Mark Vandenwauver

According to our database1, Mark Vandenwauver authored at least 17 papers between 1997 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
The psychology of password management: a tradeoff between security and convenience.
Behav. Inf. Technol., 2010

2006
Identifying Patterns of Federation Adoption.
Proceedings of the ISSE 2006, 2006

2001
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Applying authorization to intranets: architectures, issues and APIs.
Comput. Commun., 2000

EWS-A Case Study on Access Control in Workflow Systems.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

1999
An Implementation of a Secure Version of NFS including REBAC.
Aust. Comput. J., 1999

Why Enterprises Need More than Firewalls and Intrusion Detection Systems.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

Using SESAME to Implement Role-Based Access Control in Unix File Systems.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

The Intranet Authorization Paradigm.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

Using SESAME to Secure Web Based Applications on an Intranet.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

An Implementation of a Secure Version of NFS Including RBAC.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Setting up a Secure Web Server and Clients on an Intranet.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Using SESAME's GSS-API to add Security to Unix Applications.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Enhancing SESAMEV4 with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

A Uniform Approach to Securing Unix Applications Using SESAME.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
How Role Based Access Control is Implemented in SESAME.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Securing Internet Electronic Mail.
Proceedings of the State of the Art in Applied Cryptography, 1997


  Loading...