William Caelli

915 total citations
61 papers, 532 citations indexed

About

William Caelli is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, William Caelli has authored 61 papers receiving a total of 532 indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Information Systems, 20 papers in Artificial Intelligence and 14 papers in Computer Networks and Communications. Recurrent topics in William Caelli's work include Access Control and Trust (10 papers), Cloud Data Security Solutions (10 papers) and Information and Cyber Security (9 papers). William Caelli is often cited by papers focused on Access Control and Trust (10 papers), Cloud Data Security Solutions (10 papers) and Information and Cyber Security (9 papers). William Caelli collaborates with scholars based in Australia, United States and Japan. William Caelli's co-authors include Ed Dawson, John L. Black, Dennis Longley, Richard Watson, Jason Reid, Rossouw von Solms, S.H. von Solms, D. Branford, Ernest Foo and Matthew McKague and has published in prestigious journals such as Physical Review Letters, Physics Letters B and IEEE Access.

In The Last Decade

William Caelli

55 papers receiving 447 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
William Caelli Australia 12 265 168 140 99 69 61 532
Abdus Salam Pakistan 11 125 0.5× 82 0.5× 61 0.4× 41 0.4× 15 0.2× 71 490
P. S. Grover India 14 437 1.6× 217 1.3× 129 0.9× 29 0.3× 15 0.2× 76 608
Chiranjeeb Buragohain United States 9 59 0.2× 151 0.9× 718 5.1× 63 0.6× 50 0.7× 11 1.2k
Jiawei Zhang China 11 308 1.2× 648 3.9× 162 1.2× 121 1.2× 35 0.5× 31 987
Alexander Reinefeld Germany 16 162 0.6× 214 1.3× 517 3.7× 55 0.6× 33 0.5× 70 749
Shujiang Xu China 12 118 0.4× 176 1.0× 76 0.5× 172 1.7× 21 0.3× 64 426
Mitesh Patel United States 9 377 1.4× 149 0.9× 318 2.3× 31 0.3× 10 0.1× 28 901
Bart Jacobs Netherlands 14 150 0.6× 352 2.1× 46 0.3× 37 0.4× 57 0.8× 50 640
Mauricio Solar Chile 10 52 0.2× 73 0.4× 29 0.2× 36 0.4× 31 0.4× 48 530

Countries citing papers authored by William Caelli

Since Specialization
Citations

This map shows the geographic impact of William Caelli's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by William Caelli with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites William Caelli more than expected).

Fields of papers citing papers by William Caelli

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by William Caelli. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by William Caelli. The network helps show where William Caelli may publish in the future.

Co-authorship network of co-authors of William Caelli

This figure shows the co-authorship network connecting the top 25 collaborators of William Caelli. A scholar is included among the top collaborators of William Caelli based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with William Caelli. William Caelli is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Tang, Maolin, et al.. (2011). An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks. Journal of the Association for Information Systems. 175. 10 indexed citations
3.
Caelli, William, et al.. (2009). Privacy and security in open and trusted health information systems. QUT ePrints (Queensland University of Technology). 25–30. 4 indexed citations
4.
Caelli, William, et al.. (2009). Open and trusted information systems/health informatics access control (OTHIS/HIAC). QUT ePrints (Queensland University of Technology). 50(5). 99–108. 3 indexed citations
5.
Caelli, William, et al.. (2008). Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. QUT ePrints (Queensland University of Technology). 3(1). 3. 3 indexed citations
6.
Caelli, William, et al.. (2008). Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. QUT ePrints (Queensland University of Technology). 1 indexed citations
7.
Caelli, William, et al.. (2007). Current Approaches to Secure Health Information Systems are NOT Sustainable: An Analysis. QUT ePrints (Queensland University of Technology). 2430. 1 indexed citations
8.
Reid, Jason & William Caelli. (2005). DRM, trusted computing and operating system architecture. QUT ePrints (Queensland University of Technology). 127–136. 26 indexed citations
9.
Caelli, William, et al.. (2001). Signature Stripping: A Digital Dilemma.. Journal of information, law and technology. 2001(14). 1188–90. 4 indexed citations
10.
Caelli, William, et al.. (2001). R2ML: A Roles and Rights Mark Up Language for Role Based Access Control in a J2EE Based Distributed E-Commerce Environment. 1 indexed citations
11.
Little, Peter, et al.. (1998). Electronic Signatures: Understand the Past to Develop the Future. University of New South Wales law journal. 21(2). 452. 8 indexed citations
12.
Caelli, William. (1997). Information Security in electronic Commerce.. Journal of the Association for Information Systems. 1. 3 indexed citations
13.
Dawson, Ed, et al.. (1992). Measuring the Strength of Ciphers. 235–247. 1 indexed citations
14.
Gable, Guy G. & William Caelli. (1992). IT security : the need for international cooperation : proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992. North-Holland eBooks. 8 indexed citations
15.
Caelli, William, Dennis Longley, & Alan Tickle. (1992). A Methodology for Describing Information and Physical Security Architectures. 277–296. 11 indexed citations
16.
Caelli, William, et al.. (1992). An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. Computers & Security. 11(5). 463–479. 1 indexed citations
17.
Caelli, William. (1989). Computer security in the age of information : proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88, Gold Coast, Queensland, Australia, 19-21 May, 1988. Elsevier eBooks. 3 indexed citations
18.
Caelli, William. (1988). Electronic Funds Transfer Systems.. Australian Computer Journal. 20. 168–169. 3 indexed citations
19.
Caelli, William. (1979). The CODASYL 1978 Data Base Proposals: An Overview and Discussion.. Australian Computer Journal. 11(3). 48–59. 1 indexed citations
20.
Watson, Richard, D. Branford, John L. Black, & William Caelli. (1973). The 36Ar(α, γ0)40Ca reaction at excitation energies in the region of the giant dipole resonance. Nuclear Physics A. 203(1). 209–220. 26 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026