Name
Affiliation
Papers
WILLIAM J. CAELLI
QUEENSLAND UNIV TECHNOL,SCH DATA COMMUN,BRISBANE,QLD 4001,AUSTRALIA
39
Collaborators
Citations 
PageRank 
46
113
58.16
Referers 
Referees 
References 
245
268
117
Search Limit
100268
Title
Citations
PageRank
Year
A Viable LoRa Framework for Smart Cities.00.342018
An Architecture for Trustworthy Open Data Services.30.402015
LibVM: an architecture for shared library sandboxing10.382015
Evolving a Secure Internet.00.342013
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.00.342013
Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems00.342013
A Hardware Virtualization Based Component Sandboxing Architecture.10.362012
A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems.00.342011
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks.50.472011
A Business Continuity Management Simulator.00.342010
Open and trusted information systems/health informatics access control (OTHIS/HIAC)10.352009
Feasibility Of Automated Information Security Compliance Auditing00.342008
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records10.432007
Modernising MAC: New forms for mandatory access control in an era of DRM00.342007
Application security - myth or reality?00.342007
The role of the self-defending object concept in developing distributed security-aware applications00.342006
DRM, trusted computing and operating system architecture151.232005
Using self-defending objects to develop security aware applications in Java™50.612004
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security20.482002
Signature Stripping: A Digital Dilemma20.582001
Certificate based PKI and B2B E-commerce: suitable match or not?10.392001
Non-Repudiation in the Digital Environment131.212000
A Secure Electronic Commerce Environment: Only with `Smart Cards'00.341999
Pki, Elliptic Curve Cryptography, And Digital Signatures141.041999
A Data Driven Model for Designing Applications with Smart Cards00.341998
Information Security in electronic Commerce.12.671997
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?00.341995
The CASS Shell10.381995
Commercial Key Escrow: An Australian Perspective10.391995
A note on supplying a trusted clock via a secure device00.341994
Security in Open and Distributed Systems00.341994
A Model for Information Security Management00.341993
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 19923738.241992
Measuring the Strength of Ciphers00.341992
A Methodology for Describing Information and Physical Security Architectures81.441992
File security in WordPerfect 5.010.361991
Electronic Funds Transfer Systems00.341988
Privacy and security in Office Automation Systems00.341985
The CODASYL 1978 Data Base Proposals: An Overview and Discussion00.341979