ACSW Frontiers 2006:
Hobart,
Tasmania,
Australia
 Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo (Eds.):
The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006.
CRPIT 54 Australian Computer Society 2006, ISBN 1-920-68236-8  
  
  
  
  
 
- Laurent Lefèvre, Paul Roe:
 Improving the flexibility of active grids through web services.
3-8
             
- A. B. M. Russel, Asad I. Khan:
 Towards dynamic data grid framework for eResearch.
9-16
             
- Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go:
 Toward building grid applications in bioinformatics.
17-23
             
- Kris Bubendorfer:
 Improving resource utilisation in market oriented grid management and scheduling.
25-31
             
- Jia Tang, Minjie Zhang:
 An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing.
33-39
             
- Leili Mohammad Khanli, M. Analoui:
 Grid-JQA: grid Java based quality of service management by active database.
41-45
             
- Baden Hughes:
 Building computational grids with apple's Xgrid middleware.
47-54
             
- Avinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis:
 A template based static coalition protocol: a3P viGrid.
55-62
             
- Kenneth A. Hawick, Heath A. James:
 Simulating a computational grid with networked animat agents.
63-70
             
- Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
 Redundant parallel data transfer schemes for the grid environment.
71-78
             
- Peter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn:
 A simplified approach to web service development.
79-88
             
- Jacob Zimmermann, George M. Mohay:
 Distributed intrusion detection in clusters based on non-interference.
89-95
             
- Jinjun Chen, Yun Yang:
 Key research issues in grid workflow verification and validation.
97-104
             
- Rüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson:
 EGEE: building a pan-European grid training organisation.
105-111
             
- Udaya Kiran Tupakula, Vijay Varadharajan:
 Analysis of traceback techniques.
115-124
             
- Jason Smith, Juan Manuel González Nieto, Colin Boyd:
 Modelling denial of service attacks on JFK with Meadows's cost-based framework.
125-134
             
- David Duncombe, George M. Mohay, Andrew Clark:
 Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
135-144
             
- Tamas Abraham:
 Event sequence mining to develop profiles for computer forensic investigation purposes.
145-153
             
- Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
 Formal analysis of secure contracting protocol for e-tendering.
155-164
             
- Audun Jøsang, Dieter Gollmann, Richard Au:
 A method for access authorisation through delegation networks.
165-174
             
- Michael Hilker, Christoph Schommer:
 Description of bad-signatures for network intrusion detection.
175-182
             
- Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
 SKMA: a key management architecture for SCADA systems.
183-192
             
- Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan:
 Catching spam before it arrives: domain specific dynamic blacklists.
193-202
             
- Jason E. Holt:
 Logcrypt: forward security and public verification for secure audit logs.
203-211
             
- Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:
 Formal analysis of card-based payment systems in mobile devices.
213-220
             
- Rupinder Gill, Jason Smith, Andrew Clark:
 Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
221-230
             
Copyright © Mon Mar 15 03:06:35 2010
 by Michael Ley (ley@uni-trier.de)