2008 |
34 | EE | Dennis Longley,
Mark Branagan,
William J. Caelli,
Lam-for Kwok:
Feasibility of Automated Information Security Compliance Auditing.
SEC 2008: 493-508 |
2007 |
33 | EE | William J. Caelli:
Application Security - Myth Or Reality?
ISPEC 2007: 1-10 |
32 | EE | William J. Caelli:
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM.
SEC 2007: 433-442 |
2006 |
31 | EE | John W. Holford,
William J. Caelli:
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.
ACISP 2006: 183-194 |
2005 |
30 | EE | Adrian McCullagh,
William J. Caelli:
Who Goes There? Internet Banking: A Matter of Risk and Reward.
ACISP 2005: 336-357 |
29 | EE | Jason Reid,
William J. Caelli:
DRM, Trusted Computing and Operating System Architecture.
ACSW Frontiers 2005: 127-136 |
2004 |
28 | EE | Vicky Liu,
William J. Caelli,
Ernest Foo,
Selwyn Russell:
Visually Sealed and Digitally Signed Documents.
ACSC 2004: 287-294 |
27 | EE | John W. Holford,
William J. Caelli,
Anthony W. Rhodes:
Using Self-Defending Objects to Develop Security Aware Applications in Java.
ACSC 2004: 341-349 |
2002 |
26 | | William J. Caelli:
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security.
Computers & Security 21(5): 413-420 (2002) |
2001 |
25 | | K. M. Ang,
William J. Caelli:
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?
SEC 2001: 19-34 |
24 | EE | Adrian McCullagh,
William J. Caelli,
Peter Little:
Signature Stripping: A Digital Dilemma.
Journal of Information, Law and Technology 2001(1): (2001) |
2000 |
23 | EE | Adrian McCullagh,
William J. Caelli:
Non-Repudiation in the Digital Environment.
First Monday 5(8): (2000) |
1999 |
22 | | William J. Caelli:
A Secure Electronic Commerce Environment: Only with `Smart Cards'.
Conference on Information Security Management & Small Systems Security 1999: 231-242 |
21 | EE | William J. Caelli,
Ed Dawson,
Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures.
Computers & Security 18(1): 47-66 (1999) |
1998 |
20 | | William J. Caelli,
Vincent Cordonnier,
Anthony Watson:
A Data Driven Model for Designing Applications with Smart Cards.
CARDIS 1998: 313-325 |
1997 |
19 | | Ernest Foo,
Colin Boyd,
William J. Caelli,
Ed Dawson:
A taxonomy of electronic cash schemes.
SEC 1997: 337-348 |
1995 |
18 | | William J. Caelli:
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?
Cryptography: Policy and Algorithms 1995: 1-19 |
17 | | George M. Mohay,
Hasmukh Morarji,
Q. Le Viet,
Lance Munday,
William J. Caelli:
The CASS Shell.
Cryptography: Policy and Algorithms 1995: 313-325 |
16 | | William J. Caelli:
Commercial Key Escrow: An Australian Perspective.
Cryptography: Policy and Algorithms 1995: 40-64 |
1994 |
15 | EE | Mark Looi,
William J. Caelli:
A note on supplying a trusted clock via a secure device.
Computers & Security 13(7): 611-613 (1994) |
14 | EE | Helen Gustafson,
Edward P. Dawson,
Lauren Nielsen,
William J. Caelli:
A computer package for measuring the strength of encryption algorithms.
Computers & Security 13(8): 687-697 (1994) |
13 | EE | William J. Caelli:
Security in Open and Distributed Systems.
Inf. Manag. Comput. Security 2(1): 18-24 (1994) |
1993 |
12 | EE | William J. Caelli,
Ian G. Graham,
Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs).
Computers & Security 12(7): 640-645 (1993) |
11 | EE | Rossouw von Solms,
Sebastiaan H. von Solms,
William J. Caelli:
A Model for Information Security Management.
Inf. Manag. Comput. Security 1(3): (1993) |
1992 |
10 | | Guy G. Gable,
William J. Caelli:
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992
North-Holland 1992 |
9 | | Helen Gustafson,
Ed Dawson,
Lauren Nielsen,
William J. Caelli:
Measuring the Strength of Ciphers.
SEC 1992: 235-247 |
8 | | William J. Caelli,
Dennis Longley,
Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures.
SEC 1992: 277-296 |
7 | EE | William J. Caelli,
Anthony W. Rhodes,
N. C. Russell:
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC.
Computers & Security 11(5): 463-479 (1992) |
1990 |
6 | | Helen Gustafson,
Ed Dawson,
William J. Caelli:
Comparison of Block Ciphers.
AUSCRYPT 1990: 208-220 |
5 | | William J. Caelli,
David Edmond,
E. A. Knight,
Alan B. Tickle:
Implications of the tax file number legislation for computer professionals.
Australian Computer Journal 22(1): 11-20 (1990) |
1988 |
4 | | William J. Caelli:
Electronic Funds Transfer Systems.
Australian Computer Journal 20(4): 168-169 (1988) |
1987 |
3 | | William J. Caelli:
Guidelines for Privacy and Security in Computer Systems.
Australian Computer Journal 19(4): 203-205 (1987) |
1985 |
2 | | William J. Caelli:
Privacy and security in Office Automation Systems.
Australian Computer Journal 17(3): 126-130 (1985) |
1979 |
1 | | William J. Caelli:
The CODASYL 1978 Data Base Proposals: An Overview and Discussion.
Australian Computer Journal 11(2): 48-59 (1979) |