dblp.uni-trier.dewww.uni-trier.de

William J. Caelli Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
36EEDennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok: Feasibility of Automated Information Security Compliance Auditing. SEC 2008: 493-508
2007
35EEMatthew Henricksen, William J. Caelli, Peter R. Croll: Securing Grid Data Using Mandatory Access Controls. ACSW Frontiers 2007: 25-32
34EEWilliam J. Caelli: Application Security - Myth Or Reality? ISPEC 2007: 1-10
33EEPeter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu: Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. MedInfo 2007: 498-502
32EEWilliam J. Caelli: Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. SEC 2007: 433-442
2006
31EEJohn W. Holford, William J. Caelli: The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. ACISP 2006: 183-194
2005
30EEAdrian McCullagh, William J. Caelli: Who Goes There? Internet Banking: A Matter of Risk and Reward. ACISP 2005: 336-357
29EEJason Reid, William J. Caelli: DRM, Trusted Computing and Operating System Architecture. ACSW Frontiers 2005: 127-136
2004
28EEVicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell: Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294
27EEJohn W. Holford, William J. Caelli, Anthony W. Rhodes: Using Self-Defending Objects to Develop Security Aware Applications in Java. ACSC 2004: 341-349
2002
26 William J. Caelli: Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. Computers & Security 21(5): 413-420 (2002)
2001
25 K. M. Ang, William J. Caelli: Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? SEC 2001: 19-34
24EEAdrian McCullagh, William J. Caelli, Peter Little: Signature Stripping: A Digital Dilemma. Journal of Information, Law and Technology 2001(1): (2001)
2000
23EEAdrian McCullagh, William J. Caelli: Non-Repudiation in the Digital Environment. First Monday 5(8): (2000)
1999
22 William J. Caelli: A Secure Electronic Commerce Environment: Only with `Smart Cards'. Conference on Information Security Management & Small Systems Security 1999: 231-242
21EEWilliam J. Caelli, Ed Dawson, Scott A. Rea: PKI, elliptic curve cryptography, and digital signatures. Computers & Security 18(1): 47-66 (1999)
1998
20 William J. Caelli, Vincent Cordonnier, Anthony Watson: A Data Driven Model for Designing Applications with Smart Cards. CARDIS 1998: 313-325
1997
19 Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348
1995
18 William J. Caelli: Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? Cryptography: Policy and Algorithms 1995: 1-19
17 George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli: The CASS Shell. Cryptography: Policy and Algorithms 1995: 313-325
16 William J. Caelli: Commercial Key Escrow: An Australian Perspective. Cryptography: Policy and Algorithms 1995: 40-64
1994
15EEMark Looi, William J. Caelli: A note on supplying a trusted clock via a secure device. Computers & Security 13(7): 611-613 (1994)
14EEHelen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli: A computer package for measuring the strength of encryption algorithms. Computers & Security 13(8): 687-697 (1994)
13EEWilliam J. Caelli: Security in Open and Distributed Systems. Inf. Manag. Comput. Security 2(1): 18-24 (1994)
1993
12EEWilliam J. Caelli, Ian G. Graham, Luke O'Connor: Cryptographic Application Programming Interfaces (APIs). Computers & Security 12(7): 640-645 (1993)
11EERossouw von Solms, Sebastiaan H. von Solms, William J. Caelli: A Model for Information Security Management. Inf. Manag. Comput. Security 1(3): (1993)
1992
10 Guy G. Gable, William J. Caelli: IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992 North-Holland 1992
9 Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli: Measuring the Strength of Ciphers. SEC 1992: 235-247
8 William J. Caelli, Dennis Longley, Alan B. Tickle: A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296
7EEWilliam J. Caelli, Anthony W. Rhodes, N. C. Russell: An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. Computers & Security 11(5): 463-479 (1992)
1990
6EEHelen Gustafson, Ed Dawson, William J. Caelli: Comparison of Block Ciphers. AUSCRYPT 1990: 208-220
5 William J. Caelli, David Edmond, E. A. Knight, Alan B. Tickle: Implications of the tax file number legislation for computer professionals. Australian Computer Journal 22(1): 11-20 (1990)
1988
4 William J. Caelli: Electronic Funds Transfer Systems. Australian Computer Journal 20(4): 168-169 (1988)
1987
3 William J. Caelli: Guidelines for Privacy and Security in Computer Systems. Australian Computer Journal 19(4): 203-205 (1987)
1985
2 William J. Caelli: Privacy and security in Office Automation Systems. Australian Computer Journal 17(3): 126-130 (1985)
1979
1 William J. Caelli: The CODASYL 1978 Data Base Proposals: An Overview and Discussion. Australian Computer Journal 11(2): 48-59 (1979)

Coauthor Index

1K. M. Ang [25]
2Colin Boyd [19]
3Mark Branagan [36]
4Vincent Cordonnier [20]
5Peter R. Croll [33] [35]
6Ed Dawson [6] [9] [19] [21]
7Edward P. Dawson [14]
8David Edmond [5]
9Ernest Foo [19] [28]
10Guy G. Gable [10]
11Ian G. Graham [12]
12Helen Gustafson [6] [9] [14]
13Matthew Henricksen [33] [35]
14John W. Holford [27] [31]
15E. A. Knight [5]
16Lam-for Kwok [36]
17Peter Little [24]
18Vicky Liu [28] [33]
19Dennis Longley [8] [36]
20Mark Looi [15]
21Adrian McCullagh [23] [24] [30]
22George M. Mohay [17]
23Hasmukh Morarji [17]
24Lance Munday [17]
25Lauren Nielsen [9] [14]
26Luke O'Connor [12]
27Scott A. Rea [21]
28Jason Reid [29]
29Anthony W. Rhodes [7] [27]
30N. C. Russell [7]
31Selwyn Russell [28]
32Rossouw von Solms [11]
33Sebastiaan H. von Solms (Basie von Solms) [11]
34Alan B. Tickle [5] [8]
35Q. Le Viet [17]
36Anthony Watson [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)