Items where Author, Editor or other role is "Chadwick, David"
Number of items: 172.
A
Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: Amman, Jordan, ed. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, pp. 70-76. ISBN 978-1-5090-2658-6. (doi:10.1109/CCC.2016.13) (KAR id:59903) |
Andrianopoulos, Alex and Chadwick, David W. (1993) Simulating the Global Directory Service with OPNET. In: Proceedings 26th Annual Simulation Symposium. IEEE, pp. 162-172. ISBN 0-8186-3620-3. (doi:10.1109/SIMSYM.1993.639126) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21126) |
B
Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003) (KAR id:43003) |
Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711) |
Brostoff, Sacha, Sasse, M. Angela, Chadwick, David W., Cunningham, James, Mbanaso, Uche, Otenko, Sassa (2005) 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software: Practice and Experience, 35 (9). pp. 835-856. ISSN 0038-0644. (doi:10.1002/spe.691) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14303) |
Brostoff, Sacha, Sassea, M.Angela, Chadwick, David W., Cunningham, James, Mbanaso, Uche, Otenko, Sassa (2005) RBAC what? Development of a role-based access control policy writing tool for e-Scientists. In: Software: Practice and Experience. 35 (9). pp. 835-856. John Wiley & Sons (KAR id:14120) |
Bacon, Jean, Moody, Ken, Chadwick, David W., Otenko, Sassa (2003) Session Limited vs. Persistent Role Membership. In: Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13938) |
Ball, E., Chadwick, David W., Mundy, Darren (2003) Patient Privacy in Electronic Prescription Transfer. IEEE Security & Privacy magazine, . pp. 77-80. (doi:10.1109/msecp.2003.1193217) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14004) |
Ball, E. and Chadwick, David W. and Basden, Andrew (2003) The Implementation of a System for Evaluating Trust in a PKI Environment. In: Petrovic, Otto and Ksela, Michael and Fallenbock, Markus and Kitti, Christian, eds. Trust in the Network Economy. Springer-Verlag, Austria, pp. 263-279. ISBN 3-211-06853-8. (doi:10.1007/978-3-7091-6088-6_16) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13846) |
Basden, Andrew, Ball, E., Chadwick, David W. (2001) Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure. Expert Systems, 18 (5). pp. 233-249. ISSN 0266-4720. (doi:10.1111/1468-0394.00178) (KAR id:13528) |
Basden, Andrew and Evans, John B. and Chadwick, David W. and Young, Andrew J. (1998) Coping with Poorly Understood Domains: the Example of Internet Trust. In: Research and Development in Expert Systems XV Proceedings of ES98, the Eighteenth Annual International Conference of the British Computer Society Specialist Group on Expert Systems. Springer, London, UK, pp. 114-132. ISBN 978-1-85233-086-6. E-ISBN 978-1-4471-0835-1. (doi:10.1007/978-1-4471-0835-1_8) (KAR id:21578) |
C
Chadwick, David W., Laborde, Romain, Oglaza, Arnaud, Venant, Remi, Wazan, Ahmad Samer, Nijjar, Manreet (2019) Improved Identity Management with Verifiable Credentials and FIDO. IEEE Communications Standards, 3 (4). pp. 14-20. ISSN 2471-2825. (doi:10.1109/MCOMSTD.001.1900020) (KAR id:80304) |
Chadwick, David W., Fan, Wenjun, Constantino, Gianpiero, De Lemos, Rogério, Di Cerbo, Francesco, Herwono, Ian, Mori, Paolo, Sajjad, Ali, Wang, Xiao-Si, Manera, Mirko and others. (2019) A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Generation Computer Systems, 102 . pp. 710-722. ISSN 0167-739X. (doi:10.1016/j.future.2019.06.026) (KAR id:76431) |
Chadwick, David W., Sette, Ioram S., Sui, Kristy, W (2015) Opening Up OpenStack’s Identity Service. In: Terena Networking Conference 2015, 14-18 June, 2015, Porto, Portugal. (Unpublished) (KAR id:52931) |
Chadwick, David W., Siu, Kristy W.S., Lee, Craig, Fouillat, Yann, Germonville, Damien (2014) Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12 (1). pp. 3-27. ISSN 1570-7873. E-ISSN 1572-9184. (doi:10.1007/s10723-013-9283-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43212) |
Chadwick, David W, Casenove, Matteo, Siu, Kristy (2013) My private cloud--granting federated access to cloud resources. Journal of Cloud Computing, 2 (1). pp. 1-16. ISSN 2192-113X. (doi:10.1186/2192-113X-2-3) (KAR id:43204) |
Chadwick, David W., Fatema, Kaniz (2012) A privacy preserving authorisation system for the cloud. Journal of Computer and System Sciences, 78 (5). pp. 1359-1373. ISSN 0022-0000. (doi:10.1016/j.jcss.2011.12.019) (KAR id:31975) |
Chadwick, David W. and Casenove, Matteo (2011) Security APIs for My Private Cloud-Granting access to anyone, from anywhere at any time. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science. IEEE, pp. 792-798. ISBN 978-1-4673-0090-2. (doi:10.1109/CloudCom.2011.122) (KAR id:31976) |
Chadwick, David W. and Inman, George and Siu, Kristy W.S. and Ferdous, Mohammad Sadek (2011) Leveraging social networks to gain access to organisational resources. In: Proceedings of the 7th ACM workshop on Digital identity management. ACM, New York, USA, pp. 43-51. ISBN 978-1-4503-1006-2. (doi:10.1145/2046642.2046653) (KAR id:31977) |
Chadwick, David W. and Lievens, Stijn F. and den Hartog, Jerry I. and Pashalidis, Andreas and Alhadeff, Joseph (2011) My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. In: 2011 IEEE 4th International Conference on Cloud Computing. IEEE, pp. 752-753. ISBN 978-1-4577-0836-7. E-ISBN 978-0-7695-4460-1. (doi:10.1109/CLOUD.2011.113) (KAR id:43198) |
Chadwick, David W., Inman, George, Klingenstein, Nate (2010) A Conceptual Model for Attribute Aggregation. Future Generation Computer Systems, 26 (7). pp. 1043-1052. (doi:10.1016/j.future.2009.12.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30572) |
Chadwick, David W., Antony, Sean, Bjerk, Rune (2010) Instant certificate revocation and publication using WebDAV. Journal of Computer Security, 18 (3). pp. 475-496. ISSN 1875-8924. (doi:10.3233/JCS-2009-0372) (KAR id:31987) |
Chadwick, David W. and Fatema, Kaniz (2009) An advanced policy based authorisation infrastructure. In: DIM '09 Proceedings of the 5th ACM workshop on Digital identity management. CCS Computer and Communications Security . ACM, New York, USA, pp. 81-84. ISBN 978-1-60558-786-8. (doi:10.1145/1655028.1655045) (KAR id:31990) |
Chadwick, David W., Inman, George (2009) Attribute Aggregation in Federated Identity Management. IEEE Computer, . pp. 182-196. (doi:10.1109/mc.2009.143) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30603) |
Chadwick, David W., Otenko, Sassa, Nguyen, Tuan Anh (2009) Adding Support to XACML for Multi-Domain User to User Dynamic Delegation of Authority. International Journal of Information Security, 8 (2). pp. 182-196. (doi:10.1007/s10207-008-0073-y) (KAR id:30605) |
Chadwick, David W. (2009) Federated Identity Management. In: Aldini, Alessandro and Barthe, Gilles and Gorrieri, Roberto, eds. FOSAD 2008/2009. LNCS (5705). Springer-Verlag, Berlin, pp. 182-196. ISBN 978-3-642-03828-0. (doi:10.1007/978-3-642-03829-7_3) (KAR id:30609) |
Chadwick, David W., Zhao, Gansen, Otenko, Sassa, Laborde, Romain, Su, Linying, Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience, 20 (11). pp. 1341-1357. ISSN 1532-0626. (doi:10.1002/cpe.1313) (KAR id:14877) |
Chadwick, David W., Su, L., Laborde, Romain (2008) Coordinating access control in grid services. Concurrency and Computation: Practice and Experience, 20 (9). pp. 1071-1094. ISSN 1532-0626. (doi:10.1002/cpe.1284) (KAR id:14878) |
Chadwick, David W., Beitis, George, Owen, Gareth (2008) Adding Authorisation to EduRoam. In: TERENA Networking Conference. . , Brugge, Belgium (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:23981) |
Chadwick, David W. (2007) Operational Models for Reputation Servers. In: Herrmann, Peter and Issarny, Valerie and Shiu, Simon, eds. Trust Management: Third International Conference, iTrust 2005. Lecture Notes in Computer Science, 3477 . Springer, Berlin, pp. 108-115. ISBN 978-3-540-26042-4. (KAR id:14329) |
Chadwick, David W. (2007) Dynamic Delegation of Authority in Web Services. In: Periorellis, Panayiotis, ed. Securing Web Services: Practical Usage of Standards and Specifications. Premier Reference Source . IGI Global, United States, pp. 111-137. ISBN 978-1-59904-639-6. (KAR id:14534) |
Chadwick, David W. and Anthony, Sean (2007) Using WebDAV for Improved Certificate Revocation and Publication. In: Public Key Infrastructure 4th European PKI Workshop. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-279. ISBN 978-3-540-73407-9. E-ISBN 978-3-540-73408-6. (doi:10.1007/978-3-540-73408-6_19) (KAR id:23995) |
Chadwick, David W. and Xu, Wensheng and Otenko, Sassa and Laborde, Romain and Nasser, Bassem (2007) Multi-Session Separation of Duties (MSoD) for RBAC. In: 2007 IEEE 23rd International Conference on Data Engineering Workshop. IEEE, pp. 744-753. ISBN 978-1-4244-0831-3. (doi:10.1109/ICDEW.2007.4401062) (KAR id:14595) |
Chadwick, David W. (2007) Unifying Grid and Organisational Security Mechanisms. In: Xiao, Yang, ed. Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications, CRC Press, United States, pp. 239-254. ISBN 978-0-8493-7921-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14596) |
Chadwick, David W. (2007) Coordinated decision making in distributed applications. Information Security Technical Report, Elsevier, 12 (3). pp. 147-154. ISSN 1363-4127. (doi:10.1016/j.istr.2007.05.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14612) |
Chadwick, David W. and Su, Linying and Laborde, Romain (2006) Providing Secure Coordinated Access to Grid Services. In: Proceedings of the 4th international workshop on Middleware for grid computing. ACM, New York, USA, p. 1. ISBN 1-59593-581-9. (doi:10.1145/1186675.1186677) (KAR id:14395) |
Chadwick, David W., Sasse, Angela (2006) The Virtuous Circle of Expressing Authorisation Policies. In: Proceedings of the ISWC'06 Workshop on Semantic Web Policy (SWPW'06). 207. , Georgia, USA (KAR id:14396) |
Chadwick, David W. and Otenko, Sassa and Nguyen, Tuan Anh (2006) Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. In: Communications and Multimedia Security. Lecture Notes in Computer Science, 4237 . Springer Berlin/Heidelberg, pp. 67-86. ISBN 978-3-540-47820-1. (doi:10.1007/11909033) (KAR id:14405) |
Chadwick, David W., Novikov, A., Otenko, Alexander (2006) GridShib and PERMIS Integration. Campus-Wide Information Systems, 23 (4). pp. 297-308. ISSN 1065-0741. (doi:10.1108/10650740610704153) (KAR id:14402) |
Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2006) Building a Modular Authorization Infrastructure. In: All Hands Meeting. . (KAR id:14430) |
Chadwick, David W. (2006) Authorisation using Attributes from Multiple Authorities. In: Reddy, Sumitra Mitra, ed. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06). International Workshops on Enabling Technologies . IEEE, pp. 326-331. ISBN 0-7695-2623-3. (doi:10.1109/WETICE.2006.22) (KAR id:14469) |
Chadwick, David W. and Su, Linying and Otenko, Oleksandr and Laborde, Romain (2006) Co-ordination between Distributed PDPs. In: Burgess, M. and Wijesekera, D., eds. Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06). International Workshop on Policies for Distributed Systems and Networks . IEEE, pp. 163-172. ISBN 0-7695-2598-9. (doi:10.1109/POLICY.2006.14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14475) |
Chadwick, David W. (2005) Security and Trust Management Extensions to the PERMIS X.509 Privilege Management Infrastructure. ERCIM News, 63 . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14250) |
Chadwick, David W. (2005) The X.509 Privilege Management Standard. UPGRADE: The European Journal for the Informatics Professional, VI (4). pp. 41-46. ISSN 1684-5285. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14282) |
Chadwick, David W., Otenko, Sassa, Xu, Wensheng (2005) Adding Distributed Trust Management to Shibboleth. In: NIST 4th Annual PKI Workshop. . pp. 3-14. , Gaithersberg, USA (KAR id:14343) |
Chadwick, David W. (2005) Delegation Issuing Service. In: NIST 4th Annual PKI Workshop. . pp. 62-73. , Gaithersberg, USA (KAR id:14342) |
Chadwick, David and Otenko, Sassa and Welch, Von (2005) Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure. In: Chadwick, David W. and Preneel, Bart, eds. Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP - The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 251-261. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_19) (KAR id:14380) |
Chadwick, David W. (2005) Authorisation in Grid Computing. Information Security Technical Report, 10 (1). pp. 33-40. ISSN 1363-4127. (doi:10.1016/j.istr.2004.11.004) (KAR id:14223) |
Chadwick, David and Lunt, Graeme and Zhao, Gansen (2005) Secure Role-based Messaging. In: Chadwick, David W. and Preneel, Bart, eds. Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP — The International Federation for Information Processing . Springer, pp. 263-275. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_20) (KAR id:14030) |
Chadwick, David (2005) Threat Modelling for Active Directory. In: Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP - The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 173-182. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_13) (KAR id:14086) |
Chadwick, David W. (2004) Autonomic Privilege Management - extending PERMIS to contribute to the TrustCOM objectives. In: E-Challenges 2004. 1. pp. 1216-1222. IOS Press, Vienna, Austria (KAR id:14069) |
Chadwick, David W. (2004) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series: Computer & Systems Sciences, 193 . IOS Press, Amsterdam, pp. 15-25. ISBN 978-1-58603-430-6. (KAR id:14042) |
Chadwick, David W., Dimitrakos, Theo, Dam, Kerstin Kleese-Van, Randal, Damian Mac, Matthews, Brian, Otenko, Alexander (2004) Multilayer Privilege Management for Dynamic Collaborative Scientific Communities. In: Workshop on Grid Security Practice and Experience, Oxford, UK. . II 7-14. (KAR id:14118) |
Chadwick, David W. (2004) PKI Past, Present and Future. In: First EuroPKI Workshop, Samos. . (KAR id:14149) |
Crawford, Scott, Chadwick, David W. (2004) Experiences of Establishing Trust in a Distributed System Operated by Mutually Distrusting Parties. In: 3rd Annual PKI R&D Workshop. . , NIST, Gaithersburg MD (KAR id:14183) |
Chadwick, David W. and Mundy, Darren (2004) The Secure Electronic Transfer of Prescriptions. In: Bryant, Jacqueline, ed. Current Perspectives in Healthcare Computing Conference. BCS HIC, pp. 11-28. ISBN 978-0-9546971-0-5. (KAR id:14205) |
Chadwick, David W. and Otenko, Alexander (2004) Implementing Role Based Access Controls using X.509 Privilege Management - the PERMIS Authorisation Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series, 193 . IOS Press, pp. 26-39. ISBN 1576034308. (KAR id:14043) |
Chadwick, David W., Mundy, Darren, New, John (2003) Experiences of Using a PKI to Access a Hospital Information System by High Street Opticians. Computer Communications special edition on PKI, 26 (16). pp. 1893-1903. ISSN 0140-3664. (doi:10.1016/S0140-3664(03)00084-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13892) |
Chadwick, David W. (2003) An Authorisation Interface for the GRID. In: E-Science All Hands Meeting 2003, Nottingham. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13915) |
Chadwick, David W. and Sahalayev, M. and Ball, E. (2003) Modifying LDAP to Support PKIs. In: Data and Applications Security XVII Status and Prospects. IFIP - The International Federation for Information Processing, 142 . Springer, Boston, Massachusetts, USA, pp. 205-214. ISBN 978-1-4020-8069-2. E-ISBN 978-1-4020-8070-8. (doi:10.1007/1-4020-8070-0_15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13935) |
Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 Attribute Certificates. Internet Draft. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13958) |
Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 CRLs. INTERNET-DRAFT. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13959) |
Chadwick, David W. and Mundy, Darren (2003) Policy Based Electronic Transmission of Prescriptions. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE, pp. 197-206. ISBN 0-7695-1933-4. (doi:10.1109/POLICY.2003.1206974) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13957) |
Chadwick, David W. (2003) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, Bled, Slovenia. IOS Press, p. 1525. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13972) |
Chadwick, David W. (2003) Deficiencies in LDAP when used to support a Public Key Infrastructure. Communications of the ACM, 46 (3). pp. 99-104. ISSN 0001-0782. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13999) |
Chadwick, David W., Otenko, Alexander, Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing, . pp. 62-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14000) |
Chadwick, David W., Otenko, Alexander (2003) The PERMIS X.509 Role Based Privilege Management Infrastructure. Future Generation Computer Systems, 19 (2). pp. 277-289. ISSN 0167-739X. (doi:10.1016/s0167-739x(02)00153-x) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14008) |
Chadwick, David W., Otenko, O. (2003) A Comparison of the Akenti and PERMIS Authorization Infrastructures in Ensuring Security in IT Infrastructures. In: El-Hadidi, Mahmoud T., ed. Proceedings of the ITI First International Conference on Information and Communications Technology (ICICT 2003) Cairo University. . pp. 5-26. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13847) |
Chadwick, David W., Legg, S. (2002) Internet X.509 Public Key Infrastructure -- LDAP Schema for PKIs. . Internet Draft (Unpublished) (KAR id:13771) |
Chadwick, David W., Otenko, Alexander (2002) The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proc 7th ACM Symposium On Access Control Models And Technologies (SACMAT 2002), Monterey, USA. . pp. 135-140. (KAR id:13778) |
Chadwick, David W., Mullan, S. (2002) Returning Matched Values with LDAPv3. . (KAR id:13780) |
Chadwick, David W. (2002) The PERMIS X.509 Based Privilege Management Infrastructure. IS Institute, University of Salford Salford M5 4WT England. (KAR id:13813) |
Chadwick, David W. (2002) LDAPv3 DN strings for use with PKIs. IS Institute, University of Salford, Salford. (KAR id:13810) |
Chadwick, D.W. and Otenko, A. (2002) RBAC Policies in XML for X.509 Based Privilege Management. In: Ghonaimy, Adeeb and El-Hadidi, Mahmoud T. and Aslan, Heba Kamal, eds. Security in the Information Society: Visions and Perspectives. IFIP Advances in Information and Communication Technology . Springer, Boston, Massachusetts, USA, pp. 39-54. ISBN 978-1-4757-1026-7. E-ISBN 978-0-387-35586-3. (doi:10.1007/978-0-387-35586-3_3) (KAR id:13791) |
Chadwick, D.W. and Carroll, C. and Harvey, S. and New, J. and Young, A.J. (2002) Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. In: Sprague Jr, Ralph H., ed. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE. ISBN 0-7695-1435-9. (doi:10.1109/HICSS.2002.994127) (KAR id:13648) |
Chadwick, David W. (2002) Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3. IS Institute, University of Salford Salford England M5 4WT. (KAR id:13831) |
Chadwick, David W., Otenko, Olexandre, Hunter, David, Leoni, Cristiano (2002) Privilege Management for E-Construction. In: Rezgui, Yacine and Ingirige, Bingunath and Aouad, Ghassan, eds. Proc European Conf on Information and Communication Technology Advances and Innovation in the Knowledge Society, Part B, University of Salford, UK. 2002. . pp. 91-102. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13682) |
Chadwick, David W., Basden, Andrew (2001) Evaluating Trust in a Public Key Certification Authority. Computers and Security, 20 (7). pp. 592-611. ISSN 0167-4080. (doi:10.1016/S0167-4048(01)00710-6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13520) |
Chadwick, David W. (2001) An X.509 Role Based Privilege Management Infrastructure. In: Cooper, E., ed. Briefing - Global InfoSecurity 2002, World Markets Research Centre Ltd. World Markets Research Centre, London. ISBN 1-903150-52-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13538) |
Chadwick, David W. (2001) Deficiencies in LDAP when used to Support a Public Key Infrastructure. In: Terena Networking Conference, Antalya. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13613) |
Chadwick, David W., New, John, McDowell, D.M., Mundy, Darren (2001) Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. In: Graham, P. and Maheswaran, M. and Eskicioglu, R., eds. The International Conference On Internet Computing 2001. I. pp. 535-541. CSREA Press (KAR id:13488) |
Chadwick, David W. and Young, Andrew J. (2000) A Directory Application Level Firewall - the Guardian DSA. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 133-147. (KAR id:21924) |
Chadwick, David W. and Harvey, S. and New, John and Young, Andrew J. (2000) Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 201-209. (KAR id:21925) |
Chadwick, David W. (2000) Network Firewall Technologies. In: Schneider, W.S. and Jerman-Blazic, B. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 149-166. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21922) |
Chadwick, David W., Harvey, S., New, John, Young, Andrew J. (2000) Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet. In: Information Security Solutions Europe (ISSE) 2000, Barcelona. . (KAR id:21974) |
Chadwick, David W., Cook, P.J., Young, Andrew J., McDowell, D.M., New, John (2000) Using the Internet to Access Confidential Patient Records: A Case Study''. British Medical Journal, 321 . pp. 612-614. (KAR id:21972) |
Chadwick, David W., Tassabehji, Rana, Young, Andrew J. (2000) Experiences of Using a Public Key Infrastructure for the Preparation of Examination Papers. Computers and Education, 35 (1). pp. 1-20. ISSN 0360-1315. (doi:10.1016/S0360-1315(99)00040-8) (KAR id:21913) |
Chadwick, David W. (2000) Windows 2000: A Threat to Internet Diversity and Open Standards? IEEE Computer, 33 (8). pp. 107-109. ISSN 0018-9162. (doi:10.1109/2.863989) (KAR id:21988) |
Chadwick, David W. (2000) Secure Directories. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 123-131. (KAR id:22015) |
Chadwick, David W. (1999) Smart Cards Aren't Always the Smart Choice. IEEE Computer, 32 (12). pp. 142-143. ISSN 0018-9162. (doi:10.1109/2.809256) (KAR id:21728) |
Chadwick, David W. and Howes, T. and Wahl, M. (1999) Referrals and Knowledge References in LDAP Directories. UNSPECIFIED. (KAR id:21812) |
Chadwick, David W. (1999) Compound (Families of) Entries. UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21815) |
Chadwick, David W., Young, Andrew J. (1998) Enabling the Internet White Pages Service -- the Directory Guardian. In: Internet Society Symposioum on Network and Distributed Systems Security (NDSS 98), San Diego, California. . (KAR id:21566) |
Chadwick, David W., Basden, Andrew, Evans, J., Young, Andrew J. (1998) Intelligent Computation of Trust. In: Terena Networking Conference, TNC98, Dresden, Germany. . pp. 114-132. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21571) |
Chadwick, David W., Young, Andrew J., Kapidzic Cicovic, Nada (1997) Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model. IEEE Networks Special Publication on Internet Security, 11 (3). pp. 16-24. ISSN 0890-8044. (doi:10.1109/65.587045) (KAR id:21507) |
Chadwick, David W. (1996) Important Lessons Derived from X.500 Case Studies. IEEE Network, 10 (2). pp. 22-34. (KAR id:21380) |
Chadwick, David W. (1996) A Method for Collecting Case Study Information via the Internet. IEEE Network, 10 (2). pp. 36-38. (doi:10.1109/65.486969) (KAR id:21383) |
Chadwick, David W. (1996) The ICE-TEL Public Key Infrastructure and Trust Model. In: DIMACS Workshop on Trust Management, New York, USA. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21301) |
Chadwick, David W. (1996) The Internet Directory is NOT Primarily a Technology Issue. In: INET 96 Conference, Montreal, Canada. . (KAR id:21302) |
Chadwick, David W. (1996) Understanding X.500 (The Directory). International Thompson Publishing (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21300) |
Chadwick, D.W. and Pope, Nick (1994) Interdomain Guardians in a Distributed Directory Service. In: Veiga, P. and Khakhar, D., eds. Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communication. North-Holland Publishing Co., Amsterdam, Netherlands, pp. 347-365. ISBN 0-444-81869-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21149) |
Chadwick, David W. (1992) Distributed Aspects of the 1992 Directory Standard. In: Tzafestas, S. and Borne, P. and Grandinetti, L., eds. Parallel and Distributed Computing in Engineering Systems: Proceedings of the IMACS/IFAC International Symposium on Parallel and Distributed Computing in Engineering Systems. Elsevier, pp. 471-476. ISBN 0-444-89276-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21047) |
Chadwick, David W. (1991) X.500: 1988 v 1992. In: Proceedings of the Electronic Directories Conference, London. . pp. 23-29. Pinner:Blenheim Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21004) |
Chadwick, David W. (1990) The 1992 Directory Standards - implications for earlier implementations of the Directory. In: Colloquium on the Global Directory, London. . IEE (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20970) |
Chadwick, David W. (1990) The Directory and its implications for name registration. In: Proceedings of the Open Systems and Interoperability Conference, London. . Blenheim Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20972) |
Chadwick, David W. (1990) Tutorial on X.500 - The Directory. In: IFIP TCC 3rd Int Conf on Information Network and Data Communication, Lillehammer. . T3-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20973) |
Chadwick, David W. (1989) The Directory - existing services and proposed enhancements. In: Proceedings of the Open Systems 89 Conference (London). . pp. 107-132. Blenheim Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20954) |
Chadwick, David W. (1987) FTAM. The Development of a Commercial Product. In: Proceedings of the Open Systems Conference (London). . Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20932) |
Chadwick, David W. (1986) Issues in the Implementation of Application Layer Standards. In: Proceedings of the Open Systems Conference (London). . Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20920) |
D
Chadwick, David W. and de Decker, Bart, eds. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Springer-Verlag ISBN 3-642-32804-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43202) |
F
Fan, Wenjun (2019) Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud. In: IEEE International Conference on Cyber Security and Cloud Computing. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing. . IEEE E-ISBN 978-1-7281-1661-7. (doi:10.1109/CSCloud/EdgeCom.2019.00-15) (KAR id:74547) |
Fatema, Kaniz (2013) Adding Privacy Protection to Policy Based Authorisation Systems. Doctor of Philosophy (PhD) thesis, University of Kent,. (KAR id:47905) |
Fatema, Kaniz and Chadwick, David W. and van Alsenoy, Brendan (2012) Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. In: Camenisch, Jan and Crispo, Bruno and Fischer-Hübner, Simone and Leenes, Ronald and Russello, Giovanni, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 375 . Springer Boston, pp. 59-72. ISBN 978-3-642-31667-8. (doi:10.1007/978-3-642-31668-5_5) (KAR id:31974) |
Fatema, Kaniz and Chadwick, David W. and Lievens, Stijin F. (2011) A Multi-privacy Policy Enforcement System. In: Fischer-Hubner, Simone and Duquenoy, Penny and Hansen, Marit and Leenes, Ronald and Zhang, Ge, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 352 (2011). Springer, Boston, pp. 297-310. ISBN 978-3-642-20768-6. (doi:10.1007/978-3-642-20769-3_24) (KAR id:31982) |
Ferreira, Ana and Correia, Ricardo and Chadwick, David W. and Santos, Henrique and Gomes, Rut and Reis, Diogo and Antunes, Luis (2010) Password Sharing and How to Reduce It. In: Chryssanthou, Anargyros and Apostolakis, Ioannis and Varlamis, Iraklis, eds. Certification and Security in Health-Related Web Applications: Concepts and Solutions. Premier Reference Source . Medical Information Science Reference, New York, pp. 243-263. ISBN 978-1-61692-897-1. (KAR id:31988) |
Ferreira, Ana, Antunes, Luis, Chadwick, David W., Correi, Ricardo (2010) Grounding Information Security in Healthcare. International Journal of Medical Informatics, 79 (4). pp. 182-196. (doi:10.1016/j.ijmedinf.2010.01.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30670) |
Ferreira, Ana and Chadwick, David W. and Farinha, Pedro and Cruz-Correia, Ricardo and Zhao, Gansen and Chilro, Rui and Antunes, Luis (2009) How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annual Computer Security Applications Conference. IEEE, pp. 23-31. ISBN 978-0-7695-3919-5. (doi:10.1109/ACSAC.2009.12) (KAR id:31989) |
Ferreira, Ana, Chadwick, David W., Antunes, Luis (2007) Modelling Access Control For Healthcare Information Systems. In: Doctoral consortium at 9th International Conference on Enterprise Information Systems (ICEIS2007), 12th-16th June 2007, Funchal, Madeira - Portugal. (KAR id:14579) |
Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Chadwick, David W. (2007) Access Control: how can it improve patients' healthcare? In: Bos, Lodewijk and Blobel, Bernd, eds. Medical and Care Compunetics 4. Studies in Health Technology and Informatics (Volume). IOS Press, Netherlands, pp. 65-76. ISBN 978-1-58603-751-2. (KAR id:14578) |
Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Farinha, P and Oliveira-Palhares, E. and Chadwick, David W. and Costa-Pereira, A. (2006) How to break access control in a controlled manner. In: 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06). Symposium on Computer-Based Medical Systems . IEEE, pp. 847-851. ISBN 978-0-7695-2517-4. (doi:10.1109/CBMS.2006.95) (KAR id:14476) |
Farrell, S. and Chadwick, David W. (2000) Limited Attribute Certificate Acquisition Protocol. University of Salford. (KAR id:22008) |
G
Giubilo, Fabio and Sajjad, Ali and Shackleton, Mark and Chadwick, David W. and Fan, Wenjun and de Lemos, Rogério (2018) An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE. ISBN 978-1-5386-0598-1. E-ISBN 978-1-908320-93-3. (doi:10.23919/ICITST.2017.8356404) (KAR id:65817) |
H
Huth, Carly L, Chadwick, David W, Claycomb, William, You, Ilsun (2013) Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15 (1). pp. 1-4. ISSN 1387-3326. E-ISSN 1572-9419. (doi:10.1007/s10796-013-9419-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43203) |
I
Inman, George, Chadwick, David W. (2010) A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems. Upgrade, XI (1). pp. 182-196. (KAR id:30688) |
Inglesant, Philip, Sasse, M. Angela, Chadwick, David W., Shi, Lei Lei (2008) Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification. In: UNSPECIFIED. (KAR id:24031) |
Inman, George, Chadwick, David W., Klingenstein, Nate (2007) Authorisation using Attribute from Multiple Authorities - A Study of Requirements. In: Proceedings of HCSIT Summit - ePortfolio International Conference. . , Maastricht, The Netherlands (KAR id:14533) |
L
Laborde, Romain, Oglaza, Arnaud, Wazan, Ahmad Samer, Barrere, Francois, Benzekri, Abdelmalek, Chadwick, David W., Venant, Remi (2020) A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). . IEEE ISBN 978-1-7281-3893-0. E-ISBN 978-1-7281-3894-7. (doi:10.1109/CCNC46108.2020.9045440) (KAR id:81365) |
Laborde, Romain, Oglaza, Arnaud, Wazan, Ahmad Samer, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Venant, Remi (2020) Know Your Customer: Opening a new bank account online using UAAF. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). . IEEE ISBN 978-1-7281-3893-0. E-ISBN 978-1-7281-3893-0. (doi:10.1109/CCNC46108.2020.9045148) (KAR id:80303) |
Lopez, Gabriel, Canovas, Oscar, Gomez-Skarmeta, Antonio F., Otenko, Sassa, Chadwick, David W. (2005) A Heterogeneous Network Access Service based on PERMIS and SAML. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (doi:10.1007/11533733_4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14293) |
M
Mbanaso, Uche, Cooper, G.S., Chadwick, David W., Anderson, Anne (2009) Obligations of Trust for Privacy and Confidentiality in Distributed Transactions. Internet Research, 19 (2). pp. 182-196. (doi:10.1108/10662240910952328) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30610) |
Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Anderson, Anne (2007) Obligations for Privacy and Confidentiality in Distributed Transactions. In: Denko, Mieso K., ed. Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops. Lecture Notes In Computer Science . Springer, Berlin, Germany, pp. 69-81. ISBN 978-3-540-77089-3. E-ISBN 978-3-540-77090-9. (doi:10.1007/978-3-540-77090-9_7) (KAR id:14525) |
Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Proctor, S. (2006) Privacy Preserving Trust Authorization Framework Using XACML. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06). IEEE, pp. 673-678. ISBN 0-7695-2593-8. (doi:10.1109/WOWMOM.2006.92) (KAR id:14477) |
Mundy, Darren, Chadwick, David W., Ball, E. (2004) Some expectations and perceptions of electronic transfer of prescription systems. British Journal of Health Care Computing and Information Management, March 2004, 22 (2). pp. 34-38. (KAR id:14198) |
Mundy, Darren and Chadwick, David W. (2004) Secure Knowledge Management. In: Wickramasinghe, Nilmini and Gupta, Jatinder N. D. and Sharma, Sushil K., eds. Creating Knowledge Based Health Care Organizations. Idea Publishing Group, pp. 321-337. (KAR id:14208) |
Mundy, Darren, Chadwick, David W. (2004) Electronic Transmission of Prescriptions - Towards Realising the Dream. International Journal of Electronic Healthcare, 1 (1). pp. 112-125. ISSN 1741-8453. (doi:10.1504/IJEH.2004.004659) (KAR id:14027) |
Mundy, Darren, Chadwick, David W. (2004) An XML Alternative for Performance and Security: ASN.1. IEEE IT Professional, 6 (1). pp. 30-36. ISSN 1520-9202. (doi:10.1109/MITP.2004.1265540) (KAR id:14031) |
Mundy, Darren, Chadwick, David W. (2003) The Benefits in and Barriers towards the Implementation of Electronic Transfer of Prescriptions within the United Kingdom National Health Service. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick, UK. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13900) |
Mundy, Darren, Chadwick, David W., Ball, E., Marsden, Paul K., Bell, C., Whatley, J.E, Sobreperez, P., New, John (2003) Towards Electronic Transfer of Prescriptions (ETP) in the United Kingdom National Health Service - Stakeholder Evaluation of ETP Pilots. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13909) |
Mundy, Darren, Chadwick, David W., Ball, E. (2003) An Application Programming Interface for the Electronic Transmission of Prescriptions. In: Proceedings of the International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmeaunu, Germany, May 22-24 2003. . pp. 27-38. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13975) |
Mundy, Darren, Chadwick, David W. (2003) Comparing the Performance of Abstract Syntax Notation One (ASN.1) vs eXtensible Markup Language (XML). In: Terena Networking Conference, Zagreb. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13983) |
Mundy, Darren, Chadwick, David W. (2003) Security issues in the electronic transfer of prescriptions. Medical Informatics and the Internet in Medicine, 28 (4). pp. 253-277. ISSN 1463-9238. (doi:10.1080/14639230310001621675) (KAR id:13834) |
Mundy, Darren, Chadwick, David W. (2002) A System for Secure Electronic Prescription Handling. In: Proc of The Hospital of the Future, Second International Conference On The Management Of Healthcare And Medical Technology, Illinois Institute of Technology, Chicago, Illinois, USA. . (KAR id:13770) |
Ma, Y., Chadwick, David W. (1996) Implementation of a Mechanism in the OSI Directory. Minimicro Systems (China), 17 (7). pp. 5-10. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21305) |
N
Nguyen, Tuan Anh and Chadwick, David W. and Nasser, Bassem (2007) Recognition of Authority in Virtual Organisations. In: Trust, Privacy and Security in Digital Business 4th International Conference. Lecture Notes In Computer Science . Springer, Berlin, Germany, pp. 3-13. ISBN 978-3-540-74408-5. E-ISBN 978-3-540-74409-2. (doi:10.1007/978-3-540-74409-2_3) (KAR id:14542) |
Nguyen, Tuan Anh and Su, Linying and Inman, George and Chadwick, David W. (2007) Flexible and Manageable Delegation of Authority in RBAC. In: 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE, pp. 453-458. ISBN 978-0-7695-2847-2. (doi:10.1109/AINAW.2007.187) (KAR id:14589) |
O
Onions, Robert, Chadwick, David W. (2004) Small and medium enterprises at risk in the United Kingdom. In: Digital Accounting Research Conference, Facultad De Ciencias Empresariales, University Of Huelva, 11 Plaza De La Merced, Huelva (Spain). . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14071) |
P
Pérez Méndez, Alejandro, López Millán, Gabriel, Marín López, Rafael, Chadwick, David W., Schechtman Sette, Ioram (2017) Integrating an AAA-based federation mechanism for OpenStack - The CLASSe view. Concurrency and Computation: Practice and Experience, 29 (12). Article Number 4148. ISSN 1532-0626. (doi:10.1002/cpe.4148) (KAR id:61206) |
Pawar, Pramod, Sajjad, Ali, Dimitrakos, Theo, Chadwick, David W. (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. In: Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology (1). pp. 251-261. Springer International Publishing ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_21) (KAR id:48730) |
Pawar, Pramod, Sajjad, Ali, Chadwick, David W., Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: UNSPECIFIED. (doi:10.1007/978-3-319-18491-3_21) (KAR id:56874) |
S
Sette, Ioram S., Chadwick, David W., Ferraz, Carlos A. G. (2017) Authorization Policy Federation in Heterogeneous Multicloud Environments. IEEE Cloud Computing, 4 (4). pp. 38-47. ISSN 2325-6095. (doi:10.1109/MCC.2017.3791018) (KAR id:64214) |
Shi, Leilei and Chadwick, David W. (2011) A controlled natural language interface for authoring access control policies. In: Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, New York, USA, pp. 1524-1530. ISBN 978-1-4503-0113-8. (doi:10.1145/1982185.1982510) (KAR id:31980) |
Sinnott, Richard O. and Chadwick, David W. and Doherty, T. and Martin, D. and Stell, A.J. and Stewart, G. and Su, Linying and Watt, J. (2008) Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. In: 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID). IEEE, pp. 106-113. ISBN 978-1-4244-4237-9. (doi:10.1109/CCGRID.2008.67) (KAR id:24029) |
Sinnott, Richard O. and Chadwick, David W. and Koetsier, J. and Otenko, O. and Watt, J. and Nguyen, Tuan Anh (2006) Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid. In: 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06). International Conference on e-Science and Grid Computing . IEEE, p. 22. ISBN 0-7695-2734-5. (doi:10.1109/E-SCIENCE.2006.261106) (KAR id:14386) |
Sinnott, Richard O., Stell, A.J., Watt, J., Chadwick, David W. (2006) Advanced Security Infrastructures for Grid Education. In: Proceedings of the 10th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2006. . (KAR id:14447) |
Su, Linying and Chadwick, David W. and Basden, Andrew and Cunningham, James (2005) Automated Decomposition of Access Control Policies. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05). IEEE, pp. 3-13. ISBN 0-7695-2265-3. (doi:10.1109/POLICY.2005.10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14312) |
Sinnott, Richard O. and Stell, A.J. and Chadwick, David W. and Otenko, O. (2005) Experiences of Applying Advanced Grid Authorisation Infrastructures. In: Advances in Grid Computing - EGC 2005 European Grid Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-274. ISBN 978-3-540-26918-2. E-ISBN 978-3-540-32036-4. (doi:10.1007/11508380_28) (KAR id:14357) |
Sinnott, Richard O., Chadwick, David W. (2004) Experiences of Using the GGF SAML AuthZ Interface. In: Proceedings of the UK e-Science All Hands Meeting. . , Nottingham, UK (KAR id:14087) |
W
Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek (2017) TLS Connection Validation by Web Browsers: Why do Web Browsers still not agree? In: Compsac -New York-. 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). . Institute of Electrical and Electronics Engineers (IEEE) ISBN 978-1-5386-0367-3. (doi:10.1109/COMPSAC.2017.240) (KAR id:62572) |
Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Habbal, Abid M.M., Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:10.1155/2017/6907146) (KAR id:60311) |
Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek (2016) How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN). IEEE, pp. 531-534. ISBN 978-1-5090-2055-3. E-ISBN 978-1-5090-2054-6. (doi:10.1109/LCN.2016.85) (KAR id:62570) |
Watt, John and Sinnott, Richard O. and Inman, George and Chadwick, David (2011) Federated Authentication and Authorisation in the Social Science Domain. In: 2011 Sixth International Conference on Availability, Reliability and Security. IEEE, pp. 541-548. ISBN 978-1-4577-0979-1. (doi:10.1109/ARES.2011.83) (KAR id:31978) |
Wilson, Michael, Arenas, Alvaro, Chadwick, David W., Dimitrakos, Theo, Doser, Jurgen, Giambiagi, Pablo, Golby, David, Geuer-Pollman, Christian, Haller, Jochen, Ketil, Stølen and others. (2006) The TrustCoM approach to enforcing agreements between interoperating enterprises. In: Interoperability for Enterprise Software and Applications Conference (I-ESA'06). . pp. 365-375. , Bordeaux, France (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14497) |
X
Xu, Wensheng, Chadwick, David W., Otenko, Sassa (2005) A PKI Based Secure Audit Web Server. In: IASTED Communications, Network and Information and CNIS. . , Phoenix, USA (KAR id:14230) |
Xu, Wensheng, Chadwick, David W., Otenko, Sassa (2005) Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (doi:10.1007/11533733_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14295) |
Y
Young, Andrew J., Chadwick, David W., New, John (2001) Providing secure remote access to legacy applications. IEE Computing and Control Engineering Journal, 12 (4). pp. 148-156. ISSN 0956-3385. (KAR id:13581) |
Young, Andrew J. and Kapidzic Cicovic, Nada and Chadwick, David W. (1997) Trust Models in ICE-TEL. In: Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security. IEEE, pp. 122-133. ISBN 0-8186-7767-8. (doi:10.1109/NDSS.1997.579230) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21535) |
Z
Zhao, Gansen and Chadwick, David W. (2008) On the Modeling of Bell-LaPadula Security Policies using RBAC. In: 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE. ISBN 978-0-7695-3315-5. (doi:10.1109/WETICE.2008.34) (KAR id:24030) |
Zhang, Nien Fan, Yao, L., Nenadic, A., Chin, J., Goble, C., Rector, A., Chadwick, David W., Otenko, Sassa, Shi, Q. (2007) Achieving Fine-grained Access Control in Virtual Organisations. Concurrency and Computation: Practice and Experience, 19 (9). pp. 1333-1352. ISSN 1532-0626. (doi:10.1002/cpe.1099) (KAR id:14581) |
Zhao, Gansen, Chadwick, David W., Otenko, Sassa (2007) Obligation for Role Based Access Control. In: IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS07). . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:23994) |
Zhao, Gansen and Otenko, Sassa and Chadwick, David W. (2006) Distributed Key Management for Secure Role Based Messaging. In: 20th International Conference on Advanced Information Networking and Applications. IEEE, pp. 132-137. ISBN 0-7695-2466-4. (doi:10.1109/AINA.2006.146) (KAR id:14484) |
Zhao, Gansen, Chadwick, David W. (2005) Evolving Messaging Systems for Secure Role Based Messaging. In: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems. . pp. 216-223. IEEE Computer Society ISBN 0-7695-2284-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14321) |
Zhao, Gansen and Chadwick, David W. (2005) Trust Infrastructure for Policy based Messaging In Open Environments. In: 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05). IEEE Computer Society, Washington, DC, USA, pp. 144-149. ISBN 0-7695-2362-5. (doi:10.1109/WETICE.2005.60) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14322) |