Browse by Fields of Research (ANZSRC 2008)

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Number of items at this level: 40.

Li, Jiuyong and Liu, Jixue and Toivonen, Hannu and Yong, Jianming (2013) Effective pruning for the discovery of conditional functional dependencies. The Computer Journal, 56 (3). pp. 378-392. ISSN 0010-4620

Tao, Xiaohui and Li, Yuefeng and Liu, Bin and Shen, Yan (2012) Semantic labelling for document feature patterns using ontological subjects. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012), 4-7 Dec 2012, Macau, China.

Sun, Lili and Wang, Hua (2012) A purpose-based access control in native XML databases. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1154-1166. ISSN 1532-0626

Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2012) On the identity anonymization of high-dimensional rating data. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1108-1122. ISSN 1532-0626

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Ding, Xiaofeng and Wang, Hua (2012) Data privacy against composition attack. In: DASFAA 2012: 17th International Conference on Database Systems for Advanced Applications, 15-18 Apr 2012, Busan, South Korea.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048

Ahmed, Waqas and Aslam, Muhammad Ahtisham and Shen, Jun and Yong, Jianming (2011) A light weight approach for ontology generation and change synchronization between ontologies and source relational databases. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2011) Validating privacy requirements in large survey rating data. In: Next generation data technologies for collective computational intelligence. Studies in Computational Intelligence (352). Springer-Verlag Berlin and Heidelberg GmbH, Berlin, Germany, pp. 445-469. ISBN 978-3-642-20343-5

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional purpose-based access control model with dynamic roles. Expert Systems with Applications, 38 (3). pp. 1482-1489. ISSN 0957-4174

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional role-involved purpose-based access control model. Journal of Organizational Computing and Electronic Commerce, 21 (1). pp. 71-91. ISSN 1091-9392

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Wang, Hua (2011) Cloning for privacy protection in multiple independent data publications. In: CIKM 2011: 20th ACM Conference on Information and Knowledge Management , 24-28 Oct 2011, Glasgow, United Kingdom.

Kist, Alexander A. (2011) Modelling of staged routing for reduced carbon footprints of large server clusters. International Journal of Communication Networks and Distributed Systems, 6 (1). pp. 28-44. ISSN 1754-3916

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2010) A role-involved conditional purpose-based access control model. In: E-Government and E-Services Conference (EGES) at the 2010 IFIP World Computer Conference (WCC 2010), 20-23 Sep 2010, Brisbane, Australia.

Wang, Hua and Sun, Lili (2010) Trust-involved access control in collaborative open social networks. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Zhang, Ji and Shu, Yanfeng and Wang, Hua (2010) On memory and I/O efficient duplication detection for multiple self-clean data sources. In: DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications , 1-4 Apr 2010, Tsukuba, Japan.

Sefton, Peter and Watson, Kate (2009) Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories. In: DRF 2009: Open Access Repositories Now and In the Future: From the Global and Asia-Pacific Points of View, 3-4 Dec 2009, Tokyo, Japan.

Sun, Lili and Li, Yan (2009) Using usage control to access XML databases. International Journal of Information Systems in the Service Sector, 1 (3). pp. 32-44. ISSN 1935-5688

Li, Min and Wang, Hua and Plank, Ashley (2009) Privacy-aware access control with generalization boundaries. In: 32nd Australasian Computer Science Conference (ACSC 2009), 19-23 Jan 2009, Wellington, New Zealand.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Ross, David (2009) Achieving p-sensitive k-anonymity via anatomy. In: ICEBE 2009: IEEE International Conference on e-Business Engineering , 21-23 Oct 2009, Macau, China.

Zhang, Ji and Gao, Qigang and Wang, Hai and Liu, Qing and Xu, Kai (2009) Detecting projected outliers in high-dimensional data streams. In: DEXA 2009: 20th International Conference on Database and Expert Systems Applications, 31 Aug- 4Sep 2009, Linz, Austria.

Sefton, Peter and Barnes, Ian and Ward, Ron and Downing, Jim (2009) Embedding metadata and other semantics in word processing documents. In: DDC 2008: Radical Sharing: Transforming Science? , 1-3 Dec 2008, Edinburgh, Scotland.

Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Injecting purpose and trust into data anonymisation. In: CIKM 2009: 18th ACM International Conference on Information and Knowledge Management , 2-6 Nov 2009, Hong Kong, China.

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2009) Optimal privacy-aware path in hippocratic databases. In: DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications, 21-23 Apr 2009, Brisbane, Australia.

Li, Min and Wang, Hua and Ross, David (2009) Trust-based access control for privacy protection in collaborative environment. In: ICEBE 2009: IEEE International Conference on e-Business Engineering, 21-23 Oct 2009, Macau, China.

Dekeyser, Stijn and Watson, Richard and Motroen, Lasse (2008) A model, schema, and interface for metadata file systems. In: 31st Australasian Computer Science Conference (ACSC 2008), 22-25 Jan 2008, Wollongong, Australia.

Sun, Xiaoxun and Li, Min and Wang, Hua and Plank, Ashley (2008) An efficient hash-based algorithm for minimal k-anonymity. In: ACSC 2008: 31st Australasian Computer Science Conference, 22-25 Jan 2008, Wollongong, Australia.

Li, Min and Wang, Hua (2008) ABDM: an extended flexible delegation model in RBAC. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Li, Min and Wang, Hua and Plank, Ashley and Yong, Jianming (2008) Advanced permission-role relationship in role-based access control. In: ACISP 2008:13th Australasian Conference on Information Security and Privacy , 7-9 Jul 2008, Wollongong, Australia.

Wang, Hua and Cao, Jinli (2008) Delegating revocations and authorizations. In: BPM 2007: 5th International Conference on Business Process Management, 24-28 Sep 2007, Brisbane, Australia.

Sun, Xiaoxun and Wang, Hua and Truta, Traian Marius and Li, Jiuyong and Li, Ping (2008) (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Hart, Caroline (2008) The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card. University of Tasmania Law Review, 25 (1). pp. 5-43. ISSN 0082-2108

Li, Jiuyong and Huang, Xiaodi and Selke, Clinton and Yong, Jianming (2007) A fast algorithm for finding correlation clusters in noise data. In: 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining: Advances in Knowledge Discovery and Data Mining (PAKDD2007, 22-25 May 2007, Nanjing, China.

de Raadt, Michael and Dekeyser, Stijn and Lee, Tien Y. (2007) A system employing peer review and enhanced computer assisted assessment of querying skills. Informatics in Education, 6 (1). pp. 163-178. ISSN 1648-5831

Li, Jiuyong and Wang, Hua and Jin, Huidong and Yong, Jianming (2006) Current developments of k-anonymous data releasing. In: National e-Health Privacy and Security Symposium 2006, 24-26 October 2006, Brisbane.

Gupta, Madan and George, Doug and Basnet, Badri Bahadur (2005) Seed identification using a computerised database. Seed Science and Technology, 33 (3). pp. 647-654. ISSN 0251-0952

Dekeyser, Stijn and Hidders, Jan and Paredaens, Jan (2004) A transaction model for XML databases. World Wide Web, 7 (1). pp. 29-57. ISSN 1386-145X

Wang, Hua and Zhang, Yanchun and Cao, Jinli and Yang, Jian (2004) Specifying role-based access constraints with object constraint language. In: 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004), 14-17 April 2004, Hangzhou, China.

Dekeyser, Stijn and Hidders, Jan (2003) A commit scheduler for XML databases. In: 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications , 23-25 Apr 2003, Xian, China.

Wang, Hua and Zhang, Yanchun (2000) A protocol for untraceable electronic cash. In: 1st Web-Age Information Management International Conference (WAIM 2000), 21-23 Jun 2000, Shanghai, China.

This list was generated on Sat Nov 1 01:01:28 2014 EST.