Adjunct Associate Professor
Jason Reid
This person does not currently hold a position at QUT.
Personal details
Keywords
Network security, trusted computing, access control, smart cards, information sharing, web services security, identity management
Research field
Data Format, Computer Software
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- PhD (Queensland University of Technology)
- Master of Information Technology (Queensland University of Technology)
- Graduate Diploma in Information Technology (Queensland University of Technology)
Publications
- Pham, Q., Reid, J., McCullagh, A. & Dawson, E. (2009). On a taxonomy of delegation. Emerging challenges for security, privacy and trust : proceedings of the 24th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2009, Volume 297], 353–363. https://eprints.qut.edu.au/39770
- Pham, Q., Reid, J., McCullagh, A. & Dawson, E. (2008). Commitment issues in delegation process. Proceedings of the Sixth Australasian Information Security Conference, 27–38. https://eprints.qut.edu.au/39773
- Reid, J., Gonzalez Nieto, J., Tang, T. & Senadji, B. (2007). Detecting Relay Attacks with Timing-Based Protocols. Proceedings of the ACM Symposium on Information, Computer, and Communications Security, 204–213. https://eprints.qut.edu.au/3264
- Reid, J., Corones, S., Dawson, E., McCullagh, A. & Foo, E. (2007). High Assurance Communication Technologies Supporting Critical Infrastructure Protection Information Sharing Networks. Recent Advances in Security Technology 2007, 156–167.
- Fitzgerald, B. & Reid, J. (2005). Digital Rights Management (DRM): Managing Digital Rights for Open Access. In G. Hearn, A. Ninan & D. Rooney (Eds.), Handbook on the Knowledge Economy (pp. 268–278). Edward Elgar Publishing. https://eprints.qut.edu.au/1544
- Dawson, E., Gonzalez-Nieto, J. & Reid, J. (2004). Research Challenges and Directions in Protecting the Australian National Information Infrastructure. Journal of the Australian Institute of Professional Intelligence Officers, 13(2), 17–35.
- Reid, J. & Caelli, W. (2005). DRM, Trusted Computing and Operating System Architecture. ACSW Frontiers 2005: Proceedings of the 3rd Australasian Workshop on Grid Computing and e-Research and the 3rd Australasian Information Security Workshop [Conferences in Research and Practice in Information Technology, Volume 44], 127–136. https://eprints.qut.edu.au/515
- Reid, J., Clark, A., Gonzalez-Nieto, J., Smith, J. & Viswanathan, K. (2004). Denial of Service in Voice Over IP Networks. Proceedings of the First International Conference on E-Business and Telecommunication Networks. ICETE 2004. Volume 2., 230–237. https://eprints.qut.edu.au/419
- Reid, J., Gonzalez-Nieto, J., Dawson, E. & Okamoto, E. (2003). Privacy and Trusted Computing. Fourteenth International Workshop on Database and Expert Systems Applications, 383–388. https://eprints.qut.edu.au/345
- Reid, J., Cheong, I., Henricksen, M. & Smith, J. (2003). A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. Information Security and Privacy - ACISP 2003 (LNCS 2727), 403–415. https://eprints.qut.edu.au/343
QUT ePrints
For more publications by Jason, explore their research in QUT ePrints (our digital repository).