Paul Ashley

According to our database1, Paul Ashley authored at least 19 papers between 1998 and 2004.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2004
Enforcement of a P3P Privacy Policy.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

2002
E-P3P privacy policies and privacy authorization.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Secure Client Agent Environment (SCAE) for World Wide Web.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

2001
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
Proceedings of the Information Security and Cryptology, 2001

Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Applying authorization to intranets: architectures, issues and APIs.
Comput. Commun., 2000

Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.).
Comput. Commun., 2000

Cross-domain one-shot authorization using smart cards.
Proceedings of the CCS 2000, 2000

A Three-Party HTTP Proxy to Support Internet Content Regulation.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Towards a New Authorisation Paradigm for Extranets.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
An Implementation of a Secure Version of NFS including REBAC.
Aust. Comput. J., 1999

Using SESAME to Implement Role-Based Access Control in Unix File Systems.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

The Intranet Authorization Paradigm.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

Using SESAME to Secure Web Based Applications on an Intranet.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

An Implementation of a Secure Version of NFS Including RBAC.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Using SESAME's GSS-API to add Security to Unix Applications.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Enhancing SESAMEV4 with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

A Uniform Approach to Securing Unix Applications Using SESAME.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...