No abstract available.
Survivability and business continuity management
With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this situation will soon be a standard requirement. The intention of this paper ...
A framework for obfuscated interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead of obfuscating the program itself. The obfuscated interpretation enables us ...
A buddy model of security for mobile agent communities operating in pervasive scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses ...
Tamper-proofing software watermarks
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamper-proofing method is based on transforming numeric or non-numeric ...
Mesmerize: an open framework for enterprise security management
We have identified five problems that inhibit effective enterprise security management - policy divide, lack of reproducibility, lack of consistency, lack of coverage and lack of flexibility in current management systems. We discuss these problems and ...
Defining security services for electronic tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requirements for forming a complex electronic contract. This paper analyses the e-...
A case study in access control requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the ...
Belief-based risk analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and look-up tables to derive levels of risk, it uses subjective beliefs about threats and ...
Secure key issuing in ID-based cryptography
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users' private keys are known to the key generation center (KGC). Therefore secure key ...
On the security of some proxy blind signature schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy blind signature schemes based on DLP and ECDLP respectively. Later, ...
Application of self-organizing maps to clustering of high-frequency financial data
This paper analyzes the clustering of trades on the Australian Stock Exchange (ASX) with respect to the trade direction variable. The ASX is a limit order market operating an electronic limit order book. The order book consists of buy limit orders (bids) ...
Early assessment of classification performance
The ability to distinguish between objects is the fundamental to learning and intelligent behavior in general. The difference between two things is the information we seek; the processed information is actually the base for the knowledge. Automatic ...
Visualisation and comparison of image collections based on self-organised maps
Self-organised maps (SOM) have been widely used for cluster analysis and visualisation purposes in exploratory data mining. In image retrieval applications, SOMs have been used to visualise high-dimensional feature space and build indexing structures. In ...
Experiences in building a tool for navigating association rule result sets
Practical knowledge discovery is an iterative process. First, the experiences gained from one mining run are used to inform the parameter setting and the dataset and attribute selection for subsequent runs. Second, additional data, either incremental ...
Cost-efficient mining techniques for data streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing focus of applications that generate and receive data streams stimulates ...
Clustering stream data by regression analysis
In data clustering, many approaches have been proposed such as K-means method and hierarchical method. One of the problems is that the results depend heavily on initial values and criterion to combine clusters. In this investigation, we propose a new ...
A fuzzy ontology for medical document retrieval
Ontologies represent a method of formally expressing a shared understanding of information, and have been seen by many authors as a prerequisite for the "Semantic web". A mapping between query terms and members of an ontology is usually a key part of any ...
Monitoring and controlling of a multi-agent based workflow system
Business processes are often likely to undergo drastic changes and hence the workflow systems that model, simulate and enact these processes should support the monitoring and controlling of processes. In extension to our previous work on the framework ...
Applying online gradient descent search to genetic programming for object recognition
This paper describes an approach to the use of gradient descent search in genetic programming (GP) for object classification problems. In this approach, pixel statistics are used to form the feature terminals and a random generator produces numeric ...
A wavelet-based neuro-fuzzy system for data mining small image sets
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this assumption may not hold and would result in a classifier that exhibits ...
Detecting stress in spoken English using Decision Trees and Support Vector Machines
This paper describes an approach to the detection of stress in spoken New Zealand English. After identifying the vowel segments of the speech signal, the approach extracts two different sets of features - prosodic features and vowel quality features - ...
Learning dynamics of pesticide abuse through data mining
Recent studies by agriculture researchers in Pakistan have shown that attempts of crop yield maximization through pro-pesticide state policies have led to a dangerously high pesticide usage. These studies have reported a negative correlation between ...
Discovering parallel text from the World Wide Web
Parallel corpus is a rich linguistic resource for various multilingual text management tasks, including cross-lingual text retrieval, multilingual computational linguistics and multilingual text mining. Constructing a parallel corpus requires effective ...
A framework for privacy preserving classification in data mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets exposed to different parties. Consequently privacy issues are constantly under ...
Mining association rules from XML data using XQuery
In recent years XML has became very popular for representing semistructured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasingly important. Several encouraging attempts at developing methods for mining ...
A market-based rule learning system
In this paper, a 'market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market-based rule learning (MBRL) system is proposed and its capability of evolving ...
Language technology and software internationalisation
This talk explores how language technology might be used to support software internationalisation. We begin by defining what language technology -- the use of computational techniques to process and manipulate human language -- is in the large, and ...
Key challenges in software internationalisation
The trend toward globalisation of products and services has brought a strong economic imperative to the development of general methods for the localisation of software to different cultural environments. While ad hoc localisation may satisfy immediate ...
Software internationalisation in the Web services domain
The development of internationalisation-aware programming language support -- following on from the widespread adoption of the Unicode standard -- has meant that many of the localisation problems which have plagued developers have now been mitigated for ...
Index Terms
- Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32