Search Results - "Caelli, William"
-
1
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market
Published in IEEE access (01-01-2020)“…Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power…”
Get full text
Journal Article -
2
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market
Published in IEEE access (2021)“…The auditability of telephone call records plays an essential governance role in the electricity industry in Australia as non-compliance with the Australian…”
Get full text
Journal Article -
3
An Achilles heel: denial of service attacks on Australian critical information infrastructures
Published in Information & communications technology law (01-03-2010)“…Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national…”
Get full text
Journal Article -
4
PKI, elliptic curve cryptography, and digital signatures
Published in Computers & security (1999)“…Global electronic commerce (E-comm) necessitates a high degree of trust in its operation for widespread acceptance at government, enterprise and individual…”
Get full text
Journal Article -
5
LibVM: an architecture for shared library sandboxing
Published in Software, practice & experience (01-12-2015)“…Summary Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries…”
Get full text
Journal Article -
6
Security in Open and Distributed Systems
Published in Information management & computer security (01-03-1994)“…Distributed computing systems impose new requirements on the security of the operating systems and hardware structures of the computers participating in a…”
Get full text
Journal Article -
7
Trusted...or...trustworthy: The search for a new paradigm for computer and network security
Published in Computers & security (01-07-2002)“…On the occasion of the presentation of the Kristian Beckman Award for 2002, it is appropriate to pause and reflect on the state of computer and associated data…”
Get full text
Journal Article -
8
Design and Implementation of Unified Communications as a Service Based on the Open Stack Cloud Environment
Published in 2015 IEEE International Conference on Computational Intelligence & Communication Technology (01-02-2015)“…Cloud Computing, based on early virtual computer concepts and technologies, is now itself a maturing technology in the marketplace and it has revolutionized…”
Get full text
Conference Proceeding -
9
Modeling for performance and security balanced trading communication systems in the cloud
Published in 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) (01-12-2017)“…Moving Trading Communication Systems (TCSs) services to the cloud may seem to be a cost-effective choice. However, operating cloud-based TCSs across the…”
Get full text
Conference Proceeding -
10
Performance Analysis of Secure Unified Communications in the VMware-Based Cloud
Published in 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (01-12-2015)“…Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud…”
Get full text
Conference Proceeding Journal Article -
11
Trusted …or… trustworthy: the search for a new paradigm for computer and network security
Published in Computers & security (01-01-2002)“…On the occasion of the presentation of the Kristian Beckman Award for 2002 it is appropriate to pause and reflect on the state of computer and associated data…”
Get full text
Journal Article -
12
Network security metrics and performance for healthcare systems management
Published in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) (01-10-2015)“…While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take…”
Get full text
Conference Proceeding -
13
Implementation and Evaluation of Open Source Unified Communications for SMBs
Published in 2014 International Conference on Computational Intelligence and Communication Networks (01-11-2014)“…In today's world, businesses are under enormous pressure to reduce operational and capital expenditures related to their use of communications technologies…”
Get full text
Conference Proceeding -
14
Mutual Protection in a Cloud Computing Environment
Published in 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC) (01-09-2010)“…The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market…”
Get full text
Conference Proceeding -
15
Electronic Signatures: Understand the Past to Develop the Future
Published in University of New South Wales law journal (01-12-1998)“…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
Get full text
Journal Article -
16
Electronic Signatures: Understand the Past to Develop the Future
Published in University of New South Wales law journal (01-12-1998)“…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
Get full text
Journal Article -
17
Electronic Signatures: Understand the Past to Develop the Future
Published in University of New South Wales law journal (01-12-1998)“…Electronic signatures must emulate the minimum security and trust requirements that are embodied in traditional signatures, in order to be accepted by…”
Get full text
Journal Article -
18
A viable and sustainable key management approach for a national e-health environment
Published in 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom) (01-10-2012)“…To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation…”
Get full text
Conference Proceeding -
19
Electronic signatures : understand the past to develop the future
Published in University of New South Wales law journal (01-01-1998)“…Understanding the implications of electronic signatures - analysis of the established traditional signature conventions - identifying the properties that must…”
Get full text
Journal Article -
20
Electronic signatures : understand the past to develop the future
Published in University of New South Wales law journal (01-01-1998)“…Understanding the implications of electronic signatures - analysis of the established traditional signature conventions - identifying the properties that must…”
Get full text
Journal Article