


default search action
William J. Caelli
Person information
- affiliation: Queensland University of Technology, Brisbane, QLD, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j25]Aklilu Daniel Tesfamicael
, Vicky Liu
, Matthew McKague
, William J. Caelli:
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market. IEEE Access 9: 146437-146453 (2021) - 2020
- [j24]Aklilu Daniel Tesfamicael
, Vicky Liu
, Matthew McKague
, William J. Caelli, Ernest Foo
:
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market. IEEE Access 8: 132424-132445 (2020)
2010 – 2019
- 2019
- [c38]Jiaming James Chen, Vicky Liu, William J. Caelli:
An Adaptive and Autonomous LoRa Gateway for Throughput Optimisation. ACSW 2019: 7:1-7:9 - [c37]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo
, Bill Caelli:
QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud. ACSW 2019: 10:1-10:9 - 2018
- [c36]Jiaming James Chen, Jiexuan Edward Chen, Vicky Liu, Laurence D. Fairbairn, Leonie Simpson, Charles Wang, William J. Caelli:
A Viable LoRa Framework for Smart Cities. PACIS 2018: 59 - [c35]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo
, Bill Caelli:
Modeling for a QoS-Efficient Real-Time Video Conferencing System in the Cloud. SoftCOM 2018: 1-6 - 2017
- [c34]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo
, William J. Caelli:
Modeling for performance and security balanced trading communication systems in the cloud. IPCCC 2017: 1-7 - 2015
- [j23]Nuwan Goonasekera
, William J. Caelli, Colin J. Fidge
:
LibVM: an architecture for shared library sandboxing. Softw. Pract. Exp. 45(12): 1597-1617 (2015) - [c33]Vicky Liu, Aklilu Daniel Tesfamicael, William J. Caelli, Tony Sahama:
Network security metrics and performance for healthcare systems management. HealthCom 2015: 189-194 - [c32]Andrew Wong, Vicky Liu, William J. Caelli, Tony Sahama:
An Architecture for Trustworthy Open Data Services. IFIPTM 2015: 149-162 - 2013
- [j22]Vicky Liu, William J. Caelli, Yu-Nien Maggie Chen:
Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems. Int. J. E Health Medical Commun. 4(4): 66-83 (2013) - [c31]William J. Caelli, Vicky Liu, Dennis Longley:
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security. World Conference on Information Security Education 2013: 39-47 - [c30]William J. Caelli, Lam-for Kwok, Dennis Longley:
Evolving a Secure Internet. SEC 2013: 42-54 - 2012
- [j21]William J. Caelli:
Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners. Comput. Secur. 31(4): 637 (2012) - [j20]Pei Yuan Shen, Maolin Tang
, Vicky Liu, William J. Caelli:
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs. Int. J. Inf. Secur. Priv. 6(1): 33-56 (2012) - [j19]Nuwan Goonasekera
, William J. Caelli, Colin J. Fidge
:
A Hardware Virtualization Based Component Sandboxing Architecture. J. Softw. 7(9): 2107-2118 (2012) - [c29]Pei Yuan Shen, Vicky Liu, William J. Caelli:
A viable and sustainable key management approach for a national e-health environment. Healthcom 2012: 347-352 - 2011
- [c28]Vicky Liu, William J. Caelli, Yingsen Yang, Lauren May:
A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems. PACIS 2011: 119 - [c27]Pei Yuan Shen, Vicky Liu, Maolin Tang, William J. Caelli:
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks. PACIS 2011: 175 - 2010
- [c26]William J. Caelli:
Society - Totally Dependent Upon ICT? Introduction to the CIP-2010 Conference Proceedings. HCC 2010: 313-314 - [c25]Aiiad Albeshri
, William J. Caelli:
Mutual Protection in a Cloud Computing Environment. HPCC 2010: 641-646 - [c24]William J. Caelli, Lam-for Kwok
, Dennis Longley:
A Business Continuity Management Simulator. SEC 2010: 9-18
2000 – 2009
- 2009
- [j18]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali E. Abdallah, Matt Bishop
, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles P. Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson:
An exploration of the current state of information assurance education. ACM SIGCSE Bull. 41(4): 109-125 (2009) - [c23]Vicky Liu, Luis Franco, William J. Caelli, Lauren May, Tony Sahama:
Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC). AISC 2009: 99-108 - 2008
- [c22]Dennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok
:
Feasibility of Automated Information Security Compliance Auditing. SEC 2008: 493-508 - 2007
- [c21]Vicky Liu, Lauren May, William J. Caelli, Peter R. Croll:
A Sustainable Approach to Security and Privacy in Health Information Systems. ACIS 2007 - [c20]Matthew Henricksen, William J. Caelli, Peter R. Croll:
Securing Grid Data Using Mandatory Access Controls. ACSW 2007: 25-32 - [c19]William J. Caelli:
Application Security - Myth Or Reality? ISPEC 2007: 1-10 - [c18]Peter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu:
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. MedInfo 2007: 498-502 - [c17]William J. Caelli:
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. SEC 2007: 433-442 - 2006
- [c16]John W. Holford, William J. Caelli:
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. ACISP 2006: 183-194 - 2005
- [c15]Adrian McCullagh, William J. Caelli:
Who Goes There? Internet Banking: A Matter of Risk and Reward. ACISP 2005: 336-357 - [c14]Jason Reid, William J. Caelli:
DRM, Trusted Computing and Operating System Architecture. ACSW 2005: 127-136 - 2004
- [c13]Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:
Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294 - [c12]John W. Holford, William J. Caelli, Anthony W. Rhodes:
Using Self-Defending Objects to Develop Security Aware Applications in Java. ACSC 2004: 341-349 - 2002
- [j17]William J. Caelli:
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. Comput. Secur. 21(5): 413-420 (2002) - 2001
- [j16]Adrian McCullagh, William J. Caelli, Peter Little:
Signature Stripping: A Digital Dilemma. J. Inf. Law Technol. 2001(1) (2001) - [c11]Kok Ming Ang, William J. Caelli:
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? SEC 2001: 19-34 - 2000
- [j15]Adrian McCullagh, William J. Caelli:
Non-Repudiation in the Digital Environment. First Monday 5(8) (2000)
1990 – 1999
- 1999
- [j14]William J. Caelli, Ed Dawson
, Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures. Comput. Secur. 18(1): 47-66 (1999) - [c10]William J. Caelli:
A Secure Electronic Commerce Environment: Only with 'Smart Cards'. Conference on Information Security Management & Small Systems Security 1999: 231-242 - 1998
- [c9]William J. Caelli, Vincent Cordonnier, Anthony Watson:
A Data Driven Model for Designing Applications with Smart Cards. CARDIS 1998: 313-325 - 1997
- [c8]William J. Caelli:
Information Security in electronic Commerce. PACIS 1997: 1 - [c7]Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348 - 1995
- [c6]William J. Caelli:
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? Cryptography: Policy and Algorithms 1995: 1-19 - [c5]William J. Caelli:
Commercial Key Escrow: An Australian Perspective. Cryptography: Policy and Algorithms 1995: 40-64 - [c4]George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli:
The CASS Shell. Cryptography: Policy and Algorithms 1995: 313-325 - 1994
- [j13]Mark Looi, William J. Caelli:
A note on supplying a trusted clock via a secure device. Comput. Secur. 13(7): 611-613 (1994) - [j12]Helen Gustafson, Ed Dawson
, Lauren Nielsen, William J. Caelli:
A computer package for measuring the strength of encryption algorithms. Comput. Secur. 13(8): 687-697 (1994) - [j11]Rossouw von Solms, Helen van de Haar, Sebastiaan H. von Solms, William J. Caelli:
A framework for information security evaluation. Inf. Manag. 26(3): 143-153 (1994) - [j10]William J. Caelli:
Security in Open and Distributed Systems. Inf. Manag. Comput. Secur. 2(1): 18-24 (1994) - 1993
- [j9]William J. Caelli, Ian G. Graham, Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs). Comput. Secur. 12(7): 640-645 (1993) - [j8]Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli:
A Model for Information Security Management. Inf. Manag. Comput. Secur. 1(3): 12-17 (1993) - 1992
- [j7]William J. Caelli, Anthony W. Rhodes, Nick C. Russell:
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. Comput. Secur. 11(5): 463-479 (1992) - [c3]Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:
Measuring the Strength of Ciphers. SEC 1992: 235-247 - [c2]William J. Caelli, Dennis Longley, Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296 - [e1]Guy G. Gable, William J. Caelli:
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992. IFIP Transactions A-15, North-Holland 1992, ISBN 0-444-89699-6 [contents] - 1991
- [j6]Helen A. Bergen, William J. Caelli:
File Security in Wordperfect 5.0. Cryptologia 15(1): 57-66 (1991) - 1990
- [j5]William J. Caelli, David Edmond, E. A. Knight, Alan B. Tickle:
Implications of the tax file number legislation for computer professionals. Aust. Comput. J. 22(1): 11-20 (1990) - [c1]Helen Gustafson, Ed Dawson, William J. Caelli:
Comparison of Block Ciphers. AUSCRYPT 1990: 208-220
1980 – 1989
- 1988
- [j4]William J. Caelli:
Electronic Funds Transfer Systems. Aust. Comput. J. 20(4): 168-169 (1988) - 1987
- [j3]William J. Caelli:
Guidelines for Privacy and Security in Computer Systems. Aust. Comput. J. 19(4): 203-205 (1987) - 1985
- [j2]William J. Caelli:
Privacy and security in Office Automation Systems. Aust. Comput. J. 17(3): 126-130 (1985)
1970 – 1979
- 1979
- [j1]William J. Caelli:
The CODASYL 1978 Data Base Proposals: An Overview and Discussion. Aust. Comput. J. 11(2): 48-59 (1979)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint