default search action
John Zic
Person information
- affiliation: University of New South Wales, Sydney, Australia
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j18]Jane Li, John Zic:
A Collaboratory for the Distributed Collaborations Within a Biosecurity Laboratory and Across Different Organizations. Int. J. Cooperative Inf. Syst. 28(2): 1950005:1-1950005:25 (2019) - 2016
- [c57]Jane Li, John Zic, Nerolie Oakes, Dongxi Liu, Chen Wang:
Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing. CDVE 2016: 185-193 - 2015
- [c56]John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen:
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations. ARES 2015: 642-651 - [c55]Dongxi Liu, John Zic:
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. TrustCom/BigDataSE/ISPA (1) 2015: 897-904 - 2014
- [j17]Li Li, John Zic:
Image Matching Algorithm based on Feature-point and DAISY Descriptor. J. Multim. 9(6): 829-834 (2014) - [c54]Danan Thilakanathan, Shiping Chen, Surya Nepal, Rafael A. Calvo, Dongxi Liu, John Zic:
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices. IEEE CLOUD 2014: 224-231 - [c53]Dongxi Liu, John Zic:
User-Controlled Identity Provisioning for Secure Account Sharing. IEEE CLOUD 2014: 644-651 - [c52]Shiping Chen, John Zic, Lingbo Jiang, Nerolie Oakes:
An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory. IEEE SCC 2014: 854-856 - [c51]John Zic:
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract). TRUST 2014: 208-209 - 2013
- [j16]Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Comput. Secur. 32: 36-55 (2013) - [j15]John Zic, Thomas Hardjono:
Towards a cloud-based integrity measurement service. J. Cloud Comput. 2: 4 (2013) - [c50]Dongxi Liu, Neale Leslie Fulton, John Zic, Martin de Groot:
Verifying an Aircraft Proximity Characterization Method in Coq. ICFEM 2013: 86-101 - [c49]Shiping Chen, Tomasz Bednarz, Piotr Szul, Dadong Wang, Yulia Arzhaeva, Neil Burdett, Alex Khassapov, John Zic, Surya Nepal, Tim Gurevey, John A. Taylor:
Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud. ICSOC Workshops 2013: 339-351 - 2012
- [j14]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A New Cloud Architecture of Virtual Trusted Platform Modules. IEICE Trans. Inf. Syst. 95-D(6): 1577-1589 (2012) - [j13]Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic:
Accountability services for verifying compliance in the cloud. Int. J. Cloud Comput. 1(2/3): 240-260 (2012) - [j12]John J. Zic, Martin de Groot, Dongxi Liu, Julian Jang, Chen Wang:
Hardware Security Device Facilitated Trusted Energy Services. Mob. Networks Appl. 17(4): 564-577 (2012) - 2011
- [j11]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011: 75 (2011) - [j10]Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic:
Strong Accountability for Service Compliance in the Cloud. Int. J. Next Gener. Comput. 2(2) (2011) - [j9]Hailun Tan, John Zic, Sanjay K. Jha, Diethelm Ostry:
Secure Multihop Network Programming with Multiple One-Way Key Chains. IEEE Trans. Mob. Comput. 10(1): 16-31 (2011) - [c48]Dongxi Liu, John Zic:
Cloud#: A Specification Language for Modeling Cloud. IEEE CLOUD 2011: 533-540 - [c47]Christian Müller-Tomfelde, Jane Li, John Zic, Alex Hyatt:
The BCP: An integrated communication and collaboration platform for biosecurity research and incident response workgroups. CollaborateCom 2011: 317-323 - [c46]Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic:
Modelling Collaborative Services for Business and QoS Compliance. ICWS 2011: 299-306 - 2010
- [j8]David Moreland, Surya Nepal, Hon Hwang, John Zic:
A snapshot of trusted personal devices applicable to transaction processing. Pers. Ubiquitous Comput. 14(4): 347-361 (2010) - [c45]Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic:
Accountability as a Service for the Cloud. IEEE SCC 2010: 81-88 - [c44]Jingyu Zhang, David Levy, Shiping Chen, John Zic:
mBOSSS+: A Mobile Web Services Framework. APSCC 2010: 91-96 - [c43]Jinhui Yao, Shiping Chen, Surya Nepal, David Levy, John Zic:
TrustStore: Making Amazon S3 Trustworthy with Services Composition. CCGRID 2010: 600-605 - [c42]John Zic, Julian Jang, Dongxi Liu, Chen Wang, Martin de Groot:
Hardware security device facilitated trusted residential energy services. CollaborateCom 2010: 1-6 - [c41]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A Cloud Architecture of Virtual Trusted Platform Modules. EUC 2010: 804-811 - [c40]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
Trusted Computing Platform in Your Pocket. EUC 2010: 812-817 - [c39]Dongxi Liu, John Zic:
A Framework for Delivering Rigorously Trusted Services. ICWS 2010: 648-651 - [c38]Julian Jang, Dongxi Liu, Surya Nepal, John Zic:
User Authentication for Online Applications Using a USB-Based Trust Device. MobiSec 2010: 15-26 - [c37]Dongxi Liu, John Zic:
Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust. OTM Conferences (1) 2010: 240-255 - [c36]Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic:
Accountability as a Service for the Cloud: From Concept to Implementation with BPEL. SERVICES 2010: 91-98
2000 – 2009
- 2009
- [j7]Shiping Chen, Surya Nepal, Jonathan Chan, David Moreland, John Zic:
A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context. Int. J. Ad Hoc Ubiquitous Comput. 4(2): 95-107 (2009) - [j6]Surya Nepal, John Zic, Thi Chau:
An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications. Int. J. Web Serv. Res. 6(2): 42-65 (2009) - [c35]Chen Wang, Shiping Chen, John Zic:
A Contract-Based Accountability Service Model. ICWS 2009: 639-646 - [c34]Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. WISEC 2009: 245-252 - 2008
- [c33]Julian Jang, Surya Nepal, John Zic:
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries. CIT 2008: 402-407 - [c32]Surya Nepal, John Zic:
A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations. IEEE SCC (2) 2008: 283-290 - [c31]Surya Nepal, John Zic, Shiping Chen:
WSLA+: Web Service Level Agreement Language for Collaborations. IEEE SCC (2) 2008: 485-488 - [c30]Shiping Chen, David Moreland, Surya Nepal, John Zic:
Yet Another Performance Testing Framework. Australian Software Engineering Conference 2008: 170-179 - [c29]Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen, Chen Wang, John Zic:
Secure and Conditional Resource Coordination for Successful Collaborations. CollaborateCom 2008: 287-303 - [c28]Surya Nepal, John Zic, Shiping Chen:
A Contract Language for Service-Oriented Dynamic Collaborations. CollaborateCom 2008: 545-562 - [c27]Shiping Chen, Surya Nepal, Chen Wang, John Zic:
Facilitating Dynamic Collaborations with eContract Services. ICWS 2008: 521-528 - [c26]Surya Nepal, John Zic, Shiping Chen:
WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations. ICWS 2008: 781-784 - [c25]Chen Wang, Surya Nepal, Shiping Chen, John Zic:
Cooperative Data Management Services Based on Accountable Contract. OTM Conferences (1) 2008: 301-318 - [c24]Ren Ping Liu, John Zic, Iain B. Collings, Alex Y. Dong, Sanjay Jha:
Efficient Reliable Data Collection in Wireless Sensor Networks. VTC Fall 2008: 1-5 - [c23]Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. WISEC 2008: 183-193 - 2007
- [j5]Surya Nepal, John Zic, Frederic Jaccard, Gregoire Kraehenbuehl:
A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems. Int. J. Heal. Inf. Syst. Informatics 2(1): 14-35 (2007) - [j4]Ren Ping Liu, Glynn Rogers, Sihui Zhou, John Zic:
Topology control with Hexagonal Tessellation. Int. J. Sens. Networks 2(1/2): 91-98 (2007) - [c22]Surya Nepal, Jonathan Chan, Shiping Chen, David Moreland, John Zic:
An Infrastructure Virtualisation SOA for VNO-based Business Models. IEEE SCC 2007: 44-51 - [c21]Zhanwen Li, David Levy, Shiping Chen, John Zic:
Explicitly Controlling the Fair Service for Busy Web Servers. ASWEC 2007: 159-168 - [c20]Shiping Chen, John Zic, Kezhe Tang, David Levy:
Performance Evaluation and Modeling of Web Services Security. ICWS 2007: 431-438 - [c19]Surya Nepal, John Zic, Hon Hwang, David Moreland:
Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems. OTM Conferences (1) 2007: 253-271 - [c18]Surya Nepal, John Zic, Julian Jang:
A Policy Based Approach to Managing Shared Data in Dynamic Collaborations. OTM Conferences (2) 2007: 1296-1303 - [c17]Surya Nepal, John Zic, Jonathan Chan:
A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration. PDCAT 2007: 82-86 - [c16]Surya Nepal, Julian Jang, John Zic:
Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations. PDCAT 2007: 219-226 - [c15]Kezhe Tang, David Levy, Shiping Chen, John Zic, Bo Yan:
A Performance Modelling of Web Services Security. WEBIST (1) 2007: 64-71 - [c14]Shiping Chen, Surya Nepal, Jonathan Chan, David Moreland, John Zic:
Virtual Storage Services for Dynamic Collaborations. WETICE 2007: 186-191 - [c13]Jonathan Chan, Surya Nepal, David Moreland, Hon Hwang, Shiping Chen, John Zic:
User-Controlled Collaborations in the Context of Trust Extended Environments. WETICE 2007: 389-394 - 2006
- [c12]Surya Nepal, John Zic, Thi Chau:
Compatibility of Service Contracts in Service-Oriented Ap. IEEE SCC 2006: 28-35 - [c11]Jenny Bhuiyan, Surya Nepal, John J. Zic:
Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications. ASWEC 2006: 80-89 - [c10]Surya Nepal, John Zic, Gregoire Kraehenbuehl, Frederic Jaccard:
Secure Sharing of Electronic Patient Records. ECEH 2006: 47-58 - [c9]Surya Nepal, John J. Zic, Frederic Jaccard, Gregoire Kraehenbuehl:
A Tag-Based Data Model for Privacy-Preserving Medical Applications. EDBT Workshops 2006: 433-444 - [c8]Kezhe Tang, Shiping Chen, David Levy, John Zic, Bo Yan:
A Performance Evaluation of Web Services Security. EDOC 2006: 67-74 - [c7]Shiping Chen, Bo Yan, John Zic, Ren Ping Liu, Alex Ng:
Evaluation and Modeling of Web Services Performance. ICWS 2006: 437-444 - [c6]Dean Kuo, Alan D. Fekete, Paul Greenfield, Surya Nepal, John Zic, Savas Parastatidis, Jim Webber:
Expressing and Reasoning about Service Contracts in Service-Oriented Computing. ICWS 2006: 915-918 - [c5]Zhanwen Li, David Levy, Shiping Chen, John Zic:
Auto-tune design and evaluation on staged event-driven architecture. MODDM 2006: 1-6 - [c4]Julian Jang, Surya Nepal, John Zic:
Establishing a Trust Relationship in Cooperative Information Systems. OTM Conferences (1) 2006: 426-443 - [c3]Jonathan Chan, Glynn Rogers, Darwin Agahari, David Moreland, John Zic:
Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets. WETICE 2006: 313-318 - 2004
- [j3]Christine Satchell, Supriya Singh, John Zic:
3G Multimedia Content Production as Social Communication. Australas. J. Inf. Syst. 11(2) (2004) - 2002
- [c2]J. Y. Lee, John J. Zic:
On Modelling Real-Time Mobile Processes. ACSC 2002: 139-147
1990 – 1999
- 1999
- [c1]John Zic:
Data spread: a novel authentication and security technique. ICON 1999: 335-339 - 1994
- [j2]John J. Zic:
Time-Constrained Buffer Specifications in CSP+T and Timed CSP. ACM Trans. Program. Lang. Syst. 16(6): 1661-1674 (1994)
1980 – 1989
- 1987
- [j1]John J. Zic:
Extensions to communicating sequential processes to allow protocol performance specification. Comput. Commun. Rev. 17(5): 217-227 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-13 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint