Calculated based on number of publications stored in Pure and citations from Scopus
1988 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2001

    KelpIO: A telescope-ready domain-specific I/O library for irregular block-structured applications

    Broom, B., Fowler, R. & Kennedy, K., 2001, Proceedings - 1st IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2001. p. 148-155 8 p. 923187. (Proceedings - 1st IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2001).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 1999

    An implementation of a secure version of NFS including RBAC

    Ashley, P., Broom, B. & Vandenwauver, M., 1999, Information Security and Privacy - 4th Australasian Conference, ACISP 1999, Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Springer Verlag, p. 213-227 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1998

    A uniform approach to securing unix applications using sesame

    Ashley, P., Vandenwanver, M. & Broom, B., 1998, Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings. Boyd, C. & Dawson, E. (eds.). Springer Verlag, p. 24-35 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1438).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations