Search Results - "Caelli, William"

Refine Results
  1. 1

    A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market by Tesfamicael, Aklilu Daniel, Liu, Vicky, McKague, Matthew, Caelli, William, Foo, Ernest

    Published in IEEE access (01-01-2020)
    “…Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power…”
    Get full text
    Journal Article
  2. 2

    An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market by Tesfamicael, Aklilu Daniel, Liu, Vicky, Mckague, Matthew, Caelli, William

    Published in IEEE access (2021)
    “…The auditability of telephone call records plays an essential governance role in the electricity industry in Australia as non-compliance with the Australian…”
    Get full text
    Journal Article
  3. 3

    An Achilles heel: denial of service attacks on Australian critical information infrastructures by Christensen, Sharon, Caelli, William J., Duncan, William D., Georgiades, Eugenia

    “…Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national…”
    Get full text
    Journal Article
  4. 4

    PKI, elliptic curve cryptography, and digital signatures by Caelli, William J, Dawson, Edward P, Rea, Scott A

    Published in Computers & security (1999)
    “…Global electronic commerce (E-comm) necessitates a high degree of trust in its operation for widespread acceptance at government, enterprise and individual…”
    Get full text
    Journal Article
  5. 5

    LibVM: an architecture for shared library sandboxing by Goonasekera, Nuwan, Caelli, William, Fidge, Colin

    Published in Software, practice & experience (01-12-2015)
    “…Summary Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries…”
    Get full text
    Journal Article
  6. 6

    Security in Open and Distributed Systems by Caelli, William J

    Published in Information management & computer security (01-03-1994)
    “…Distributed computing systems impose new requirements on the security of the operating systems and hardware structures of the computers participating in a…”
    Get full text
    Journal Article
  7. 7

    Trusted...or...trustworthy: The search for a new paradigm for computer and network security by Caelli, William J

    Published in Computers & security (01-07-2002)
    “…On the occasion of the presentation of the Kristian Beckman Award for 2002, it is appropriate to pause and reflect on the state of computer and associated data…”
    Get full text
    Journal Article
  8. 8

    Design and Implementation of Unified Communications as a Service Based on the Open Stack Cloud Environment by Tesfamicael, Aklilu Daniel, Liu, Vicky, Caelli, William

    “…Cloud Computing, based on early virtual computer concepts and technologies, is now itself a maturing technology in the marketplace and it has revolutionized…”
    Get full text
    Conference Proceeding
  9. 9

    Modeling for performance and security balanced trading communication systems in the cloud by Tesfamicael, Aklilu Daniel, Liu, Vicky, Foo, Ernest, Caelli, William

    “…Moving Trading Communication Systems (TCSs) services to the cloud may seem to be a cost-effective choice. However, operating cloud-based TCSs across the…”
    Get full text
    Conference Proceeding
  10. 10

    Performance Analysis of Secure Unified Communications in the VMware-Based Cloud by Tesfamicael, Aklilu Daniel, Liu, Vicky, Caelli, William

    “…Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud…”
    Get full text
    Conference Proceeding Journal Article
  11. 11

    Trusted …or… trustworthy: the search for a new paradigm for computer and network security by Caelli, William J

    Published in Computers & security (01-01-2002)
    “…On the occasion of the presentation of the Kristian Beckman Award for 2002 it is appropriate to pause and reflect on the state of computer and associated data…”
    Get full text
    Journal Article
  12. 12

    Network security metrics and performance for healthcare systems management by Liu, Vicky, Tesfamicael, Aklilu Daniel, Caelli, William, Sahama, Tony

    “…While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take…”
    Get full text
    Conference Proceeding
  13. 13

    Implementation and Evaluation of Open Source Unified Communications for SMBs by Tesfamicael, Aklilu Daniel, Liu, Vicky, Caelli, William, Zureo, Jonathan

    “…In today's world, businesses are under enormous pressure to reduce operational and capital expenditures related to their use of communications technologies…”
    Get full text
    Conference Proceeding
  14. 14

    Mutual Protection in a Cloud Computing Environment by Albeshri, A, Caelli, W

    “…The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market…”
    Get full text
    Conference Proceeding
  15. 15

    Electronic Signatures: Understand the Past to Develop the Future by Adrian McCullagh, Peter Little, William Caelli

    Published in University of New South Wales law journal (01-12-1998)
    “…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
    Get full text
    Journal Article
  16. 16

    Electronic Signatures: Understand the Past to Develop the Future by Adrian McCullagh, Peter Little, William Caelli

    Published in University of New South Wales law journal (01-12-1998)
    “…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
    Get full text
    Journal Article
  17. 17

    Electronic Signatures: Understand the Past to Develop the Future by Adrian McCullagh, Peter Little, William Caelli

    Published in University of New South Wales law journal (01-12-1998)
    “…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
    Get full text
    Journal Article
  18. 18

    A viable and sustainable key management approach for a national e-health environment by Pei-Yuan Shen, Liu, V., Caelli, W.

    “…To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation…”
    Get full text
    Conference Proceeding
  19. 19

    Electronic signatures : understand the past to develop the future by Adrian MCCULLAGH, William Caelli, Peter LITTLE

    Published in University of New South Wales law journal (01-01-1998)
    “…Understanding the implications of electronic signatures - analysis of the established traditional signature conventions - identifying the properties that must…”
    Get full text
    Journal Article
  20. 20

    Electronic signatures : understand the past to develop the future by Adrian MCCULLAGH, William Caelli, Peter LITTLE

    Published in University of New South Wales law journal (01-01-1998)
    “…Understanding the implications of electronic signatures - analysis of the established traditional signature conventions - identifying the properties that must…”
    Get full text
    Journal Article