The SCEAS System
Navigation Menu

Search the dblp DataBase


Adrian Baldwin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ana Ferreira, Simon Shiu, Adrian Baldwin
    Towards Accountability for Electronic Patient Records. [Citation Graph (0, 0)][DBLP]
    CBMS, 2003, pp:189-194 [Conf]
  2. Adrian Baldwin, Simon Shiu, Marco Casassa Mont
    Trust Services: A Framework for Service-Based Solutions. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:507-513 [Conf]
  3. Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu
    Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:271-278 [Conf]
  4. Adrian Baldwin, Simon Shiu
    Hardware Encapsulation of Security Services. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:201-216 [Conf]
  5. Adrian Baldwin, Simon Shiu
    Enabling Shared Audit Data. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:14-28 [Conf]
  6. Adrian Baldwin
    Enhanced Accountability for Electronic Processes. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:319-332 [Conf]
  7. Adrian Baldwin, Yolanta Beres, David Plaquin, Simon Shiu
    Trust Record: High-Level Assurance and Compliance. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:393-396 [Conf]
  8. Adrian Baldwin, Simon Shiu
    Hardware Security Appliances for Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:46-58 [Conf]
  9. Cheh Goh, Adrian Baldwin
    Towards a More Complete Model of Role. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:55-62 [Conf]
  10. Adrian Baldwin, Simon Shiu
    Encryption and Key management in a SAN. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:35-44 [Conf]
  11. Adrian Baldwin, Simon Shiu
    Enabling shared audit data. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:263-276 [Journal]

  12. Model-based assurance of security controls. [Citation Graph (, )][DBLP]

  13. On identity assurance in the presence of federated identity management systems. [Citation Graph (, )][DBLP]

  14. Using Modelling and Simulation for Policy Decision Support in Identity Management. [Citation Graph (, )][DBLP]

  15. POWER prototype: towards integrated policy-based management. [Citation Graph (, )][DBLP]

Search in 0.028secs, Finished in 0.029secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002