ACSW Frontiers 2006: Hobart, Tasmania, Australia
Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo (Eds.): The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006. Australian Computer Society 2006 CRPIT 54 ISBN 1-920-68236-8

Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go: Toward building grid applications in bioinformatics. 17-23
Kris Bubendorfer: Improving resource utilisation in market oriented grid management and scheduling. 25-31
Jia Tang, Minjie Zhang: An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing. 33-39
Leili Mohammad Khanli, Morteza Analoui: Grid-JQA: grid Java based quality of service management by active database. 41-45
Baden Hughes: Building computational grids with apple's Xgrid middleware. 47-54
Avinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis: A template based static coalition protocol: a3P viGrid. 55-62
Kenneth A. Hawick, Heath A. James: Simulating a computational grid with networked animat agents. 63-70
Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi: Redundant parallel data transfer schemes for the grid environment. 71-78
Peter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn: A simplified approach to web service development. 79-88
Jacob Zimmermann, George M. Mohay: Distributed intrusion detection in clusters based on non-interference. 89-95
Rüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson: EGEE: building a pan-European grid training organisation. 105-111
Jason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. 125-134
David Duncombe, George M. Mohay, Andrew J. Clark: Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. 135-144
Tamas Abraham: Event sequence mining to develop profiles for computer forensic investigation purposes. 145-153
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo: Formal analysis of secure contracting protocol for e-tendering. 155-164
Audun Jøsang, Dieter Gollmann, Richard Au: A method for access authorisation through delegation networks. 165-174
Michael Hilker, Christoph Schommer: Description of bad-signatures for network intrusion detection. 175-182
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. 183-192
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan: Catching spam before it arrives: domain specific dynamic blacklists. 193-202
Jason E. Holt: Logcrypt: forward security and public verification for secure audit logs. 203-211
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho: Formal analysis of card-based payment systems in mobile devices. 213-220
Rupinder Gill, Jason Smith, Andrew J. Clark: Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. 221-230



