The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mark Vandenwauver: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark Vandenwauver, Frank Jorissen
    Securing Internet Electronic Mail. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:208-223 [Conf]
  2. Paul Ashley, Bradley Broom, Mark Vandenwauver
    An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:213-227 [Conf]
  3. Paul Ashley, Mark Vandenwauver, Bradley Broom
    A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:24-35 [Conf]
  4. Paul Ashley, Heather M. Hinton, Mark Vandenwauver
    Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:296-308 [Conf]
  5. Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver
    Enhancing SESAMEV4 with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:193-202 [Conf]
  6. Paul Ashley, Mark Vandenwauver, Joris Claessens
    Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:303-318 [Conf]
  7. Mark Vandenwauver, Paul Ashley, Gary Gaskell
    The Intranet Authorization Paradigm. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:145-160 [Conf]
  8. Paul Ashley, Mark Vandenwauver
    Using SESAME to Implement Role-Based Access Control in Unix File Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:141-146 [Conf]
  9. Paul Ashley, Mark Vandenwauver, Mark Rutherford, Sebastien Boving
    Using SESAME's GSS-API to add Security to Unix Applications. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:359-364 [Conf]
  10. Joris Claessens, Mark Vandenwauver, Bart Preneel, Joos Vandewalle
    Setting up a Secure Web Server and Clients on an Intranet. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:295-300 [Conf]
  11. Åsa Hagström, Viiveke Fåk, Mark Vandenwauver
    EWS-A Case Study on Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:213-218 [Conf]
  12. Mark Vandenwauver, Joris Claessens, Wim Moreau, Calin Vaduva, Robert Maier
    Why Enterprises Need More than Firewalls and Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:152-157 [Conf]
  13. Mark Vandenwauver, René Govaerts, Joos Vandewalle
    How Role Based Access Control is Implemented in SESAME. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:293-298 [Conf]
  14. Paul Ashley, Bradley Broom, Mark Vandenwauver
    An Implementation of a Secure Version of NFS including REBAC. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:54-64 [Journal]
  15. Paul Ashley, Mark Vandenwauver, Frank Siebenlist
    Applying authorization to intranets: architectures, issues and APIs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1613-1620 [Journal]

  16. Identifying Patterns of Federation Adoption. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002