|
Search the dblp DataBase
David W. Chadwick:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gansen Zhao, Sassa Otenko, David W. Chadwick
Distributed Key Management for Secure Role based Messaging. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:132-137 [Conf]
- Gansen Zhao, David Chadwick, Sassa Otenko
Obligations for Role Based Access Control. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:424-431 [Conf]
- Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick
Flexible and Manageable Delegation of Authority in RBAC. [Citation Graph (0, 0)][DBLP] AINA Workshops (2), 2007, pp:453-458 [Conf]
- Ana Ferreira, R. Cruz-Correia, Luis Antunes, P. Farinha, E. Oliveira-Palhares, David W. Chadwick, A. Costa-Pereira
How to Break Access Control in a Controlled Manner. [Citation Graph (0, 0)][DBLP] CBMS, 2006, pp:847-854 [Conf]
- David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:67-86 [Conf]
- David W. Chadwick, Edward Ball, M. V. Sahalayev
Modifying LDAP to Support PKI. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:205-214 [Conf]
- Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody
Persistent versus Dynamic Role Membership. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:344-357 [Conf]
- Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko
Experiences of Applying Advanced Grid Authorisation Infrastructures. [Citation Graph (0, 0)][DBLP] EGC, 2005, pp:265-274 [Conf]
- Wensheng Xu, David W. Chadwick, Sassa Otenko
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:162-179 [Conf]
- Gabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick
A Heterogeneous Network Access Service Based on PERMIS and SAML. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:55-72 [Conf]
- David W. Chadwick, Carmen Carroll, S. Harvey, John P. New, Andrew J. Young
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. [Citation Graph (0, 0)][DBLP] HICSS, 2002, pp:156- [Conf]
- David W. Chadwick, John P. New, D. M. McDowall, Darren P. Mundy
Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing (1), 2001, pp:535-542 [Conf]
- Gansen Zhao, David W. Chadwick
Evolving Messaging Systems for Secure Role Based Messaging. [Citation Graph (0, 0)][DBLP] ICECCS, 2005, pp:216-223 [Conf]
- David W. Chadwick
Operational Models for Reputation Servers. [Citation Graph (0, 0)][DBLP] iTrust, 2005, pp:108-115 [Conf]
- David W. Chadwick, Andrew J. Young
Enabling the Internet White Pages Service - the Directory Guardian. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick
Trust Models in ICE-TEL. [Citation Graph (0, 0)][DBLP] NDSS, 1997, pp:- [Conf]
- David W. Chadwick, Darren P. Mundy
Policy Based Electronic Transmission of Prescriptions. [Citation Graph (0, 0)][DBLP] POLICY, 2003, pp:197-206 [Conf]
- Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham
Automated Decomposition of Access Control Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2005, pp:3-13 [Conf]
- David W. Chadwick, Linying Su, Alexander Otenko, Romain Laborde
Coordination between Distributed PDPs. [Citation Graph (0, 0)][DBLP] POLICY, 2006, pp:163-172 [Conf]
- David W. Chadwick, Alexander Otenko
The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP] SACMAT, 2002, pp:135-140 [Conf]
- David W. Chadwick, Alexander Otenko
RBAC Policies in XML for X.509 Based Privilege Management. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:39-54 [Conf]
- Gansen Zhao, David W. Chadwick
Trust Infrastructure for Policy based Messaging In Open Environments. [Citation Graph (0, 0)][DBLP] WETICE, 2005, pp:144-149 [Conf]
- David W. Chadwick
Authorisation Using Attributes from Multiple Authorities. [Citation Graph (0, 0)][DBLP] WETICE, 2006, pp:326-331 [Conf]
- Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor
Privacy Preserving Trust Authorization Framework Using XACML. [Citation Graph (0, 0)][DBLP] WOWMOM, 2006, pp:673-678 [Conf]
- David W. Chadwick, Darren P. Mundy, John P. New
Experiences of using a PKI to access a hospital information system by high street opticians. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1893-1903 [Journal]
- David W. Chadwick, Andrew Basden
Evaluating Trust in a Public Key Certification Authority. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:7, pp:592-611 [Journal]
- David W. Chadwick, Alexander Otenko
The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2003, v:19, n:2, pp:277-289 [Journal]
- Edward Ball, David W. Chadwick, Darren P. Mundy
Patient Privacy in Electronic Prescription Transfer. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:2, pp:77-80 [Journal]
- David W. Chadwick, Alexander Otenko, Edward Ball
Role-Based Access Control With X.509 Attribute Certificates. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2003, v:7, n:2, pp:62-69 [Journal]
- Sacha Brostoff, Martina Angela Sasse, David W. Chadwick, R. James Cunningham, Uche M. Mbanaso, Sassa Otenko
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2005, v:35, n:9, pp:835-856 [Journal]
- Richard O. Sinnott, David W. Chadwick, Jos Koetsier, O. Otenko, J. P. Watt, T. A. Nguyen
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid. [Citation Graph (0, 0)][DBLP] e-Science, 2006, pp:22- [Conf]
- David W. Chadwick, Sean Anthony
Using WebDAV for Improved Certificate Revocation and Publication. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:265-279 [Conf]
- Tuan-Anh Nguyen, David Chadwick, Bassem Nasser
Recognition of Authority in Virtual Organisations. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:3-13 [Conf]
How to Securely Break into RBAC: The BTG-RBAC Model. [Citation Graph (, )][DBLP]
Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. [Citation Graph (, )][DBLP]
An advanced policy based authorisation infrastructure. [Citation Graph (, )][DBLP]
Obligations for Privacy and Confidentiality in Distributed Transactions. [Citation Graph (, )][DBLP]
Federated Identity Management. [Citation Graph (, )][DBLP]
Multi-session Separation of Duties (MSoD) for RBAC. [Citation Graph (, )][DBLP]
Enforcing "sticky" security policies throughout a distributed application. [Citation Graph (, )][DBLP]
Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP]
On the Modeling of Bell-LaPadula Security Policies Using RBAC. [Citation Graph (, )][DBLP]
Expressions of expertness: the virtuous circle of natural language for access control policy specification. [Citation Graph (, )][DBLP]
Attribute Aggregation in Federated Identity Management. [Citation Graph (, )][DBLP]
Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP]
Coordinating access control in grid services. [Citation Graph (, )][DBLP]
PERMIS: a modular authorization infrastructure. [Citation Graph (, )][DBLP]
Search in 0.010secs, Finished in 0.012secs
|