skip to main content
10.5555/1274531dlproceedingsBook PagePublication Pagesaus-cswConference Proceedingsconference-collections
ACSW '07: Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
2007 Proceeding
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
Ballarat Australia 30 January 2007- 2 February 2007
Published:
30 January 2007

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007)
Article
Free
Developing CIMA-based cyberinfrastructure for remote access to scientific instruments and collaborative e-research
pp 3–10

An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is being used to provide a scalable and extensible basis for the ...

Article
Free
A grid based e-research platform for clinical management in the human respiratory and vascular system
pp 11–17

A Grid based e-Research platform is being developed for providing a simulation-based virtual reality environment for clinical management and therapy treatment. The development of this platform involves cross-disciplinary experts aiming at combining the ...

Article
Free
Service oriented grid architecture for geosciences community
pp 19–23

Grid computing has many attributes that provide benefits to research communities. These include the ability to do existing research faster; enable collaborative environments; reduce costs and provide a pool of resources that creates an ability to ...

Article
Free
Securing grid data using mandatory access controls
pp 25–32

The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The ...

Article
Free
Communication network analysis of the enterprise grid systems
pp 33–40

This paper addresses the problem of performance analysis based on communication modelling of large-scale heterogeneous distributed systems with emphases on enterprise grid computing systems. The study of communication layers is important because the ...

Article
Free
DGRID: a DHT-based resource indexing and discovery scheme for computational grids
pp 41–48

Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are under different administrative authorities. In this paper, we propose DGRID, ...

Article
Free
Autonomic system management in mobile grid environments
pp 49–58

Mobile device integration in grid environments is a challenge for many researchers. Due to the transient nature of mobile devices, service management is a critical, but often overlooked area of research. We propose a distributed broker responsible for ...

Article
Free
The semantic reef: managing complex knowledge to predict coral bleaching on the great barrier reef
pp 59–67

A semantically driven Virtual Organisation (VO) model for predicting important events for coral reefs is presented - the Semantic Reef. The model is an application of a Semantic Grid that encapsulates services and resources to produce a complex higher-...

Article
Free
Storage and data management in EGEE
pp 69–77

Distributed management of data is one of the most important problems facing grids. Within the Enabling Grids for Enabling eScience (EGEE) project, currently the world's largest production grid, a sophisticated hierarchy of data management and storage ...

Article
Free
YourSRB: a cross platform interface for SRB and digital libraries
pp 79–85

Many large scale research programs with massive data requirements (e.g. the Particle Physics Data Grid, the Biomedical Informatics Research Network) use SRB to manage research data collections. Despite this broad adoption, the potential of SRB and Data ...

Article
Free
Security of statistical databases: overview and future directions
pp 115

A statistical database is a database in which the only queries allowed are of statistical type, and based on aggregate data. In particular, a statistical database is not supposed to give answers to queries pertaining to single individual records.

...

SESSION: Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007)
Article
Free
Spelling-error tolerant, order-independent pass-phrases via the damerau-levenshtein string-edit distance metric
pp 117–124

It is well understood that passwords must be very long and complex to have sufficient entropy for security purposes. Unfortunately, these passwords tend to be hard to memorize, and so alternatives are sought. Smart Cards, Biometrics, and Reverse Turing ...

Article
Free
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
pp 133–142

Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of networks and mobile devices but also because of novel location-based mobile ...

Article
Free
Usability and privacy in identity management architectures
pp 143–152

Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many ...

Article
Free
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
pp 153–157

The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper ...

Article
Free
A range test secure in the active adversary model
pp 159–162

In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficient than any previous solution to range test. However, their technique only ...

Article
Free
The motivation and proposition of a privacy-enhancing architecture for operational databases
pp 173–182

To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such approaches the perspective of the data subject is often obscured in ...

Article
Free
Design principles for low latency anonymous network systems secure against timing attacks
pp 183–191

Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model the adversary can only see part of the links in the system. In a recent ...

Article
Free
Controlling inference: avoiding p-level reduction during analysis
pp 193–200

This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to divulge information at any chosen privacy level (P-level), on any ...

Article
Free
Take heart II: a modular bayesian decision support system
pp 203

Bayesian networks are a powerful technology for decision support systems. They provide a flexible platform for modeling expert knowledge and benefit from a wide range of machine learning techniques for building models from data; we can also integrate ...

Article
Free
An interactive knowledge-based learning environment for transferring health knowledge
pp 207

This paper describes a narrative based interactive intelligent learning environment which aims to elucidate reasoning using interactive scenarios that may be used in training novices ICU nurses in the application of their knowledge and decision making. ...

SESSION: Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007)
Article
Free
Hospital management knowledge discovery using discrete event simulation
pp 209–218

This paper describes research into one of the key areas of knowledge in healthcare. That is, the knowledge base of hospital managers in relation to access, demand and resource management in hospitals. The latter are ongoing problems which impact on ...

Article
Free
An automated system for conversion of clinical notes into SNOMED clinical terminology
pp 219–226

The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. This system introduces a new method for automatically identifying medical ...

Article
Free
A data warehouse architecture for clinical data warehousing
pp 227–232

Data warehousing methodologies share a common set of tasks, including business requirements analysis, data design, architectural design, implementation and deployment. Clinical data warehouses are complex and time consuming to review a series of patient ...

Article
Free
Determining pattern element contribution in medical datasets
pp 233–240

Presented are two novel solutions addressing issues in the application of automated data analysis techniques in the medical domain. The primary aim of our work is to provide medical practitioners with patterns which can inform, and facilitate the ...

Article
Free
Extracting semantics in a clinical scenario
pp 241–247

Unlike abstracts, full articles of clinical case studies provide more detailed profiles of a patient, such as signs and symptoms, and important laboratory test results of the patient from the diagnostic and treatment procedures. This paper proposes a ...

Contributors
  • The University of Adelaide
  • Flinders University
  • University of South Australia
  • University of South Australia
  • The University of Adelaide

Recommendations

Acceptance Rates

Overall Acceptance Rate204of424submissions,48%
YearSubmittedAcceptedRate
ACSW '18964951%
ACSW '171567850%
ACSW '161727745%
Overall42420448%