eResearch

You are here

Security

This research relates to the need to work with documents, datasets, simulations, software and dynamic knowledge representations in a secure way with controlled access. It focuses on using IT security mechanisms such as encryption, authentication and digital signatures for rights management and to ensure that data is both stored and transferred across the network securely.

Related Publications

R. Schroeter, J. Hunter, J. Guerin, I. Khan and M. Henderson. "A Synchronous Multimedia Annotation System for Secure Collaboratories" 2nd IEEE International Conference on E-Science and Grid Computing (eScience 2006). Amsterdam, Netherlands. December 2006 (accepted, to be published).

I. Khan, R. Schroeter and J. Hunter. "Implementing a Secure Annotation Service", (to appear) International Provenance and Annotation Workshop, Chicago, USA. 3 - 5 May 2006. pp 212-221. doi:10.1007/11890850_22

J. Hunter, B. Koopman, and J. Sledge. "Software Tools for Indigenous Knowledge Management" Museums and the Web 2003. Charlotte. March 2003. (Alternative location).

Related Projects