|
| | | |
Volume 54 - ACSW Frontiers 2006Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, 16-19 January 2006Australian Computer Science Communications, Vol. 28, No. 7This volume contains the proceedings of the 2006 ACSW Workshops - Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, 16-19 January 2006. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.
Volume CitationBuyya, R., Ma, T., Safavi-Naini, R., Steketee, C. and Susilo, W., Eds. (2006). ACSW Frontiers 2006. Proceedings of the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006) and the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006). CRPIT. 54. Hobart, Australia, ACS.
Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006)
Papers Included in the VolumeBerlich, R., Hardt, M., Kunze, M., Atkinson, M. and Fergusson, D. (2006). EGEE: Building a Pan-European Grid Training Organisation. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 105-111. |     
| Bhuvaneswaran, R.S., Katayama, Y. and Takahashi, N. (2006). Redundant Parallel Data Transfer Schemes for the Grid Environment. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 71-78. |     
| Bubendorfer, K. (2006). Improving Resource Utilisation in Market Oriented Grid Management and Scheduling. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 25-31. |     
| Chen, J. and Yang, Y. (2006). Key Research Issues in Grid Workflow Verification and Validation. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 97-104. |     
| Gong, X., Nakamura, K., Yura, K. and Go, N. (2006). Toward Building Grid Applications in Bioinformatics. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 17-23. |     
| Hawick, K.A. and James, H.A. (2006). Simulating a Computational Grid with Networked Animat Agents. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 63-70. |     
| Hughes, B. (2006). Building Computational Grids with Apple's Xgrid Middleware. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 47-54. |     
| Kelly, P.M., Coddington, P.D. and Wendelborn, A.L. (2006). A Simplified Approach to Web Service Development. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 79-88. |     
| Khanli, L.M. and Analoui, M. (2006). Grid-JQA : Grid Java based Quality of service management by Active database. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 41-45. |     
| Lefevre, L. and Roe, P. (2006). Improving the Flexibility of Active Grids through Web Services. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 3-8. |     
| Russel, A.B.M. and Khan, A.I. (2006). Towards Dynamic Data Grid Framework for eResearch. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 9-16. |     
| Shankaranarayanan, A., Dehne, F. and Lewis, A. (2006). A Template Based Static Coalition Protocol - A3PviGrid. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 55-62. |     
| Tang, J. and Zhang, M. (2006). An Agent-based Peer-to-Peer Grid Computing Architecture - Convergence of Grid and Peer-to-Peer Computing. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 33-39. |     
| Zimmermann, J. and Mohay, G. (2006). Distributed intrusion detection in clusters based on non-interference. In Proc. Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia. CRPIT, 54. Buyya, R. and Ma, T., Eds., ACS. 89-95. |     
|
Papers listed: 14
Fourth Australasian Information Security Workshop (AISW 2006)
Papers Included in the VolumeAbraham, T. (2006). Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 145-153. |     
| Cook, D., Hartnett, J., Manderson, K. and Scanlan, J. (2006). Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 193-202. |     
| Dawson, R., Boyd, C., Dawson, E. and Gonzalez-Nieto, J.M. (2006). SKMA - A Key Management Architecture for SCADA Systems. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 183-192. |     
| Du, R., Foo, E., Boyd, C. and Choo, K.-K.R. (2006). Formal Analysis of Secure Contracting Protocol for E-Tendering. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 155-164. |     
| Duncombe, D., Mohay, G. and Clark, A. (2006). Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 135-144. |     
| Gill, R., Smith, J. and Clark, A. (2006). Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 221-230. |     
| Hilker, M. and Schommer, C. (2006). Description of Bad-Signatures for Network Intrusion Detection. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 175-182. |     
| Holt, J.E. (2006). Logcrypt: Forward Security and Public Verification for Secure Audit Logs. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 203-211. |     
| Josang, A., Gollmann, D. and Au, R. (2006). A Method for Access Authorisation Through Delegation Networks. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 165-174. |     
| Pasupathinathan, V., Pieprzyk, J., Wang, H. and Cho, J.Y. (2006). Formal Analysis of Card-based Payment Systems in Mobile devices. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 213-220. |     
| Smith, J., Gonzalez-Nieto, J.M. and Boyd, C. (2006). Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 125-134. |     
| Tupakula, U.K. and Varadharajan, V. (2006). Analysis of Traceback Techniques. In Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, 54. Safavi-Naini, R., Steketee, C. and Susilo, W., Eds., ACS. 115-124. |     
|
Papers listed: 12
|