The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paul Ashley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul Ashley, Bradley Broom, Mark Vandenwauver
    An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:213-227 [Conf]
  2. Paul Ashley, Mark Vandenwauver, Bradley Broom
    A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:24-35 [Conf]
  3. Richard Au, Mark Looi, Paul Ashley
    Towards a New Authorisation Paradigm for Extranets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:18-29 [Conf]
  4. Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
    A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:89-96 [Conf]
  5. Paul Ashley, Heather M. Hinton, Mark Vandenwauver
    Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:296-308 [Conf]
  6. Paul Ashley
    Enforcement of a P3P Privacy Policy. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:11-26 [Conf]
  7. Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver
    Enhancing SESAMEV4 with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:193-202 [Conf]
  8. Richard Au, Mark Looi, Paul Ashley
    Cross-domain one-shot authorization using smart cards. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:220-227 [Conf]
  9. Paul Ashley, Mark Vandenwauver, Joris Claessens
    Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:303-318 [Conf]
  10. Richard Au, Ming Yao, Mark Looi, Paul Ashley
    Secure Client Agent Environment (SCAE) for World Wide Web. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:234-243 [Conf]
  11. Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet
    Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:369-381 [Conf]
  12. Mark Vandenwauver, Paul Ashley, Gary Gaskell
    The Intranet Authorization Paradigm. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:145-160 [Conf]
  13. Paul Ashley, Mark Vandenwauver
    Using SESAME to Implement Role-Based Access Control in Unix File Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:141-146 [Conf]
  14. Paul Ashley, Mark Vandenwauver, Mark Rutherford, Sebastien Boving
    Using SESAME's GSS-API to add Security to Unix Applications. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:359-364 [Conf]
  15. Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
    E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:103-109 [Conf]
  16. Paul Ashley, Bradley Broom, Mark Vandenwauver
    An Implementation of a Secure Version of NFS including REBAC. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:54-64 [Journal]
  17. Paul Ashley
    Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.). [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:1, pp:92-93 [Journal]
  18. Paul Ashley, Mark Vandenwauver, Frank Siebenlist
    Applying authorization to intranets: architectures, issues and APIs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1613-1620 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002