The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David W. Chadwick: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gansen Zhao, Sassa Otenko, David W. Chadwick
    Distributed Key Management for Secure Role based Messaging. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:132-137 [Conf]
  2. Gansen Zhao, David Chadwick, Sassa Otenko
    Obligations for Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:424-431 [Conf]
  3. Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick
    Flexible and Manageable Delegation of Authority in RBAC. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:453-458 [Conf]
  4. Ana Ferreira, R. Cruz-Correia, Luis Antunes, P. Farinha, E. Oliveira-Palhares, David W. Chadwick, A. Costa-Pereira
    How to Break Access Control in a Controlled Manner. [Citation Graph (0, 0)][DBLP]
    CBMS, 2006, pp:847-854 [Conf]
  5. David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
    Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:67-86 [Conf]
  6. David W. Chadwick, Edward Ball, M. V. Sahalayev
    Modifying LDAP to Support PKI. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:205-214 [Conf]
  7. Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody
    Persistent versus Dynamic Role Membership. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:344-357 [Conf]
  8. Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko
    Experiences of Applying Advanced Grid Authorisation Infrastructures. [Citation Graph (0, 0)][DBLP]
    EGC, 2005, pp:265-274 [Conf]
  9. Wensheng Xu, David W. Chadwick, Sassa Otenko
    Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:162-179 [Conf]
  10. Gabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick
    A Heterogeneous Network Access Service Based on PERMIS and SAML. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:55-72 [Conf]
  11. David W. Chadwick, Carmen Carroll, S. Harvey, John P. New, Andrew J. Young
    Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:156- [Conf]
  12. David W. Chadwick, John P. New, D. M. McDowall, Darren P. Mundy
    Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing (1), 2001, pp:535-542 [Conf]
  13. Gansen Zhao, David W. Chadwick
    Evolving Messaging Systems for Secure Role Based Messaging. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:216-223 [Conf]
  14. David W. Chadwick
    Operational Models for Reputation Servers. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:108-115 [Conf]
  15. David W. Chadwick, Andrew J. Young
    Enabling the Internet White Pages Service - the Directory Guardian. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  16. Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick
    Trust Models in ICE-TEL. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  17. David W. Chadwick, Darren P. Mundy
    Policy Based Electronic Transmission of Prescriptions. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:197-206 [Conf]
  18. Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham
    Automated Decomposition of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:3-13 [Conf]
  19. David W. Chadwick, Linying Su, Alexander Otenko, Romain Laborde
    Coordination between Distributed PDPs. [Citation Graph (0, 0)][DBLP]
    POLICY, 2006, pp:163-172 [Conf]
  20. David W. Chadwick, Alexander Otenko
    The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:135-140 [Conf]
  21. David W. Chadwick, Alexander Otenko
    RBAC Policies in XML for X.509 Based Privilege Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:39-54 [Conf]
  22. Gansen Zhao, David W. Chadwick
    Trust Infrastructure for Policy based Messaging In Open Environments. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:144-149 [Conf]
  23. David W. Chadwick
    Authorisation Using Attributes from Multiple Authorities. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:326-331 [Conf]
  24. Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor
    Privacy Preserving Trust Authorization Framework Using XACML. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:673-678 [Conf]
  25. David W. Chadwick, Darren P. Mundy, John P. New
    Experiences of using a PKI to access a hospital information system by high street opticians. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1893-1903 [Journal]
  26. David W. Chadwick, Andrew Basden
    Evaluating Trust in a Public Key Certification Authority. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:592-611 [Journal]
  27. David W. Chadwick, Alexander Otenko
    The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:2, pp:277-289 [Journal]
  28. Edward Ball, David W. Chadwick, Darren P. Mundy
    Patient Privacy in Electronic Prescription Transfer. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:77-80 [Journal]
  29. David W. Chadwick, Alexander Otenko, Edward Ball
    Role-Based Access Control With X.509 Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:2, pp:62-69 [Journal]
  30. Sacha Brostoff, Martina Angela Sasse, David W. Chadwick, R. James Cunningham, Uche M. Mbanaso, Sassa Otenko
    'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:9, pp:835-856 [Journal]
  31. Richard O. Sinnott, David W. Chadwick, Jos Koetsier, O. Otenko, J. P. Watt, T. A. Nguyen
    Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:22- [Conf]
  32. David W. Chadwick, Sean Anthony
    Using WebDAV for Improved Certificate Revocation and Publication. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:265-279 [Conf]
  33. Tuan-Anh Nguyen, David Chadwick, Bassem Nasser
    Recognition of Authority in Virtual Organisations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:3-13 [Conf]

  34. How to Securely Break into RBAC: The BTG-RBAC Model. [Citation Graph (, )][DBLP]


  35. Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. [Citation Graph (, )][DBLP]


  36. An advanced policy based authorisation infrastructure. [Citation Graph (, )][DBLP]


  37. Obligations for Privacy and Confidentiality in Distributed Transactions. [Citation Graph (, )][DBLP]


  38. Federated Identity Management. [Citation Graph (, )][DBLP]


  39. Multi-session Separation of Duties (MSoD) for RBAC. [Citation Graph (, )][DBLP]


  40. Enforcing "sticky" security policies throughout a distributed application. [Citation Graph (, )][DBLP]


  41. Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP]


  42. On the Modeling of Bell-LaPadula Security Policies Using RBAC. [Citation Graph (, )][DBLP]


  43. Expressions of expertness: the virtuous circle of natural language for access control policy specification. [Citation Graph (, )][DBLP]


  44. Attribute Aggregation in Federated Identity Management. [Citation Graph (, )][DBLP]


  45. Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP]


  46. Coordinating access control in grid services. [Citation Graph (, )][DBLP]


  47. PERMIS: a modular authorization infrastructure. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002