dblp.uni-trier.dewww.uni-trier.de

William J. Caelli

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
34EEDennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok: Feasibility of Automated Information Security Compliance Auditing. SEC 2008: 493-508
2007
33EEWilliam J. Caelli: Application Security - Myth Or Reality? ISPEC 2007: 1-10
32EEWilliam J. Caelli: Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. SEC 2007: 433-442
2006
31EEJohn W. Holford, William J. Caelli: The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. ACISP 2006: 183-194
2005
30EEAdrian McCullagh, William J. Caelli: Who Goes There? Internet Banking: A Matter of Risk and Reward. ACISP 2005: 336-357
29EEJason Reid, William J. Caelli: DRM, Trusted Computing and Operating System Architecture. ACSW Frontiers 2005: 127-136
2004
28EEVicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell: Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294
27EEJohn W. Holford, William J. Caelli, Anthony W. Rhodes: Using Self-Defending Objects to Develop Security Aware Applications in Java. ACSC 2004: 341-349
2002
26 William J. Caelli: Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. Computers & Security 21(5): 413-420 (2002)
2001
25 K. M. Ang, William J. Caelli: Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? SEC 2001: 19-34
24EEAdrian McCullagh, William J. Caelli, Peter Little: Signature Stripping: A Digital Dilemma. Journal of Information, Law and Technology 2001(1): (2001)
2000
23EEAdrian McCullagh, William J. Caelli: Non-Repudiation in the Digital Environment. First Monday 5(8): (2000)
1999
22 William J. Caelli: A Secure Electronic Commerce Environment: Only with `Smart Cards'. Conference on Information Security Management & Small Systems Security 1999: 231-242
21EEWilliam J. Caelli, Ed Dawson, Scott A. Rea: PKI, elliptic curve cryptography, and digital signatures. Computers & Security 18(1): 47-66 (1999)
1998
20 William J. Caelli, Vincent Cordonnier, Anthony Watson: A Data Driven Model for Designing Applications with Smart Cards. CARDIS 1998: 313-325
1997
19 Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348
1995
18 William J. Caelli: Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? Cryptography: Policy and Algorithms 1995: 1-19
17 George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli: The CASS Shell. Cryptography: Policy and Algorithms 1995: 313-325
16 William J. Caelli: Commercial Key Escrow: An Australian Perspective. Cryptography: Policy and Algorithms 1995: 40-64
1994
15EEMark Looi, William J. Caelli: A note on supplying a trusted clock via a secure device. Computers & Security 13(7): 611-613 (1994)
14EEHelen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli: A computer package for measuring the strength of encryption algorithms. Computers & Security 13(8): 687-697 (1994)
13EEWilliam J. Caelli: Security in Open and Distributed Systems. Inf. Manag. Comput. Security 2(1): 18-24 (1994)
1993
12EEWilliam J. Caelli, Ian G. Graham, Luke O'Connor: Cryptographic Application Programming Interfaces (APIs). Computers & Security 12(7): 640-645 (1993)
11EERossouw von Solms, Sebastiaan H. von Solms, William J. Caelli: A Model for Information Security Management. Inf. Manag. Comput. Security 1(3): (1993)
1992
10 Guy G. Gable, William J. Caelli: IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992 North-Holland 1992
9 Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli: Measuring the Strength of Ciphers. SEC 1992: 235-247
8 William J. Caelli, Dennis Longley, Alan B. Tickle: A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296
7EEWilliam J. Caelli, Anthony W. Rhodes, N. C. Russell: An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. Computers & Security 11(5): 463-479 (1992)
1990
6 Helen Gustafson, Ed Dawson, William J. Caelli: Comparison of Block Ciphers. AUSCRYPT 1990: 208-220
5 William J. Caelli, David Edmond, E. A. Knight, Alan B. Tickle: Implications of the tax file number legislation for computer professionals. Australian Computer Journal 22(1): 11-20 (1990)
1988
4 William J. Caelli: Electronic Funds Transfer Systems. Australian Computer Journal 20(4): 168-169 (1988)
1987
3 William J. Caelli: Guidelines for Privacy and Security in Computer Systems. Australian Computer Journal 19(4): 203-205 (1987)
1985
2 William J. Caelli: Privacy and security in Office Automation Systems. Australian Computer Journal 17(3): 126-130 (1985)
1979
1 William J. Caelli: The CODASYL 1978 Data Base Proposals: An Overview and Discussion. Australian Computer Journal 11(2): 48-59 (1979)

Coauthor Index

1K. M. Ang [25]
2Colin Boyd [19]
3Mark Branagan [34]
4Vincent Cordonnier [20]
5Ed Dawson [6] [9] [19] [21]
6Edward P. Dawson [14]
7David Edmond [5]
8Ernest Foo [19] [28]
9Guy G. Gable [10]
10Ian G. Graham [12]
11Helen Gustafson [6] [9] [14]
12John W. Holford [27] [31]
13E. A. Knight [5]
14Lam-for Kwok [34]
15Peter Little [24]
16Vicky Liu [28]
17Dennis Longley [8] [34]
18Mark Looi [15]
19Adrian McCullagh [23] [24] [30]
20George M. Mohay [17]
21Hasmukh Morarji [17]
22Lance Munday [17]
23Lauren Nielsen [9] [14]
24Luke O'Connor [12]
25Scott A. Rea [21]
26Jason Reid [29]
27Anthony W. Rhodes [7] [27]
28N. C. Russell [7]
29Selwyn Russell [28]
30Rossouw von Solms [11]
31Sebastiaan H. von Solms (Basie von Solms) [11]
32Alan B. Tickle [5] [8]
33Q. Le Viet [17]
34Anthony Watson [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)