Emeritus Professor
Bill Caelli
Faculty of Science,
School of Computer Science
Biography
Research area: Information assurance.This incorporates all aspects of the security management and control of computer and data network systems, with additional aspects of the reliable and trusted implementation of cryptography into these systems.
Other research interests include
trusted systems and networks
cryptography and its usage and integration
risk assessment and management schemes
security in an object oriented structure
security in the banking-finance, healthcare and gaming sectors
public policy matters in relation to information security and cryptology.
Personal details
Positions
- Emeritus Professor
Faculty of Science,
School of Computer Science
Keywords
Cryptography, Electronic commerce, IT & network security, IT development & computer security, Public policy & security/cryptography
Research field
Data Format
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- PhD (Australian National University)
- BSc(Hons) (University of Newcastle)
Publications
- Smith, L., Caelli, B. & McNair, N. (2008). Information assurance education in a specialist defence environment. Proceedings from the Twelfth Colloquium for Information Systems Security Education, 9–13. https://eprints.qut.edu.au/30513
- Longley, D., Branagan, M., Caelli, B. & Kwok, L. (2008). Feasibility of automated information security compliance auditing. Proceedings of the IFIP TC11 23rd International Information Security Conference [IFIP International Federation for Information Processing, Volume 278], 493–508. https://eprints.qut.edu.au/30621
- Liu, V., Caelli, B., May, L. & Croll, P. (2008). Open Trusted Health Informatics Structure (OTHIS). Proceedings of the Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 35–63. https://eprints.qut.edu.au/13128
- Liu, V., May, L., Caelli, B. & Croll, P. (2008). Strengthening legal compliance for privacy in electronic health information systems: A review and analysis. Electronic Journal of Health Informatics, 3(1), 1–14. https://eprints.qut.edu.au/13586
- Cradduck, L., McCullagh, A. & Caelli, B. (2008). Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy: a journal of the Oxford Round Table, 1–43. https://eprints.qut.edu.au/30740
- Liu, V., May, L., Caelli, W. & Croll, P. (2007). A Sustainable Approach to Security and Privacy in Health Information Systems. Proceedings of the 18th Australasian Conference on Information Systems, 255–265. https://eprints.qut.edu.au/11192
- Liu, V., Caelli, W., May, L., Croll, P. & Henricksen, M. (2007). Current Approaches to Secure Health Information Systems are NOT Sustainable: An Analysis. Presented at: 12th World Congress on Health (Medical) Informatics, 1–3. https://eprints.qut.edu.au/11191
- Croll, P., Henricksen, M., Caelli, W. & Liu, V. (2007). Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. Proceedings of the 12th World Congress on Health (Medical) Informatics, 498–502. https://eprints.qut.edu.au/15727
- Caelli, W., (2007). Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. New Approaches for Security, Privacy and Trust in Complex Environments : Proceedings of the IFIP TC-11 22nd International Information Security Conference [IFIP International Federation for Information Processing, Volume 232], 433–442.
- Henricksen, M., Caelli, W. & Croll, P. (2007). Securing Grid Data Using Mandatory Access Controls. ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery, 25–32. https://eprints.qut.edu.au/10894
QUT ePrints
For more publications by Bill, explore their research in QUT ePrints (our digital repository).
Supervision
Completed supervisions (Doctorate)
- Enhancing security in distributed systems with trusted computing hardware (2007)
- The Concept of Self-Defending Objects and the Development of Security Aware Applications (2006)
- Agent-Based One-Shot Authorisation Scheme in a Commercial Extranet Environment (2005)
- Distributed Information Systems Security through Extended Role Based Access Control (2003)
- The Globalisation of Regulation and its Impact on the Domain Name System: Domain Names and a New Regulatory Economy (2003)
- Design, Analysis and Implementation of Symmetric Block Ciphers (2002)
- Key Recovery Systems (2002)
- The Incorporation of Trust Strategies in Digital Signature Regimes (2002)