Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter Clutterbuck is active.

Publication


Featured researches published by Peter Clutterbuck.


ieee region 10 conference | 2003

Increased availability and scalability for clustered services via the wait time calculation, trust based filtering and redirection of TCP connection requests

Peter Clutterbuck; George M. Mohay

The paper describes two new transport layer (TCP) options and an expanded transport layer queuing strategy that facilitate three functions that are fundamental to the dispatching-based clustered service. A transport layer option has been developed to facilitate. the use of client wait time data within the service request processing of the cluster. A second transport layer option has been developed to facilitate the redirection of service requests by the cluster dispatcher to the cluster processing member. An expanded transport layer service request queuing strategy facilitates the trust based filtering of incoming service requests so that a graceful degradation of service delivery may be achieved during periods of overload - most dramatically evidenced by distributed denial of service attacks against the clustered service. We describe how these new options and queues have been implemented and successfully tested within the transport layer of the Linux kernel.


computer and information technology | 2010

Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications

Peter Clutterbuck

Internet technologies continue to revolutionize the legitimate collection of information from targeted host machines and its transmission to remote servers. The term ‘spyware’ refers to that subset of information collection software that operates illicitly and non-consensually. Two fundamental issues continue to complicate spyware legislation development and operational control strategies. Firstly, unlike the clearly criminal distribution of virus infections, the distribution of spyware is mainly a commercial venture. Secondly, spyware utilizes the same technologies that underpin essential, legitimate information collection applications. This paper describes a security framework to manage these two issues. The security framework, at its core, requires the authentication by the host operating system of each outgoing Web session initiated by each software application running on that host machine. This authentication requires that each software application initiating Web communications be uniquely named via a Public Key Infrastructure digital certificate – and must use this name in all initiated Web communications. This framework facilitates the user-management of all Web communication streams emanating from the host – and this in turn supports the identification of software that engages in the deceptive, misleading, and fraudulent practices already proscribed in existing technology-focused legislation.


international conference on e science | 2005

Cluster scheduling and load balancing via TCP options

Peter Clutterbuck

This paper describes an experiment in designing, implementing and testing a transport layer cluster scheduling and dispatching architecture. The motivation for the experiment was the hypothesis that a transport layer clustering solution may offer advantages over the existing industry-standard network layer and data link layer approaches. The critical success factors initially established to guide and evaluate the experiment were reduced dispatcher work load, reduced dispatcher internal state memory requirements, distributed denial of service resilience, and cluster software design simplicity. The functional design stage of the experiment produced a Transport layer strategy for scheduling and load balancing based on the specification of two new TCP options. Implementation required the introduction of the newly specified TCP options into the Linux (2.4) kernel. The implementation produced an extended Linux Socket API to facilitate user-process access to the additional TCP capability. The testing stage of the experiment confirmed the operational efficiency of the solution


Electronic Journal of Information Systems Evaluation | 2009

A case study of SME web application development effectiveness via agile methods

Peter Clutterbuck; Owen Seamons; Terry Rowlands


Australasian Conference on Information Systems | 2001

Attitudes Towards Information Privacy

Sophie Cockcroft; Peter Clutterbuck


Electronic Journal of Information Systems Evaluation | 2007

Auditing the data confidentiality of wireless local area networks

Peter Clutterbuck; Terry Rowlands; Owen Seamons


World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering | 2015

Investigating Student Behavior in Adopting Online Formative Assessment Feedback

Peter Clutterbuck; Terry Rowlands; Owen Seamons


Proceedings of the 3rd European Conference On Information Management and Evaluation | 2009

A risk management investigation of SME adoption of agile method information system development

Peter Clutterbuck


international conference on internet computing | 2003

Internet Service Cluster Dispatching Via a TCP Redirection Option

Peter Clutterbuck; George M. Mohay


international conference on internet computing | 2002

Measuring distributed software server availability and response time via the socket API and TCP layers

Peter Clutterbuck; George M. Mohay

Collaboration


Dive into the Peter Clutterbuck's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jon Heales

University of Queensland

View shared research outputs
Top Co-Authors

Avatar

George M. Mohay

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Dongming Xu

University of Queensland

View shared research outputs
Top Co-Authors

Avatar

Fiona H. Rohde

University of Queensland

View shared research outputs
Top Co-Authors

Avatar

Murray Stubbs

University of Queensland

View shared research outputs
Researchain Logo
Decentralizing Knowledge