Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vicky Liu is active.

Publication


Featured researches published by Vicky Liu.


international conference on trust management | 2015

An Architecture for Trustworthy Open Data Services

Andy Wong; Vicky Liu; William J. Caelli; Tony Sahama

This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised; it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.


International Journal of E-health and Medical Communications | 2013

Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems

Vicky Liu; William J. Caelli; Yu-Nien Maggie Chen

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.


Science & Engineering Faculty | 2015

Delay Tolerant Routing Protocols for Energy-Neutral Animal Tracking

Mahzad Kaviani; Branislav Kusy; Raja Jurdak; Neil W. Bergmann; Kun Zhao; Vicky Liu

This paper investigates communication protocols for relaying sensor data from animal tracking applications back to base stations. While Delay Tolerant Networks (DTNs) are well suited to such challenging environments, most existing protocols do not consider the available energy that is particularly important when tracking devices can harvest energy. This limits both the network lifetime and delivery probability in energy-constrained applications to the point when routing performance becomes worse than using no routing at all. Our work shows that substantial improvement in data yields can be achieved through simple yet efficient energy-aware strategies. Conceptually, there is need for balancing the energy spent on sensing, data mulling, and delivery of direct packets to destination. We use empirical traces collected in a flying fox (fruit bat) tracking project and show that simple threshold-based energy-aware strategies yield up to 20% higher delivery rates. Furthermore, these results generalize well for a wide range of operating conditions.


international conference on e health networking application services | 2015

Network security metrics and performance for healthcare systems management

Vicky Liu; Aklilu Daniel Tesfamicael; William J. Caelli; Tony Sahama

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security metrics and performance of those cryptographic functions in their embedded context needs to be understood in detail. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to evaluate security performance. This research simulates sensitive healthcare information being transferred over a network, and then measures data delivery times with selected security parameters for various communication types running under different operating systems. Based on our performance experiments, this research has indicated a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes distinct recommendations based on our test results to contribute to selecting the appropriate security metrics for achieving the correct balance between network security and performance.


international conference on computational intelligence and communication networks | 2015

Performance Analysis of Secure Unified Communications in the VMware-Based Cloud

Aklilu Daniel Tesfamicael; Vicky Liu; William J. Caelli

Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.


International Journal of Information Security and Privacy | 2012

Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs

Pei Yuan Shen; Maolin Tang; Vicky Liu; William J. Caelli

Current research in secure messaging for Vehicular Ad hoc Networks VANETs focuses on employing a digital certificate-based Public Key Cryptosystem PKC to support security. However, the security overhead of such a scheme creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared with a certificate-based PKC by employing a number of quantified analyses and simulations. In this paper, the authors demonstrate that the proposal can maintain security and assert that it can improve overall performance and scalability at a lower cost, compared with certificate-based PKC. The proposed scheme adds a new dimension to key management and verification services for VANETs.


computational intelligence | 2015

Design and Implementation of Unified Communications as a Service Based on the Open Stack Cloud Environment

Aklilu Daniel Tesfamicael; Vicky Liu; William J. Caelli

Cloud Computing, based on early virtual computer concepts and technologies, is now itself a maturing technology in the marketplace and it has revolutionized the IT industry, being the powerful platform that many businesses are choosing to migrate their in-premises IT services onto. Cloud solution has the potential to reduce the capital and operational expenses associated with deploying IT services on their own. In this study, we have implemented our own private cloud solution, infrastructure as a service (IaaS), using the Open Stack platform with high availability and a dynamic resource allocation mechanism. Besides, we have hosted unified communication as a service (UCaaS) in the underlying IaaS and successfully tested voice over IP (VoIP), video conferencing, voice mail and instant messaging (IM) with clients located at the remote site. The proposed solution has been developed in order to give advice to bussinesses that want to build their own cloud environment, IaaS and host cloud services and applicatons in the cloud. This paper also aims at providing an alternate option for proprietary cloud solutions for service providers to consider.


Science & Engineering Faculty | 2009

Background to the Development of a Curriculum for the History of “Cyber” and “Communications” Security

William J. Caelli; Vicky Liu; Dennis Longley

For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.


Faculty of Science and Technology; Information Security Institute | 2010

A secure architecture for Australia’s index based e-health environment

Vicky Liu; William J. Caelli; Jason Smith; Lauren May; Min Hui Lee; Zi Hao Ng; Jin Hong Foo; Weihao Li


pacific asia conference on information systems | 2011

An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks.

Pei Yuan Shen; Vicky Liu; Maolin Tang; William J. Caelli

Collaboration


Dive into the Vicky Liu's collaboration.

Top Co-Authors

Avatar

William J. Caelli

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lauren May

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Aklilu Daniel Tesfamicael

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Peter R. Croll

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Tony Sahama

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ernest Foo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Maolin Tang

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pei Yuan Shen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andy Wong

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge