|
Search the dblp DataBase
Paul Ashley:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paul Ashley, Bradley Broom, Mark Vandenwauver
An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:213-227 [Conf]
- Paul Ashley, Mark Vandenwauver, Bradley Broom
A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:24-35 [Conf]
- Richard Au, Mark Looi, Paul Ashley
Towards a New Authorisation Paradigm for Extranets. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:18-29 [Conf]
- Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:89-96 [Conf]
- Paul Ashley, Heather M. Hinton, Mark Vandenwauver
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:296-308 [Conf]
- Paul Ashley
Enforcement of a P3P Privacy Policy. [Citation Graph (0, 0)][DBLP] AISM, 2004, pp:11-26 [Conf]
- Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver
Enhancing SESAMEV4 with Smart Cards. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:193-202 [Conf]
- Richard Au, Mark Looi, Paul Ashley
Cross-domain one-shot authorization using smart cards. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:220-227 [Conf]
- Paul Ashley, Mark Vandenwauver, Joris Claessens
Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:303-318 [Conf]
- Richard Au, Ming Yao, Mark Looi, Paul Ashley
Secure Client Agent Environment (SCAE) for World Wide Web. [Citation Graph (0, 0)][DBLP] EC-Web, 2002, pp:234-243 [Conf]
- Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:369-381 [Conf]
- Mark Vandenwauver, Paul Ashley, Gary Gaskell
The Intranet Authorization Paradigm. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:145-160 [Conf]
- Paul Ashley, Mark Vandenwauver
Using SESAME to Implement Role-Based Access Control in Unix File Systems. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:141-146 [Conf]
- Paul Ashley, Mark Vandenwauver, Mark Rutherford, Sebastien Boving
Using SESAME's GSS-API to add Security to Unix Applications. [Citation Graph (0, 0)][DBLP] WETICE, 1998, pp:359-364 [Conf]
- Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:103-109 [Conf]
- Paul Ashley, Bradley Broom, Mark Vandenwauver
An Implementation of a Secure Version of NFS including REBAC. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1999, v:31, n:2, pp:54-64 [Journal]
- Paul Ashley
Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.). [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:1, pp:92-93 [Journal]
- Paul Ashley, Mark Vandenwauver, Frank Siebenlist
Applying authorization to intranets: architectures, issues and APIs. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:17, pp:1613-1620 [Journal]
Search in 0.003secs, Finished in 0.004secs
|