ACSW Frontiers 2006:
Hobart,
Tasmania,
Australia
Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo (Eds.):
The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006.
CRPIT 54 Australian Computer Society 2006, ISBN 1-920-68236-8
- Laurent Lefèvre, Paul Roe:
Improving the flexibility of active grids through web services.
3-8
- A. B. M. Russel, Asad I. Khan:
Towards dynamic data grid framework for eResearch.
9-16
- Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go:
Toward building grid applications in bioinformatics.
17-23
- Kris Bubendorfer:
Improving resource utilisation in market oriented grid management and scheduling.
25-31
- Jia Tang, Minjie Zhang:
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing.
33-39
- Leili Mohammad Khanli, M. Analoui:
Grid-JQA: grid Java based quality of service management by active database.
41-45
- Baden Hughes:
Building computational grids with apple's Xgrid middleware.
47-54
- Avinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis:
A template based static coalition protocol: a3P viGrid.
55-62
- Kenneth A. Hawick, Heath A. James:
Simulating a computational grid with networked animat agents.
63-70
- Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
Redundant parallel data transfer schemes for the grid environment.
71-78
- Peter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn:
A simplified approach to web service development.
79-88
- Jacob Zimmermann, George M. Mohay:
Distributed intrusion detection in clusters based on non-interference.
89-95
- Jinjun Chen, Yun Yang:
Key research issues in grid workflow verification and validation.
97-104
- Rüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson:
EGEE: building a pan-European grid training organisation.
105-111
- Udaya Kiran Tupakula, Vijay Varadharajan:
Analysis of traceback techniques.
115-124
- Jason Smith, Juan Manuel González Nieto, Colin Boyd:
Modelling denial of service attacks on JFK with Meadows's cost-based framework.
125-134
- David Duncombe, George M. Mohay, Andrew Clark:
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
135-144
- Tamas Abraham:
Event sequence mining to develop profiles for computer forensic investigation purposes.
145-153
- Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering.
155-164
- Audun Jøsang, Dieter Gollmann, Richard Au:
A method for access authorisation through delegation networks.
165-174
- Michael Hilker, Christoph Schommer:
Description of bad-signatures for network intrusion detection.
175-182
- Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems.
183-192
- Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan:
Catching spam before it arrives: domain specific dynamic blacklists.
193-202
- Jason E. Holt:
Logcrypt: forward security and public verification for secure audit logs.
203-211
- Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices.
213-220
- Rupinder Gill, Jason Smith, Andrew Clark:
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
221-230
Copyright © Mon Mar 15 03:06:35 2010
by Michael Ley (ley@uni-trier.de)