Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 251.

Add to Quick Collection   All 251 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1249582
Description: With the rapid developments occurring in cloud services, there has been a growing trend to use cloud for large-scale data storage. Due to the increasing popularity of cloud storage, many healthcare or ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1249588
Description: Modern computing platforms have progressed to deploying more secure software with various defensive techniques such as code signing and application whitelisting. However, the adversary, on the other h ... More
Reviewed: Reviewed
Date: 2003
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1099515
Description: 24 page(s)
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1235507
Description: Intrusion Detection System is one of the challenging research areas in Cloud Security. Security incidents such as Denial of service, scanning, malware code injection, virus, worm and password cracking ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146796
Description: Various governments have been considering mechanisms to filter out illegal or offensive Internet material. The accompanying debate raises a number of questions from a technical perspective. This artic ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/284614
Description: Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However attack techniques such as polymorphism and ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/275786
Description: We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving token on a group attribute/identity G, such that given P(G) it is hard to know the attributes in G. ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: botnet | network security | IPFIX | NetFlow
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048987
Description: The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common pr ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/336156
Description: In this paper, we propose a new advanced malware that distributes its features to multiple software components in order to bypass various security policies such as application whitelisting and securit ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18011
Description: In this paper, we propose an obligation-based model called fellowship to mitigate the flooding and packet drop attacks. We also explain how the fellowship model identifies and penalizes both the malic ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1240876
Description: Lightweight devices such as smart cards and RFID tags have a very limited hardware resource, which could be too weak to cope with asymmetric-key cryptography. It would be desirable if the cryptographi ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101610
Description: In a distributed environment, authorizations are usually physically stored in several computers connected by a network. Each computer may have its own local policies which could conflict with the othe ... More
Reviewed: Reviewed
Date: 2002
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/36094
Description: We present a model for policy administration structures. The model consists of a mathematical notation that captures the relationship between policies and objects and the entities that manage policies ... More
Date: 2002
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1101297
Description: 48 page(s)
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/304220
Description: In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, we study ... More
Reviewed: Reviewed