Personal details
- Name
- Emeritus Professor Bill Caelli
- Position(s)
- Emeritus Professor
Science and Engineering Faculty,
School of Computer Science - Emeritus Professor
Administrative Services,
Human Resources Department,
HR Client Services - Discipline *
- Data Format
- w.caelli@qut.edu.au
- Location
- View location details (QUT staff and student access only)
- Identifiers and profiles
-
- Qualifications
-
PhD (Australian National University), BSc(Hons) (University of Newcastle)
- Keywords
-
Cryptography, Electronic commerce, IT & network security, IT development & computer security, Public policy & security/cryptography
* Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Biography
Research area: Information assurance.
This incorporates all aspects of the security management and control of computer and data network systems, with additional aspects of the reliable and trusted implementation of cryptography into these systems.
Other research interests include
- trusted systems and networks
- cryptography and its usage and integration
- risk assessment and management schemes
- security in an object oriented structure
- security in the banking-finance, healthcare and gaming sectors
- public policy matters in relation to information security and cryptology.
This information has been contributed by Emeritus Professor Bill Caelli.
Publications
- Smith L, Caelli B, McNair N, (2008) Information assurance education in a specialist defence environment, Proceedings from the Twelfth Colloquium for Information Systems Security Education p9-13
- Longley D, Branagan M, Caelli B, Kwok L, (2008) Feasibility of automated information security compliance auditing, Proceedings of the IFIP TC11 23rd International Information Security Conference [IFIP International Federation for Information Processing, Volume 278] p493-508
- Liu V, Caelli B, May L, Croll P, (2008) Open Trusted Health Informatics Structure (OTHIS), Proceedings of the Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008) p35-63
- Liu V, May L, Caelli B, Croll P, (2008) Strengthening legal compliance for privacy in electronic health information systems: A review and analysis, Electronic Journal of Health Informatics p1-14
- Cradduck L, McCullagh A, Caelli B, (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions, Forum on Public Policy: a journal of the Oxford Round Table p1-43
- Liu V, May L, Caelli W, Croll P, (2007) A Sustainable Approach to Security and Privacy in Health Information Systems, Proceedings of the 18th Australasian Conference on Information Systems p255-265
- Liu V, Caelli W, May L, Croll P, Henricksen M, (2007) Current Approaches to Secure Health Information Systems are NOT Sustainable: An Analysis, Presented at: 12th World Congress on Health (Medical) Informatics p1-3
- Croll P, Henricksen M, Caelli W, Liu V, (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records, Proceedings of the 12th World Congress on Health (Medical) Informatics p498-502
- Caelli W, (2007) Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM, New Approaches for Security, Privacy and Trust in Complex Environments : Proceedings of the IFIP TC-11 22nd International Information Security Conference [IFIP International Federation for Information Processing, Volume 232] p433-442
- Henricksen M, Caelli W, Croll P, (2007) Securing Grid Data Using Mandatory Access Controls, ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery p25-32
For more publications by this staff member, visit QUT ePrints, the University's research repository.
Supervision
Completed supervisions (Doctorate)
- Ehancing Security in Distributed Systems with Trusted Computing Hardware (2007)
- The Concept of Self-Defending Objects and the Development of Security Aware Applications (2006)
- Agent-Based One-Shot Authorisation Scheme in a Commercial Extranet Environment (2005)
- Distributed Information Systems Security through Extended Role Based Access Control (2003)
- The Globalisation of Regulation and its Impact on the Domain Name System: Domain Names and a New Regulatory Economy (2003)
- Design, Analysis and Implementation of Symmetric Block Ciphers (2002)
- Key Recovery Systems (2002)
- The Incorporation of Trust Strategies in Digital Signature Regimes (2002)