Avatar Image

Adjunct Associate Professor Jason Reid

Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Information Security


Adjunct Associate Professor Jason Reid
Adjunct Associate Professor
Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Information Security
Discipline *
Data Format, Computer Software
+61 7 3138 9571
View location details (QUT staff and student access only)

PhD (Queensland University of Technology), Master of Information Technology (Queensland University of Technology), Graduate Diploma in Information Technology (Queensland University of Technology)


Network security, trusted computing, access control, smart cards, information sharing, web services security, identity management

* Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008


  • Pham Q, Reid JF, McCullagh AJ, Dawson EP, (2009) On a taxonomy of delegation, Emerging challenges for security, privacy and trust : proceedings of the 24th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2009, Volume 297] p353-363
  • Pham Q, Reid JF, McCullagh AJ, Dawson EP, (2008) Commitment issues in delegation process, Proceedings of the Sixth Australasian Information Security Conference p27-38
  • Reid JF, Gonzalez Nieto JM, Tang TG, Senadji B, (2007) Detecting Relay Attacks with Timing-Based Protocols, Proceedings of the ACM Symposium on Information, Computer, and Communications Security p204-213
  • Reid JF, Corones SG, Dawson EP, McCullagh AJ, Foo E, (2007) High Assurance Communication Technologies Supporting Critical Infrastructure Protection Information Sharing Networks, Recent Advances in Security Technology 2007 p156-167
  • Fitzgerald BF, Reid JF, (2005) Digital Rights Management (DRM): Managing Digital Rights for Open Access, Handbook on the Knowledge Economy p268-278
  • Dawson EP, Gonzalez-Nieto JM, Reid J, (2004) Research Challenges and Directions in Protecting the Australian National Information Infrastructure, The Journal of the Australia Institute of Professional Intelligence Officers p17-35
  • Reid J, Caelli W, (2005) DRM, Trusted Computing and Operating System Architecture, ACSW Frontiers 2005: Proceedings of the 3rd Australasian Workshop on Grid Computing and e-Research and the 3rd Australasian Information Security Workshop [Conferences in Research and Practice in Information Technology, Volume 44] p127-136
  • Reid J, Clark A, Gonzalez-Nieto JM, Smith J, Viswanathan K, (2004) Denial of Service in Voice Over IP Networks, Proceedings of the First International Conference on E-Business and Telecommunication Networks. ICETE 2004. Volume 2. p230-237
  • Reid J, Gonzalez-Nieto JM, Dawson EP, Okamoto E, (2003) Privacy and Trusted Computing, Fourteenth International Workshop on Database and Expert Systems Applications p383-388
  • Reid J, Cheong IR, Henricksen M, Smith J, (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems, Information Security and Privacy - ACISP 2003 (LNCS 2727) p403-415