|
Search the dblp DataBase
Mark Vandenwauver:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mark Vandenwauver, Frank Jorissen
Securing Internet Electronic Mail. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:208-223 [Conf]
- Paul Ashley, Bradley Broom, Mark Vandenwauver
An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:213-227 [Conf]
- Paul Ashley, Mark Vandenwauver, Bradley Broom
A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:24-35 [Conf]
- Paul Ashley, Heather M. Hinton, Mark Vandenwauver
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:296-308 [Conf]
- Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver
Enhancing SESAMEV4 with Smart Cards. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:193-202 [Conf]
- Paul Ashley, Mark Vandenwauver, Joris Claessens
Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:303-318 [Conf]
- Mark Vandenwauver, Paul Ashley, Gary Gaskell
The Intranet Authorization Paradigm. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:145-160 [Conf]
- Paul Ashley, Mark Vandenwauver
Using SESAME to Implement Role-Based Access Control in Unix File Systems. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:141-146 [Conf]
- Paul Ashley, Mark Vandenwauver, Mark Rutherford, Sebastien Boving
Using SESAME's GSS-API to add Security to Unix Applications. [Citation Graph (0, 0)][DBLP] WETICE, 1998, pp:359-364 [Conf]
- Joris Claessens, Mark Vandenwauver, Bart Preneel, Joos Vandewalle
Setting up a Secure Web Server and Clients on an Intranet. [Citation Graph (0, 0)][DBLP] WETICE, 1998, pp:295-300 [Conf]
- Åsa Hagström, Viiveke Fåk, Mark Vandenwauver
EWS-A Case Study on Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:213-218 [Conf]
- Mark Vandenwauver, Joris Claessens, Wim Moreau, Calin Vaduva, Robert Maier
Why Enterprises Need More than Firewalls and Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:152-157 [Conf]
- Mark Vandenwauver, René Govaerts, Joos Vandewalle
How Role Based Access Control is Implemented in SESAME. [Citation Graph (0, 0)][DBLP] WETICE, 1997, pp:293-298 [Conf]
- Paul Ashley, Bradley Broom, Mark Vandenwauver
An Implementation of a Secure Version of NFS including REBAC. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1999, v:31, n:2, pp:54-64 [Journal]
- Paul Ashley, Mark Vandenwauver, Frank Siebenlist
Applying authorization to intranets: architectures, issues and APIs. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:17, pp:1613-1620 [Journal]
Identifying Patterns of Federation Adoption. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|