Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 21 - ACSW Frontiers 2003

Australasian Information Security Workshop (AISW) and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003

Australian Computer Science Communications, Vol. 25, No. 6

This volume contains the proceedings of the 2003 ACSW Workshops - Australasian Information Security Workshop (AISW) and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Chris Johnson, Paul Montague and Chris Steketee.

Published

January 2003.

ISBN-13

1-920682-00-7.

ISSN

1445-1336.

20 Papers, xiv+192 pages, softcover.

Order or Recommend this Volume.

BiBTeX file for Volume.

Complete Volume.

Click for larger view


Volume Citation

Johnson, C., Montague, P. and Steketee, C., Eds. (2003). ACSW Frontiers 2003. Proceedings of the First Australasian Information Security Workshop (AISW2003). CRPIT. 21. Adelaide, Australia, ACS.


Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing

Papers Included in the Volume

Amann, P. and Quirchmayr, G. (2003). Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 119-131. abstractpdfBibTeXEndNoteGS

Hawick, K.A. and James, H.A. (2003). Middleware for Context Sensitive Mobile Applications. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 133-141. abstractpdfBibTeXEndNoteGS

Indulska, J. and Sutton, P. (2003). Location Management in Pervasive Systems. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 143-151. abstractpdfBibTeXEndNoteGS

Mantoro, T. and Johnson, C.W. (2003). Location History in a Low-cost Context Awareness Environment. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 153-158. abstractpdfBibTeXEndNoteGS

Meyer, S. and Rakotonirainy, A. (2003). A Survey of Research on Context-Aware Homes. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 159-168. abstractpdfBibTeXEndNoteGS

Scholz, J., Grigg, M., Prekop, P. and Burnett, M. (2003). Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 169-176. abstractpdfBibTeXEndNoteGS

Simcock, T., Hillenbrand, S.P. and Thomas, B.H. (2003). Developing a Location Based Tourist Guide Application. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 177-183. abstractpdfBibTeXEndNoteGS

Taylor, K. and Palmer, D. (2003). Applying Enterprise Architectures and Technology to the Embedded Devices Domain. In Proc. Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing, Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 185-190. abstractpdfBibTeXEndNoteGS

Papers listed: 8


Fourth Australasian Information Security Workshop (AISW 2006)

Papers Included in the Volume

Cerone, A. (2003). Representing ASN.1 in Z. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 9-16. abstractpdfBibTeXEndNoteGS

Evered, M. (2003). Flexible Enterprise Access Control with Object-oriented View Specification. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 17-24. abstractpdfBibTeXEndNoteGS

Fung, P., Kwok, L.-f. and Longley, D. (2003). Electronic Information Security Documentation. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 25-31. abstractpdfBibTeXEndNoteGS

Hung, P.C.K. and Karlapalem, K. (2003). A Secure Workflow Model. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 33-41. abstractpdfBibTeXEndNoteGS

Josang, A. and Sanderud, G. (2003). Security in Mobile Communications: Challenges and Opportunities. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 43-48. abstractpdfBibTeXEndNoteGS

Liu, Q., Safavi-Naini, R. and Sheppard, N.P. (2003). Digital Rights Management for Content Distribution. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 49-58. abstractpdfBibTeXEndNoteGS

Long, B. (2003). Formalising Key-Distribution in the Presence of Trust using Object-Z. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 59-66. abstractpdfBibTeXEndNoteGS

McLean, P.G. (2003). A Secure Pervasive Environment. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 67-75. abstractpdfBibTeXEndNoteGS

Peng, K., Boyd, C., Dawson, E. and Viswanathan, K. (2003). Five Sealed-bid Auction Models. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 77-86. abstractpdfBibTeXEndNoteGS

Taylor, K. and Murty, J. (2003). Implementing Role Based Access Control for Federated Information Systems on the Web. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 87-95. abstractpdfBibTeXEndNoteGS

Tin, Y.S.T., Boyd, C. and Nieto, J.G. (2003). Provably Secure Key Exchange: an Engineering Approach. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 97-104. abstractpdfBibTeXEndNoteGS

Zhao, W., Vadaharajan, V. and Mu, Y. (2003). A Secure Mental Poker Protocol over the Internet. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds., ACS. 105-109. abstractpdfBibTeXEndNoteGS

Papers listed: 12

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 20 Mar 2007

Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 20 Mar 2007