Associate Professor Julian Jang-Jaccard staff profile picture

Contact details +64 (09) 414 0800  ext. 49026

Associate Professor Julian Jang-Jaccard

Associate Professor in Information Technology

School of Natural and Computational Sciences

Julian is an experienced and passionate IT professional whose career has spanned over 15 years across industries, universities, and government research agencies across Australia and NZ. Her core research focuses are; cybersecurity (identity management, intrusion detection, trustworthy system, cloud storage, applied cryptography) and privacy protection techniques (data anonymization and Homomorphic encryption) for big data analytics. She is currently working at Massy as an associate professor. Prior to joining Massey, she was a leading research scientist at CSIRO working on multi-million dollar projects within Australia and across Pacific. Before CSIRO, she was a professional java developer and a certified database administrator. 

Professional

Contact details

  • Location: 3.22, INMS
    Campus: East Precinct Albany Campus

Research Expertise

Research Interests

Exploring opportunities in application development using differential privacy

Evaluation of feasibility for existing data anonymisation techniques for high volume and dynamic big datasets

Development of controlled Data linkability in the case of big data while preventing re-identification and attribute disclosure

Techniques for global identification, data provenance, traceability

Attribute-based-encryption (ABE) for sharing data among different user groups while preserving users’ privacy

Human immunology inspired and behavior-based mobile malware Intrusion Detection

Thematics

21st Century Citizenship

Area of Expertise

Field of research codes
Computer Software (080300): Computer System Security (080303): Data Encryption (080402): Data Format (080400): Distributed Computing (080500): Health Informatics (080702): Information And Computing Sciences (080000): Library and Information Studies (080700): Networking and Communications (080503)

Keywords

identity management, intrusion detection, trustworthy system, cloud storage, applied cryptography, data anonymization, searchable encryption

Research Projects

Summary of Research Projects

Position Current Completed
Project Leader 4 0

Current Projects

Project Title: Advanced security technologies for the internet of things

Date Range: 2018 - 2021

Funding Body: University of Canterbury

Project Team:

Research Outputs

Journal

Zhang, X., Jang-Jaccard, J., Qi, L., Bhuiyan, MZA., & Liu, C. (2018). Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. Security and Communication Networks. 2018
[Journal article]Authored by: Jang-Jaccard, J.
Nepal, S., Friedrich, C., Wise, C., Sinnott, RO., Jang-Jaccard, J., & Chen, S. (2016). Key management service: Enabling secure sharing and deleting of documents on public clouds. Services Transactions on Cloud Computing. 4(2), 15-31
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., Celler, B., & Yan, B. (2016). WebRTC-based video conferencing service for telehealth. Computing. 98(1-2), 169-193
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences. 80(5), 973-993
[Journal article]Authored by: Jang-Jaccard, J.
Nepal, S., Li, J., Jang-Jaccard, J., & Alem, L. (2014). A framework for telehealth program evaluation. Telemedicine and e-Health. 20(4), 393-404
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., Alem, L., & Li, J. (2014). Barriers for delivering telehealth in rural australia: a review based on Australian trials and studies. Telemedicine journal and e-health : the official journal of the American Telemedicine Association. 20(5), 496-504
[Journal article]Authored by: Jang-Jaccard, J.
Celler, BG., Sparks, R., Nepal, S., Alem, L., Varnfield, M., Li, J., . . . Jayasena, R. (2014). Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in australia. BMC Public Health. 14(1)
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., & GUO, YJ. (2013). Cybersecurity threats in cloud computing. Australian Journal of Telecommunications and the Digital Economy. 1(1), 4.1-4.17 Retrieved from http://telsoc.org/journal
[Journal article]Authored by: Jang-Jaccard, J.
Zic, JJ., De Groot, M., Liu, D., Jang, J., & Wang, C. (2012). Hardware security device facilitated trusted energy services. Mobile Networks and Applications. 17(4), 564-577
[Journal article]Authored by: Jang-Jaccard, J.
Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J. (2012). A new cloud architecture of virtual trusted platform modules. IEICE Transactions on Information and Systems. E95-D(6), 1577-1589
[Journal article]Authored by: Jang-Jaccard, J.
Nepal, S., Zic, J., Liu, D., & Jang, J. (2011). A mobile and portable trusted computing platform. Eurasip Journal on Wireless Communications and Networking. 2011(1)
[Journal article]Authored by: Jang-Jaccard, J.

Book

Jang-Jaccard, J., & Guo, F.(2019). Preface.
[Authored Book]Authored by: Jang-Jaccard, J.
Wilson, O. (2016). Introduction. (pp. 101 - 103).
[Chapter]Edited by: Jang-Jaccard, J., Mathrani, A.
Colarik, AM., Jang-Jaccard, J., & Mathrani, A. (Eds.) (2017). Cyber security and policy: A substantive dialogue. Auckland, New Zealand: Massey University Press
[Edited Book]Authored by: Mathrani, A.Edited by: Jang-Jaccard, J., Mathrani, A.

Report

Dods, S., Freyne, J., Alem, L., Nepal, S., Li, J., & Jang-Jaccard, J.(2012). Caring for the last 3%: Telehealth potential and broadband implications for remote Australia. (Report No. EP129516). Australia: CSIRO
[Technical Report]Authored by: Jang-Jaccard, J.

Conference

Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Team, HSR.Deployment Issues for Integrated Open-Source-ased Indoor Air Quality School Monitoring Box (SKOMOBO). 2018 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS). (pp. 259 - 262).
[Conference]Authored by: Chitty, C., Cunningham, C., Jang-Jaccard, J., Phipps, R., Wang, Y.
McIntosh, TR., Jang-Jaccard, J., & Watters, PA.Large scale behavioral analysis of ransomware attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 217 - 229). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Hong, JB., Jang-Jaccard, J., & Kim, DS.Comprehensive security assessment of combined MTD techniques for the cloud. Proceedings of the ACM Conference on Computer and Communications Security. (pp. 11 - 20). 1543-7221.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Jang-Jaccard, J., & Kim, DS.Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. (pp. 573 - 578).
[Conference]Authored by: Jang-Jaccard, J.
Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Cunningham, C.Deployment issues for integrated open-source-Based indoor air quality school Monitoring Box (SKOMOBO). 2018 IEEE Sensors Applications Symposium, SAS 2018 - Proceedings. (pp. 1 - 4).
[Conference]Authored by: Chitty, C., Cunningham, C., Jang-Jaccard, J., Phipps, R., Wang, Y.
Bazai, SU., Jang-Jaccard, J., & Wang, R.Anonymizing k-NN classification on mapreduce. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. (pp. 364 - 377). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J., Wang, R.
Weyers, R., Jang-Jaccard, J., Moses, A., Wang, Y., Boulic, M., Chitty, C., . . . Cunningham, C. (2018). Low-cost Indoor Air Quality (IAQ) Platform for Healthier Classrooms in New Zealand: Engineering Issues. Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017. (pp. 208 - 215).
[Conference Paper in Published Proceedings]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J., Phipps, R., Wang, Y.
Boulic, M., Wang, Y., Phipps, R., Chitty, C., Cunningham, C., Moses, A., . . . Healthy School Research Team, . (2018). A breath of fresh air: engaging school-aged students with air quality science in New Zealand schools.. , Indoor Air 2018
[Conference Abstract]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J., Phipps, R.Contributed to by: Tookey, L.Edited by: Tookey, L.
Wang, Y., Boulic, M., Phipps, R., Chitty, C., Moses, A., Weyers, R., . . . Cunningham, C.(2018). Integrating Open-Source Technologies to Build a School Indoor Air Quality Monitoring Box (SKOMOBO). Paper presented at the meeting of Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017
[Conference Paper]Authored by: Boulic, M., Cunningham, C., Jang-Jaccard, J., Phipps, R., Wang, Y.
Alavizadeh, H., Kim, DS., Hong, JB., & Jang-Jaccard, J.Effective security analysis for combinations of MTD techniques on cloud computing (short paper). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 539 - 548). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Alavizadeh, H., Dube, K., Kim, DS., Jang-Jaccard, J., & Guesgen, HW. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10701 LNCS (pp. 860 - 876).
[Conference Paper in Published Proceedings]Authored by: Dube, K., Guesgen, H., Jang-Jaccard, J.
Bazai, SU., Jang-Jaccard, J., & Zhang, X.A privacy preserving platform for MapReduce. Communications in Computer and Information Science. (pp. 88 - 99). 1865-0929.
[Conference]Authored by: Jang-Jaccard, J.
Baryalai, M., Jang-Jaccard, J., & Liu, D.Towards privacy-preserving classification in neural networks. 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. (pp. 392 - 399).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Jang-Jaccard, J., Celler, B., Yan, B., & Alem, L.Data architecture for telehealth services research: A case study of home tele-monitoring. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 458 - 467).
[Conference]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Li, J., Nepal, S., & Alem, L.Security analysis of mobile applications: A case study of a collaboration tool in healthcare. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 553 - 562).
[Conference]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Manraj, A., & Nepal, S.Portable key management service for cloud storage. CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. (pp. 147 - 156).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Hwang, H., & Nepal, S.Biometric enabled portable trusted computing platform. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011. (pp. 436 - 442).
[Conference]Authored by: Jang-Jaccard, J.
Zic, J., Jang, J., Liu, D., Wang, C., & De Groot, M.Hardware security device facilitated trusted residential energy services. Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010.
[Conference]Authored by: Jang-Jaccard, J.
Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J.A cloud architecture of virtual trusted platform modules. Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 804 - 811).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Zic, J., Liu, D., & Jang, J.Trusted computing platform in your pocket. Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 812 - 817).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Liu, D., Nepal, S., & Zic, J.User authentication for online applications using a USB-based trust device. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. (pp. 15 - 26). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J.
Chen, W., Fekete, A., Greenfield, P., & Jang, J.Implementing isolation for service-based applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5870 LNCS (PART 1)(pp. 365 - 372). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Nepal, S., Zic, J., & IEEE, .Trusted email protocol: Dealing with privacy concerns from malicious email intermediaries. 2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2. (pp. 402 - 407).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., & Greenfield, P.Delivering promises for web services applications. Proceedings - 2007 IEEE International Conference on Web Services, ICWS 2007. (pp. 599 - 606).
[Conference]Authored by: Jang-Jaccard, J.
Greenfield, P., Fekete, A., Jang, J., Kuo, D., & Nepal, S.Isolation support for service-based applications a position paper. CIDR 2007 - 3rd Biennial Conference on Innovative Data Systems Research. (pp. 314 - 323).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Jang, J., & Zie, J.Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations. EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS. (pp. 219 - 226).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., Greenfield, P., & Nepal, S.An event-driven workflow engine for service-based business systems. Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC. (pp. 233 - 242). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Fekete, A., Greenfield, P., Jang, J., Kuo, D., & Shi, T.A service-oriented workflow language for robust interacting applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 40 - 58). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Greenfield, P., Fekete, A., Jang, J., & Kuo, D.Compensation is not enough [fault-handling and compensation mechanism]. Proceedings - 7th IEEE International Enterprise Distributed Object Computing Conference. 2003-January (January)(pp. 232 - 239). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., Greenfield, P., & Kuo, D.Expressiveness of workflow description languages. Proceedings of the International Conference on Web Services. (pp. 104 - 110).
[Conference]Authored by: Jang-Jaccard, J.
Kuo, D., Fekete, A., Greenfield, P., Jang, J., & Palmer, D.Just What Could Possibly Go Wrong in B2B Integration?. Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. (pp. 544 - 549). 0730-3157.
[Conference]Authored by: Jang-Jaccard, J.

Supervision and Teaching

Summary of Doctoral Supervision

Position Current Completed
Supervisor 5 0
Co-supervisor 2 0

Courses Coordinated

  • 158.120 Fundamental Information Technologies
  • 158.235 Networks, Security and Privacy
  • 158.738 Implementation and Management of Systems Security

Current Doctoral Supervision

Supervisor of:

  • Jinting Zhu - Doctor of Philosophy
    Artificial Intelligence approaches for malware detection
  • Tui Wei - Doctor of Philosophy
    Outlier Detection UsingMSD-Kmeans for Large-Scale IoT Datasets
  • Hooman Alavizadeh - Doctor of Philosophy
    Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing
  • Sibghat Bazai Sibghat Ullah - Doctor of Philosophy
    Building a privacy-preservation model for Hadoop platform
  • Mehmood Baryalai - Doctor of Philosophy
    A Platform for Practical Homomorphic Encryption in Neural Network Classification

Co-supervisor of:

Massey Contact Centre Mon - Fri 8:30am to 4:30pm 0800 MASSEY (+64 6 350 5701) TXT 5222 contact@massey.ac.nz Web chat Staff Alumni News Māori @ Massey