mark perry
mark perry
University of New England, Australia (formerly at UWO, Canada, and University of Auckland, NZ)
Verified email at une.edu.au - Homepage
Title
Cited by
Cited by
Year
Online trust: Definition and principles
ZM Aljazzaf, M Perry, MAM Capretz
2010 Fifth International Multi-conference on Computing in the Global …, 2010
582010
From music tracks to Google maps: Who owns computer-generated works?
M Perry, T Margoni
Computer Law & Security Review 26 (6), 621-629, 2010
302010
Decentralized approach to resource availability prediction using group availability in a P2P desktop grid
K Ramachandran, H Lutfiyya, M Perry
Future Generation Computer Systems 28 (6), 854-860, 2012
292012
Creating a legal framework for copyright management of open access within the Australian academic and research sector
B Fitzgerald, A Fitzgerald, M Perry, S Kiel-Chisholm, E Driscoll, ...
Legal Framework for E-Research Realising the Potential, 264-332, 2008
182008
SLA automated negotiation manager for computing services
H Kaminski, M Perry
The 8th IEEE International Conference on E-Commerce Technology and The 3rd …, 2006
172006
Trust bootstrapping services and service providers
ZM Aljazzaf, MAM Capretz, M Perry
2011 Ninth Annual International Conference on Privacy, Security and Trust, 7-15, 2011
162011
Digital Propertization of the New Artifacts: The Application of Technologies for Soft Representations of the Physical and Metaphysical
M Perry
Cardozo J. Int'l & Comp. L. 11, 671, 2003
162003
Reasoning over ontologies of on demand service
Y Zhou, Q Zhao, M Perry
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005
152005
Going for the throat: Carnivore in an ECHELON world-Part II
T Nabbali, M Perry
Computer Law & Security Review 20 (2), 84-97, 2004
152004
Going for the throat: Carnivore in an Echelon World1—Part I
T Nabbali, M Perry
Computer Law & Security Review 19 (6), 456-467, 2003
142003
Sita: Protecting internet trade agents from malicious hosts
M Perry, Q Zhang
International Workshop on Mobile Agents for Telecommunication Applications …, 2001
132001
The proxy-based mobile grid
A Khalaj, H Lutfiyya, M Perry
International Conference on Mobile Wireless Middleware, Operating Systems …, 2010
122010
Decentralized resource availability prediction for a desktop grid
K Ramachandran, H Lutfiyya, M Perry
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid …, 2010
122010
Policy enforcement pattern
Y Zhou, Q Zhao, M Perry
Proceedings of the Conference on Pattern Languages of Programs, 1-14, 2002
122002
Deep Pockets, Packets & Harbors: Never the Three Shall Meet
T Margoni, M Perry
Ohio State Law Journal 74 (no. 6 (2013)), 1195-1216, 2013
11*2013
Open Source Software Licensing Patterns
H Kaminski, M Perry
Proceedings of the Sixth Latin American Conference on Pattern Languages of …, 2007
112007
Ownership in Complex Authorship: A Comparative Study of Joint Works in Copyright Law
T Margoni, M Perry
European Intellectual Property Review 34 (1), 22-32, 2012
102012
Trust metrics for services and service providers
ZM Aljazzaf, M Perry, MAM Capretz
Proceedings of the sixth international conference on Internet and web …, 2011
102011
Trust in web services
ZM Aljazzaf, M Perry, MAM Capretz
2010 6th World Congress on Services, 189-190, 2010
92010
Autonomic Software License Management System: an implementation of licensing patterns
L Noorian, M Perry
2009 Fifth International Conference on Autonomic and Autonomous Systems, 257-263, 2009
92009
The system can't perform the operation now. Try again later.
Articles 1–20