ORCID Profile
0000-0001-6337-2264
Current Organisations
Queensland University of Technology
,
University of Oslo
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Stochastic Analysis And Modelling | Other Artificial Intelligence | Information Storage, Retrieval And Management | Artificial Intelligence and Image Processing | Plant developmental and reproductive biology | Electronic Commerce | Plant cell and molecular biology | Information Systems | Plant biology | Decision Support And Group Support Systems | Plant physiology | Global Information Systems
Information processing services | Technological and organisational innovation | Application tools and system utilities | Industry costs and structure |
Publisher: IEEE
Date: 08-2008
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: MDPI AG
Date: 08-2009
Publisher: Institution of Engineering and Technology (IET)
Date: 03-2013
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Elsevier BV
Date: 03-2007
Publisher: Elsevier BV
Date: 2005
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 12-2010
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 07-2012
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer US
Date: 2008
Publisher: Springer International Publishing
Date: 2015
Publisher: IEEE
Date: 10-2015
Publisher: Elsevier BV
Date: 09-1995
Publisher: ACM
Date: 17-10-2017
Publisher: Springer International Publishing
Date: 2015
Publisher: IEEE
Date: 07-2018
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 07-2018
Publisher: IEEE
Date: 12-2007
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Institution of Engineering and Technology (IET)
Date: 03-2014
Publisher: ACM
Date: 02-07-2018
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 07-2017
Publisher: ACM Press
Date: 1996
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer International Publishing
Date: 2014
Publisher: The Science and Information Organization
Date: 2018
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer International Publishing
Date: 2015
Publisher: IEEE
Date: 12-2010
DOI: 10.1109/EUC.2010.113
Publisher: Springer International Publishing
Date: 2017
Publisher: ACM
Date: 09-2014
Publisher: IEEE
Date: 07-2013
Publisher: Springer Science and Business Media LLC
Date: 23-03-2018
DOI: 10.1186/S13673-018-0130-0
Abstract: The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans and machines in all their aspects, including cognitive and memory models, but also social influence and (artificial) emotions. We call this wider discipline Behavioural Computer Science (BCS), and argue in this paper for why BCS models should unify (models of) the behaviour of humans and machines when designing information and communication technology systems. Thus, one main point to be addressed is the incorporation of empirical evidence for actual human behaviour, instead of making inferences about behaviour based on the rational agent model. Empirical studies can be one effective way to constantly update the behavioural models. We are motivated by the future advancements in artificial intelligence which will give machines capabilities that from many perspectives will be indistinguishable from those of humans. Such machine behaviour would be studied using BCS models, looking at questions about machine trust like “Can a self driving car trust its passengers?”, or artificial influence like “Can the user interface adapt to the user’s behaviour, and thus influence this behaviour?”. We provide a few directions for approaching BCS, focusing on modelling of human and machine behaviour, as well as their interaction.
Publisher: SAGE Publications
Date: 2010
DOI: 10.5772/7263
Abstract: Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity both are the human mental phenomenon and for this reason, there is no such thing as objective transitivity. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering the effects of base rate. In addition, it also proposes belief functions based on subjective logic to analyse trust transitivity of three specified cases with sensitive and insensitive based rate. Then it presents a quantitative analysis of the effects of unknown dependence problem in an interconnected network environment such Internet.
Publisher: Springer International Publishing
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11518655_69
Publisher: ACM
Date: 16-03-2018
Publisher: IEEE
Date: 09-2018
Publisher: IEEE
Date: 08-2018
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 2014
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2016
Publisher: Springer Berlin Heidelberg
Date: 2000
DOI: 10.1007/10718964_16
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer Berlin Heidelberg
Date: 1998
DOI: 10.1007/BFB0055873
Publisher: Wiley
Date: 28-05-2012
Publisher: Elsevier BV
Date: 10-2002
Publisher: IGI Global
Date: 2013
DOI: 10.4018/978-1-4666-4030-6.CH012
Abstract: A PKI can be described as a set of technologies, procedures, and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure, which is commonly known as a trust model. However, trust is primarily a semantic concept that cannot be expressed in syntactic terms alone. In order to define meaningful trust models for PKIs it is also necessary to consider the semantic assumptions and human cognition of trust relationships, as explicitly or implicitly expressed by certification policies, legal contractual agreements between participants in a PKI, and by how identity information is displayed and represented. Of the many different PKI trust models proposed in the literature, some have been implemented and are currently used in practical settings, from small personal networks to large-scale private and public networks such as the Internet. This chapter takes a closer look at the most prominent and widely used PKI trust models, and discusses related semantic issues.
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 08-2011
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: ACM
Date: 24-10-2016
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11755593_14
Publisher: Springer Science and Business Media LLC
Date: 12-05-2012
Publisher: IEEE
Date: 12-2008
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 2002
Publisher: IEEE Comput. Soc
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer International Publishing
Date: 2016
Publisher: Elsevier BV
Date: 03-2009
Publisher: Engineering and Technology Publishing
Date: 11-2010
Publisher: World Scientific Pub Co Pte Lt
Date: 06-2001
DOI: 10.1142/S0218488501000831
Abstract: We first describe a metric for uncertain probabilities called opinion, and subsequently a set of logical operators that can be used for logical reasoning with uncertain propositions. This framework which is called subjective logic uses elements from the Dempster-Shafer belief theory and we show that it is compatible with binary logic and probability calculus.
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 2003
Publisher: IEEE
Date: 12-2008
DOI: 10.1109/ISPA.2008.57
Publisher: IEEE
Date: 2003
Publisher: MDPI AG
Date: 08-2010
Publisher: IGI Global
Date: 2013
DOI: 10.4018/978-1-4666-4030-6.CH013
Abstract: Recognition of identities and certainty about identity ownership are crucial factors for secure communication in digital environments. Identity Management Systems have been designed to aid users as well as organisations to manage different user identities. However, traditional Identity Management Systems are primarily designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side to manage organisational identities. Public Key Infrastructures (PKI) is the primary tool in aiding users to manage such identities on their sides as well as to establish trust during online transactions. Nevertheless, the complexities and difficulties involved in managing and understanding such certificates from the general public’s point of view are overlooked. This causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed for managing organisational identities on the user side in order to improve the user friendliness and to strengthen security. This chapter provides an analysis of the Petname Model by describing its history and background, properties, application domains, and usability issues, and explains how a Petname System can be effectively combined with the PKI to recognise identities and impose certainty by validating the user trust on those identities. The chapter also presents an analysis on two applications that integrate the Public Key Infrastructure with the Petname Model.
Publisher: Elsevier BV
Date: 04-2010
Publisher: Springer International Publishing
Date: 2015
Publisher: Göttingen University Press
Date: 2011
DOI: 10.17875/GUP2011-287
Publisher: IEEE
Date: 2009
Publisher: IEEE
Date: 07-2017
Publisher: Springer International Publishing
Date: 2015
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.39
Publisher: Springer Science and Business Media LLC
Date: 2000
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: IEEE
Date: 09-2017
Publisher: Springer Nature Switzerland
Date: 2023
Publisher: Springer Berlin Heidelberg
Date: 1997
DOI: 10.1007/BFB0027928
Location: United Kingdom of Great Britain and Northern Ireland
Start Date: 2018
End Date: 2021
Funder: The Research Council of Norway
View Funded ActivityStart Date: 2015
End Date: 2020
Funder: The Research Council of Norway
View Funded ActivityStart Date: 2009
End Date: 2010
Funder: The Research Council of Norway
View Funded ActivityStart Date: 2023
End Date: 12-2025
Amount: $748,474.00
Funder: Australian Research Council
View Funded ActivityStart Date: 07-2007
End Date: 12-2013
Amount: $228,868.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2004
End Date: 12-2011
Amount: $1,600,000.00
Funder: Australian Research Council
View Funded Activity