David W. Chadwick

Orcid: 0000-0003-3145-055X

Affiliations:
  • University of Kent, UK


According to our database1, David W. Chadwick authored at least 117 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Establishing Trust in SSI Verifiers.
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023

2022
On the Validation of Web X.509 Certificates by TLS Interception Products.
IEEE Trans. Dependable Secur. Comput., 2022

A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN.
Proceedings of the Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022., 2022

2021
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Know Your Customer: Opening a new bank account online using UAAF.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Improved Identity Management with Verifiable Credentials and FIDO.
IEEE Commun. Stand. Mag., 2019

Mapeamentos Sintático e Semântico em Federações de Políticas de Autorização para Nuvens Heterogêneas.
Proceedings of the XXXVII Brazilian Symposium on Computer Networks and Distributed Systems, 2019

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017

Integrating an AAA-based federation mechanism for OpenStack - The CLASSe view.
Concurr. Comput. Pract. Exp., 2017

Authorization Policy Federation in Heterogeneous Multicloud Environments.
IEEE Cloud Comput., 2017

An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Boosting Usability for Protecting Online Banking Applications Against APTs.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Security-as-a-Service in Multi-cloud and Federated Cloud Environments.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

2014
Self-adaptive federated authorization infrastructures.
J. Comput. Syst. Sci., 2014

Adding Federated Identity Management to OpenStack.
J. Grid Comput., 2014

Resolving Policy Conflicts - Integrating Policies from Multiple Authors.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

2013
My private cloud - granting federated access to cloud resources.
J. Cloud Comput., 2013

Guest editorial: A brief overview of data leakage and insider threats.
Inf. Syst. Frontiers, 2013

Use of Role Based Access Control for Security-Purpose Hypervisors.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Towards Automated Trust Establishment in Federated Identity Management.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.
Proceedings of the Information Assurance and Security Education and Training, 2013

Enabling the Autonomic Management of Federated Identity Providers.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A privacy preserving authorisation system for the cloud.
J. Comput. Syst. Sci., 2012

F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012 Workshops, 2012

2011
A controlled natural language interface for authoring access control policies.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Extracting Access Control and Conflict Resolution Policies from European Data Protection Law.
Proceedings of the Privacy and Identity Management for Life, 2011

Ontology Based Interoperation for Securely Shared Services: Security Concept Matching for Authorization Policy Interoperability.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Leveraging social networks to gain access to organisational resources.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

Federated Authentication and Authorisation in the Social Science Domain.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Instant certificate revocation and publication using WebDAV.
J. Comput. Secur., 2010

Grounding information security in healthcare.
Int. J. Medical Informatics, 2010

A conceptual model for attribute aggregation.
Future Gener. Comput. Syst., 2010

A Multi-privacy Policy Enforcement System.
Proceedings of the Privacy and Identity Management for Life, 2010

Access Control in Healthcare: the methodology from legislation to practice.
Proceedings of the MEDINFO 2010, 2010

CardSpace in the cloud.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Obligations of trust for privacy and confidentiality in distributed transactions.
Internet Res., 2009

Adding support to XACML for multi-domain user to user dynamic delegation of authority.
Int. J. Inf. Sec., 2009

Attribute Aggregation in Federated Identity Management.
Computer, 2009

Which Web Browsers Process SSL Certificates in a Standardized Way?
Proceedings of the Emerging Challenges for Security, 2009

FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices.
Proceedings of the IDtrust 2009, 2009

Aggregating policies in user centric, real-time and distributed applications.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

An advanced policy based authorisation infrastructure.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
PERMIS: a modular authorization infrastructure.
Concurr. Comput. Pract. Exp., 2008

Coordinating access control in grid services.
Concurr. Comput. Pract. Exp., 2008

On the Modeling of Bell-LaPadula Security Policies Using RBAC.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

Expressions of expertness: the virtuous circle of natural language for access control policy specification.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Enforcing "sticky" security policies throughout a distributed application.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Federated Identity Management.
Proceedings of the Foundations of Security Analysis and Design V, 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2007
Coordinated decision making in distributed applications.
Inf. Secur. Tech. Rep., 2007

Achieving fine-grained access control in virtual organizations.
Concurr. Comput. Pract. Exp., 2007

Recognition of Authority in Virtual Organisations.
Proceedings of the Trust, 2007

Multi-session Separation of Duties (MSoD) for RBAC.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Using WebDAV for Improved Certificate Revocation and Publication.
Proceedings of the Public Key Infrastructure, 2007

Obligations for Privacy and Confidentiality in Distributed Transactions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Obligations for Role Based Access Control.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Flexible and Manageable Delegation of Authority in RBAC.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Privacy Preserving Trust Authorization Framework Using XACML.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Authorisation Using Attributes from Multiple Authorities.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

Coordination between Distributed PDPs.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Providing secure coordinated access to grid services.
Proceedings of the 4th international workshop on Middleware for grid computing, 2006

The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises.
Proceedings of the Enterprise Interoperability, 2006

Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.
Proceedings of the Communications and Multimedia Security, 2006

How to Break Access Control in a Controlled Manner.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Distributed Key Management for Secure Role based Messaging.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists.
Softw. Pract. Exp., 2005

Authorisation in Grid computing.
Inf. Secur. Tech. Rep., 2005

Trust Infrastructure for Policy based Messaging In Open Environments.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), 2005

Automated Decomposition of Access Control Policies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Operational Models for Reputation Servers.
Proceedings of the Trust Management, Third International Conference, 2005

Evolving Messaging Systems for Secure Role Based Messaging.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server.
Proceedings of the Public Key Infrastructure, 2005

A Heterogeneous Network Access Service Based on PERMIS and SAML.
Proceedings of the Public Key Infrastructure, 2005

Experiences of Applying Advanced Grid Authorisation Infrastructures.
Proceedings of the Advances in Grid Computing, 2005

2004
An XML Alternative for Performance and Security: ASN.1.
IT Prof., 2004

Electronic transmission of prescriptions: towards realising the dream.
Int. J. Electron. Heal., 2004

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.
Proceedings of the Communications and Multimedia Security, 2004

Secure Role Based Messaging.
Proceedings of the Communications and Multimedia Security, 2004

2003
Role-Based Access Control With X.509 Attribute Certificates.
IEEE Internet Comput., 2003

Patient Privacy in Electronic Prescription Transfer.
IEEE Secur. Priv., 2003

The PERMIS X.509 role based privilege management infrastructure.
Future Gener. Comput. Syst., 2003

Experiences of using a PKI to access a hospital information system by high street opticians.
Comput. Commun., 2003

Deficiencies in LDAP when used to support PKI.
Commun. ACM, 2003

Policy Based Electronic Transmission of Prescriptions.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Modifying LDAP to Support PKI.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Persistent versus Dynamic Role Membership.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
RBAC Policies in XML for X.509 Based Privilege Management.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure.
Expert Syst. J. Knowl. Eng., 2001

Evaluating Trust in a Public Key Certification Authority.
Comput. Secur., 2001

Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition.
Proceedings of the International Conference on Internet Computing, 2001

2000
Experiences of using a public key infrastructure for the preparation of examination papers.
Comput. Educ., 2000

1999
Smart Cards Aren't Always the Smart Choice.
Computer, 1999

1998
Enabling the Internet White Pages Service - the Directory Guardian.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
Managing the X.500 Root Naming Context.
RFC, March, 1997

Merging and extending the PGP and PEM trust models-the ICE-TEL trust model.
IEEE Netw., 1997

Trust Models in ICE-TEL.
Proceedings of the Network and Distributed System Security Symposium, 1997

1996
A method for collecting case study information via the Internet.
IEEE Netw., 1996

Important lessons derived from X.500 case studies.
IEEE Netw., 1996

1994
Interdomain Guardians in a Distributed Directory Service.
Proceedings of the Information Networks and Data Communication, 1994

Understanding X.500 - the directory.
Chapman and Hall, ISBN: 978-0-412-43020-6, 1994

1993
Simulating The Global Directory Service With OPNET.
Proceedings of the Proceedings 26th Annual Simulation Symposium, ANSS 1993, 1993


  Loading...