David W. Chadwick

According to our database1, David W. Chadwick
  • authored at least 96 papers between 1993 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Security and Communication Networks, 2017

Integrating an AAA-based federation mechanism for OpenStack - The CLASSe view.
Concurrency and Computation: Practice and Experience, 2017

Authorization Policy Federation in Heterogeneous Multicloud Environments.
IEEE Cloud Computing, 2017

An architecture for privacy-preserving sharing of CTI with 3rd party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
Security-as-a-Service in Multi-cloud and Federated Cloud Environments.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

2014
Self-adaptive federated authorization infrastructures.
J. Comput. Syst. Sci., 2014

Adding Federated Identity Management to OpenStack.
J. Grid Comput., 2014

Resolving Policy Conflicts - Integrating Policies from Multiple Authors.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

2013
My private cloud - granting federated access to cloud resources.
J. Cloud Computing, 2013

Guest editorial: A brief overview of data leakage and insider threats.
Information Systems Frontiers, 2013

Use of Role Based Access Control for Security-Purpose Hypervisors.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Towards Automated Trust Establishment in Federated Identity Management.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.
Proceedings of the Information Assurance and Security Education and Training, 2013

Enabling the Autonomic Management of Federated Identity Providers.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A privacy preserving authorisation system for the cloud.
J. Comput. Syst. Sci., 2012

F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012 Workshops, 2012

2011
A controlled natural language interface for authoring access control policies.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Extracting Access Control and Conflict Resolution Policies from European Data Protection Law.
Proceedings of the Privacy and Identity Management for Life, 2011

Ontology Based Interoperation for Securely Shared Services: Security Concept Matching for Authorization Policy Interoperability.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Leveraging social networks to gain access to organisational resources.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

Federated Authentication and Authorisation in the Social Science Domain.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Instant certificate revocation and publication using WebDAV.
Journal of Computer Security, 2010

Grounding information security in healthcare.
I. J. Medical Informatics, 2010

A conceptual model for attribute aggregation.
Future Generation Comp. Syst., 2010

A Multi-privacy Policy Enforcement System.
Proceedings of the Privacy and Identity Management for Life, 2010

Access Control in Healthcare: the methodology from legislation to practice.
Proceedings of the MEDINFO 2010, 2010

CardSpace in the cloud.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Obligations of trust for privacy and confidentiality in distributed transactions.
Internet Research, 2009

Adding support to XACML for multi-domain user to user dynamic delegation of authority.
Int. J. Inf. Sec., 2009

Attribute Aggregation in Federated Identity Management.
IEEE Computer, 2009

Which Web Browsers Process SSL Certificates in a Standardized Way?
Proceedings of the Emerging Challenges for Security, 2009

Aggregating policies in user centric, real-time and distributed applications.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

An advanced policy based authorisation infrastructure.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
PERMIS: a modular authorization infrastructure.
Concurrency and Computation: Practice and Experience, 2008

Coordinating access control in grid services.
Concurrency and Computation: Practice and Experience, 2008

On the Modeling of Bell-LaPadula Security Policies Using RBAC.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

Expressions of expertness: the virtuous circle of natural language for access control policy specification.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Enforcing "sticky" security policies throughout a distributed application.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Federated Identity Management.
Proceedings of the Foundations of Security Analysis and Design V, 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2007
Achieving fine-grained access control in virtual organizations.
Concurrency and Computation: Practice and Experience, 2007

Recognition of Authority in Virtual Organisations.
Proceedings of the Trust, 2007

Multi-session Separation of Duties (MSoD) for RBAC.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Using WebDAV for Improved Certificate Revocation and Publication.
Proceedings of the Public Key Infrastructure, 2007

Obligations for Privacy and Confidentiality in Distributed Transactions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Obligations for Role Based Access Control.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Flexible and Manageable Delegation of Authority in RBAC.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Privacy Preserving Trust Authorization Framework Using XACML.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Authorisation Using Attributes from Multiple Authorities.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

Coordination between Distributed PDPs.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Providing secure coordinated access to grid services.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises.
Proceedings of the Enterprise Interoperability, 2006

Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.
Proceedings of the Communications and Multimedia Security, 2006

How to Break Access Control in a Controlled Manner.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Distributed Key Management for Secure Role based Messaging.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists.
Softw., Pract. Exper., 2005

Trust Infrastructure for Policy based Messaging In Open Environments.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), 2005

Automated Decomposition of Access Control Policies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Operational Models for Reputation Servers.
Proceedings of the Trust Management, Third International Conference, 2005

Evolving Messaging Systems for Secure Role Based Messaging.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server.
Proceedings of the Public Key Infrastructure, 2005

A Heterogeneous Network Access Service Based on PERMIS and SAML.
Proceedings of the Public Key Infrastructure, 2005

Experiences of Applying Advanced Grid Authorisation Infrastructures.
Proceedings of the Advances in Grid Computing, 2005

2004
An XML Alternative for Performance and Security: ASN.1.
IT Professional, 2004

Electronic transmission of prescriptions: towards realising the dream.
IJEH, 2004

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.
Proceedings of the Communications and Multimedia Security, 2004

Secure Role Based Messaging.
Proceedings of the Communications and Multimedia Security, 2004

2003
Role-Based Access Control With X.509 Attribute Certificates.
IEEE Internet Computing, 2003

Patient Privacy in Electronic Prescription Transfer.
IEEE Security & Privacy, 2003

The PERMIS X.509 role based privilege management infrastructure.
Future Generation Comp. Syst., 2003

Experiences of using a PKI to access a hospital information system by high street opticians.
Computer Communications, 2003

Policy Based Electronic Transmission of Prescriptions.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Modifying LDAP to Support PKI.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Persistent versus Dynamic Role Membership.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
RBAC Policies in XML for X.509 Based Privilege Management.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

The PERMIS X.509 role based privilege management infrastructure.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure.
Expert Systems, 2001

Evaluating Trust in a Public Key Certification Authority.
Computers & Security, 2001

Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition.
Proceedings of the International Conference on Internet Computing, 2001

2000
Experiences of using a public key infrastructure for the preparation of examination papers.
Computers & Education, 2000

1998
Enabling the Internet White Pages Service - the Directory Guardian.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
Trust Models in ICE-TEL.
Proceedings of the Network and Distributed System Security Symposium, 1997

1994
Understanding X.500 - the directory.
Chapman and Hall, ISBN: 978-0-412-43020-6, 1994

1993
Simulating The Global Directory Service With OPNET.
Proceedings of the Proceedings 26th Annual Simulation Symposium, ANSS 1993, 1993


  Loading...