default search action
Jason Reid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Brian A. Bittner, Jason Reid, Kevin C. Wolfe:
Floating-base manipulation on zero-perturbation manifolds. ICRA 2024: 18487-18493 - 2023
- [i1]Brian A. Bittner, Jason Reid, Kevin C. Wolfe:
Floating-base manipulation on zero-perturbation manifolds. CoRR abs/2307.02383 (2023) - 2022
- [j8]Alvin DMello, Dhammika Jayalath, Ernest Foo, Jason Reid:
Machine Learning to Optimize TCP Communications Over High Frequency Communications Links. IEEE Access 10: 125526-125537 (2022) - 2020
- [c21]Alvin DMello, Ernest Foo, Jason Reid, Dhammika Jayalath:
On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems. MilCIS 2020: 1-7
2010 – 2019
- 2018
- [j7]Khalid Alissa, Jason Reid, Ed Dawson:
SPCC: a security policy compliance checker plug-in for YAWL. Int. J. Bus. Process. Integr. Manag. 9(1): 22-31 (2018) - [j6]Nimalaprakasan Skandhakumar, Jason Reid, Farzad Salim, Ed Dawson:
A policy model for access control using building information models. Int. J. Crit. Infrastructure Prot. 23: 1-10 (2018) - [c20]Alvin DMello, Ernest Foo, Jason Reid:
Characterizing TCP/IP for High Frequency Communication Systems. MilCIS 2018: 1-7 - 2015
- [c19]Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. ACISP 2015: 307-325 - [c18]Christopher Assad, Michael T. Wolf, Jaakko T. Karras, Jason Reid, Adrian Stoica:
JPL BioSleeve for gesture-based control: Technology development and field trials. TePRA 2015: 1-6 - 2013
- [j5]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Budget-aware Role Based Access Control. Comput. Secur. 35: 37-50 (2013) - 2012
- [j4]Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim:
An Authorization Framework using Building Information Models. Comput. J. 55(10): 1244-1264 (2012) - [c17]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c16]Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson:
Physical Access Control Administration Using Building Information Models. CSS 2012: 236-250 - 2011
- [c15]Farzad Salim, Jason Reid, Ed Dawson, Uwe Dulleck:
An Approach to Access Control under Uncertainty. ARES 2011: 1-8 - [c14]Farzad Salim, Uwe Dulleck, Jason Reid, Ed Dawson:
Optimal Budget Allocation in Budget-based Access Control. ARES 2011: 591-596 - [c13]Quan Pham, Jason Reid, Ed Dawson:
A Model for Constraint and Delegation Management. ISPEC 2011: 362-371 - 2010
- [j3]Mark Burdon, Jason Reid, Rouhshi Low:
Encryption safe harbours and data breach notification laws. Comput. Law Secur. Rev. 26(5): 520-534 (2010) - [j2]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a taxonomy of delegation. Comput. Secur. 29(5): 565-579 (2010) - [j1]Farzad Salim, Jason Reid, Ed Dawson:
Authorization models for secure information sharing: a survey and research agenda. ISC Int. J. Inf. Secur. 2(2): 69-87 (2010) - [c12]Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon:
Information Sharing in the 21st century: Progress and Challenges. AISC 2010: 2 - [c11]Farzad Salim, Jason Reid, Ed Dawson:
An Administrative Model for UCON ABC. AISC 2010: 32-38 - [c10]Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Towards a Game Theoretic Authorisation Model. GameSec 2010: 208-219 - [c9]Mark Burdon, Rouhshi Low, Jason Reid:
If it's encrypted its secure! The viability of US state-based encryption exemptions. ISTAS 2010: 96-102
2000 – 2009
- 2009
- [c8]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a Taxonomy of Delegation. SEC 2009: 353-363 - 2008
- [c7]Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
Commitment Issues in Delegation Process. AISC 2008: 27-38 - 2007
- [c6]Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji:
Detecting relay attacks with timing-based protocols. AsiaCCS 2007: 204-213 - 2005
- [c5]Jason Reid, William J. Caelli:
DRM, Trusted Computing and Operating System Architecture. ACSW 2005: 127-136 - 2004
- [c4]Jason Reid, Andrew J. Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan:
Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237 - 2003
- [c3]Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith:
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. ACISP 2003: 403-415 - 2000
- [c2]Jason Reid, Mark Looi:
Making Sense of Smart Card Security Certifications. CARDIS 2000: 225-240 - [c1]Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. ISW 2000: 149-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 01:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint