The 'Whats New' segment of this site indexes recent publications, classified
under:
Where appropriate, papers appear under two or more classifications.
This document contains the archives for 2009, under the same headings:
Archives are also available for 2008, 2007, 2006,
2005, 2004, 2003,
2002, 2001, 2000, 1999,
1998, 1997, 1996
and 1995.
Electronic Commerce - 2009
- Dancing with Wolves: How to Negotiate for
a Fair Deal for Academic Authors (December)
- User Requirements for Cloud
Computing Architecture (draft conference paper, December)
- Computing Clouds on the Horizon?
Benefits and Risks from the User's Perspective (draft conference
paper, November)
- Lessons from a
Sufficiently Rich Model
of (Id)entity, Authentication and Authorisation (Uni Toronto,
October)
- The Shopping Cart Model (September,
much-upgraded version)
- Course Materials on eTrading
(September, for
a final-semester ANU CompSci unit)
- Categories of Malware (September, plus
slides)
- A Taxonomy of Electronic
Markets (September,
very early draft)
- Consumer Acceptance of Potentially Intrusive
Identity Authentication Mechanisms (June, at Bled, plus slide-set)
- A Sufficiently Rich Model of
(Id)entity, Authentication
and Authorisation (Version for presentation at LSE, May, plus
slides)
- Glossary for 'A Sufficiently
Rich Model of (Id)entity, Authentication
and Authorisation' (May)
- Government Service Delivery:
Near-Future Realities
in a High-Bandwidth World (May)
- Open Access to Journal Content as a
Case Study
in Unlocking IP (March-April)
- A Sufficiently Rich Model of
(Id)entity, Authentication
and Authorisation (February)
- An eCommerce Perspective on Carbon
Trading (February,
Review Draft, and slide-set)
Go back to the 2008 entries
Information Infrastructure - 2009
- The National Broadband Network (NBN):
Privacy Considerations (December)
- Dancing with Wolves: How to Negotiate for
a Fair Deal for Academic Authors (December)
- At the 'Broadband Future' Event in Sydney – Early
Impressions, and Thoughts on
Public Policy Aspects
(10-11 December)
- User Requirements for Cloud
Computing Architecture
(draft conference paper, December)
- Computing Clouds on the Horizon? Benefits and
Risks from the User's Perspective (draft conference paper,
November)
- Lessons from a Sufficiently
Rich Model
of (Id)entity, Authentication and Authorisation (Uni Toronto,
October)
- The Shopping Cart Model
(September, much-upgraded
version)
- Categories of Malware (September, plus
slides)
- Consumer Acceptance of
Potentially Intrusive
Identity Authentication Mechanisms (June, at Bled, plus slide-set)
- A Sufficiently Rich Model of (Id)entity,
Authentication and Authorisation (Version for presentation at LSE, May,
plus slides)
- Glossary for 'A Sufficiently
Rich Model
of (Id)entity, Authentication and Authorisation' (May)
- Government Service Delivery:
Near-Future Realities
in a High-Bandwidth World (May)
- Open Access to Journal Content as a
Case Study
in Unlocking IP (March-April Draft)
- A Sufficiently Rich Model of
(Id)entity, Authentication
and Authorisation (February)
Go back to the 2008 entries
Identity - 2009
- Lessons from a
Sufficiently Rich Model
of (Id)entity, Authentication and Authorisation (Uni Toronto,
October)
- Consumer Acceptance of Potentially Intrusive
Identity Authentication Mechanisms (June, at Bled, plus slide-set)
- A Sufficiently Rich Model of (Id)entity,
Authentication and Authorisation (Version for presentation at LSE,
May, plus slides)
- Glossary for 'A Sufficiently
Rich Model
of (Id)entity, Authentication and Authorisation' (May)
- A Sufficiently Rich Model of
(Id)entity, Authentication
and Authorisation (February)
- Dissidentity (February,
revised version)
Go back to the 2008 entries
Data Surveillance and Information Privacy - 2009
- The National Broadband Network (NBN):
Privacy Considerations (December)
- The Realities of Bowen's 'Service
Delivery Reform'
(December)
- Australian Privacy Medal
Acceptance Speech
(12 November, Sydney; and Nomination
Form)
- Surveillance in Speculative Fiction: Have Our
Artists Been Sufficiently Imaginative? (Toronto and
Cambridge, October)
- Lessons from a Sufficiently
Rich Model
of (Id)entity, Authentication and Authorisation (Uni Toronto,
October)
- Policy
Statement
re Visual Surveillance (October, for the Australian Privacy
Foundation)
- Policy
Statement re eHealth Data and Health Identifiers (August, for
the Australian
Privacy Foundation)
- Consumer Acceptance of Potentially Intrusive
Identity Authentication Mechanisms (June, at Bled, plus slide-set)
- A Sufficiently Rich Model of (Id)entity,
Authentication and Authorisation (Version for presentation at LSE, May,
plus slides)
- Glossary for 'A Sufficiently
Rich Model
of (Id)entity, Authentication and Authorisation' (May)
- Why It's Time for Guidelines on
'Privacy and the
Media' (May)
- Policy
Statement
re Privacy and the Media (for the Australian Privacy
Foundation, March)
- The Covert Implementation of Mass
Vehicle Surveillance
in Australia (March, plus slide-set)
- A Sufficiently Rich Model of
(Id)entity, Authentication
and Authorisation (February)
- Dissidentity (February,
revised version)
Go back to the 2008 entries
Other Areas - 2009
Go back to the 2008 entries
Created: 11 May 1997 -
Last Amended: 7 December 2010
by Roger Clarke
- Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/WhatsNew09.html
Mail to Webmaster -
© Xamax Consultancy Pty Ltd, 1995-2022 -
Privacy Policy