1-3 Apr 2009, Dong Hoi, Vietnam.

Wong, Yuk Kuen and Thite, Mohan (2009) Information security and privacy in HRIS. In: Human resource information systems: basics, applications, and future directions. Sage Publications, New Delhi, India, pp. 395-407. ISBN 978-1-4129-4455-7

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Injecting purpose and trust into data anonymisation. In: CIKM 2009: 18th ACM International Conference on Information and Knowledge Management , 2-6 Nov 2009, Hong Kong, China.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Microdata protection through approximate microaggregation. In: ACSC 2009: 32nd Australasian Computer Science Conference, 19-23 Jan 2009, Wellington, New Zealand.

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2009) Optimal privacy-aware path in hippocratic databases. In: DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications, 21-23 Apr 2009, Brisbane, Australia.

Wang, Hua and Sun, Lili and Yong, Jianming and Zhang, Yongbing (2009) Privacy preserving on radio frequency identification systems. In: CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design, 22-24 Apr 2009, Santiago, Chile.

Li, Min and Wang, Hua and Ross, David (2009) Trust-based access control for privacy protection in collaborative environment. In: ICEBE 2009: IEEE International Conference on e-Business Engineering, 21-23 Oct 2009, Macau, China.

Darragh, Warren J. (2009) An analysis of information security in selected Australian organisations. [Thesis (PhD/Research)] (Unpublished)

Buckby, Sherrena and Best, Peter and Stewart, Jenny (2009) The current state of information technology governance literature. In: Information technology governance and service management: frameworks and adaptations. Information Science Reference (IGI Global), Hershey, PA. USA, pp. 1-43. ISBN 978-1-60566-008-0; eISBN 978-1-60566-009-7

Zhang, Zhongwei (2009) An intelligent scheme of secure routing for mobile ad hoc networks. In: ICSPCS 2008: 2nd International Conference on Signal Processing and Communication Systems , 15-17 Dec 2008, Gold Coast, Australia.

Wang, Hua and Zhang, Yanchun and Cao, Jinli (2008) Access control management for ubiquitous computing. Future Generation Computer Systems: The International Journal of Grid Computing: Theory, Methods and Applications, 24 (8). pp. 870-878. ISSN 0167-739X

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) On the complexity of restricted k-anonymity problem. In: APWeb 2008: 10th Asia-Pacific Web Conference, 26-28 Apr 2008, Shenyang, China.

Yong, Jianming and Li, Jiuyong and Wang, Hua (2008) Portable devices of security and privacy preservation for e-learning. In: CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design , 16-18 Apr 2008, Xi'an, China.

Li, Min and Wang, Hua (2008) Protecting information sharing in distributed collaborative environment. In: APWeb 2008: 10th Asia Pacific Web Conference Workshop , 26-28 Apr 2008, Shenyang, China.

Sun, Lili and Li, Yan (2008) XML and web services security. In: CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design, 16-18 Apr 2008, Xi'an, China.

Sun, Xiaoxun and Li, Min and Wang, Hua and Plank, Ashley (2008) An efficient hash-based algorithm for minimal k-anonymity. In: ACSC 2008: 31st Australasian Computer Science Conference, 22-25 Jan 2008, Wollongong, Australia.

Li, Min and Wang, Hua (2008) ABDM: an extended flexible delegation model in RBAC. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Li, Min and Wang, Hua and Plank, Ashley and Yong, Jianming (2008) Advanced permission-role relationship in role-based access control. In: ACISP 2008:13th Australasian Conference on Information Security and Privacy , 7-9 Jul 2008, Wollongong, Australia.

Lu, Jia and Weber, Ian (2008) Chinese government and software copyright: manipulating the boundaries between public and private. International Journal of Communication, 2. pp. 81-99.

Li, Jiuyong and Wang, Hua and Jin, Huidong and Yong, Jianming (2008) Current developments of k-anonymous data releasing. Electronic Journal of Health Informatics, 3 (1). ISSN 1446-4381

Wang, Hua and Cao, Jinli (2008) Delegating revocations and authorizations. In: BPM 2007: 5th International Conference on Business Process Management, 24-28 Sep 2007, Brisbane, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Truta, Traian Marius (2008) Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Transactions on Data Privacy, 1 (2). pp. 53-66. ISSN 1888-5063

Yong, Jianming (2008) Enhancing the privacy of e-learning systems with alias and anonymity. In: CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design, 26-28 Apr 2007, Melbourne, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) L-diversity based dynamic update for large time-evolving microdata. In: AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence , 1-5 Dec 2008, Auckland, New Zealand.

Sun, Lili and Wang, Hua and Li, Yan (2008) Protecting disseminative information in e-learning. In: ICWL 2007: 6th International Conference on Web-Based Learning , 15-17 Aug 2007, Edinburgh, Scotland.

Wang, Hua and Li, Qing (2008) Secure and efficient information sharing in multi-university e-learning environments. In: ICWL 2007: 6th International Conference on Web-Based Learning , 15-17 Aug 2007, Edinburgh, United Kingdom.

Lai, David and Zhang, Zhongwei (2008) Self-authentication of encrypted channels in service network graph. In: NPC 2008: IFIP International Conference on Network and Parallel Computing , 18-21 Oct 2008, Shanghai, China.

Sun, Xiaoxun and Wang, Hua and Truta, Traian Marius and Li, Jiuyong and Li, Ping (2008) (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Yong, Jianming (2007) Security modelling for e-learning. In: 1st International Symposium on Information Technologies and Applications in Education (ISITAE 07), 23-25 Nov 2007, Kunming, China.

Yong, Jianming (2007) Digital identity design and privacy preservation for e-learning. In: CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design, 26-28 Apr 2007, Melbourne, Australia.

Xi, Shengtian and Yong, Jianming (2007) New data integration workflow design for e-learning. Lecture Notes in Computer Science, 4402. pp. 699-707. ISSN 0302-9743

Yong, Jianming and Bertino, Elisa and Toleman, Mark and Roberts, Dave (2006) Extended RBAC with role attributes. In: 10th Pacific Asia Conference on Information Systems (PACIS 2006), 6-9 Jul 2006, Kuala Lumpur, Malaysia.

Wang, Zhen and Zhang, Zhongwei and Zhang, Yanchun (2006) Towards enhancing trust on Chinese e-commerce. In: APWeb 2006: 8th Asia-Pacific Web Conference: Frontiers of WWW Research and Development, 16-18 Jan 2006, Harbin, China.

Gururajan, Raj (2006) A discussion on security risks in mobile commerce. e-Business Review, 7 (2). pp. 9-39. ISSN 1229-6546

Wang, Hua and Sun, Lili and Zhang, Yanchun and Cao, Jinli (2005) Authorization algorithms for the mobility of user-role relationship. In: ACSC 2005: 28th Australasian Computer Science Conference, 28 Jan-3 Feb 2005, Newcastle, Australia.

Cao, Jinli and Sun, Lili and Wang, Hua (2005) Towards secure XML document with usage control. In: 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005), 29 Mar-1 Apr 2005, Shanghai, China.

Sun, Lili and Li, Yan (2005) XML undeniable signatures. In: International Conference on Intelligent Agents, Web Technologies & Internet Commerce, 28-30 Nov 2005, Vienna, Austria.

Wang, Hua and Sun, Lili and Zhang, Yanchun and Cao, Jinli (2004) Anonymous access scheme for electronic services. In: 27th Australasian Computer Science Conference (ACSC2004), 18-22 Jan 2004, Dunedin, NZ.

Norman, Mark and Leis, John (2004) Student-accessible tools and techniques to aid in teaching network protocols. In: AaeE 2004: Creating Flexible Learning Environments, 27-29 Sep 2009, Toowoomba, Australia.

Wallis, Corey (2004) The relationship between system administration and end user license agreements. In: Sage-au'04 12 Annual Conference, 16-20 Aug 2004, Brisbane, Australia. (Unpublished)

Yong, Jianming and Lane, Michael S. and Toleman, Mark and Yang, Yun (2003) Enforcing secure access control in integrated systems over the internet. In: 1st Australian Information Security Management Conference, 24 Nov 2003, Perth, Western Australia.

Wang, Hua and Cao, Jinli and Zhang, Yanchun (2003) A flexible payment scheme and its permission-role assignment. In: 26th Australasian Computer Science Conference (ACSC2003), 4-7 Feb 2003, Adelaide, Australia.

This list was generated on Wed Apr 16 00:11:34 2014 EST.