David W Chadwick
David W Chadwick
Professor of Information Systems Security, University of Kent
Verified email at kent.ac.uk - Homepage
TitleCited byYear
The PERMIS X. 509 role based privilege management infrastructure
DW Chadwick, A Otenko
Proceedings of the seventh ACM symposium on Access control models and …, 2002
6632002
Role-based access control with X. 509 attribute certificates
D Chadwick, A Otenko, E Ball
IEEE Internet Computing 7 (2), 62-69, 2003
2732003
The PERMIS X. 509 role based privilege management infrastructure
DW Chadwick, A Otenko
Future Generation Computer Systems 19 (2), 277-289, 2003
2512003
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
O Scekic, HL Truong, S Dustdar
Communications of the ACM 56 (6), 72-82, 0
165*
Federated identity management
DW Chadwick
Foundations of security analysis and design V, 96-120, 2009
1352009
How to break access control in a controlled manner
A Ferreira, R Cruz-Correia, L Antunes, P Farinha, E Oliveira-Palhares, ...
Computer-Based Medical Systems, 2006. CBMS 2006. 19th IEEE International …, 2006
1332006
Understanding X. 500: the directory
D Chadwick
Chapman & Hall, Ltd., 1994
1221994
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
1172008
RBAC policies in XML for X. 509 based privilege management
DW Chadwick, A Otenko
Security in the Information Society, 39-53, 2002
1072002
A privacy preserving authorisation system for the cloud
DW Chadwick, K Fatema
Journal of Computer and System Sciences 78 (5), 1359-1373, 2012
1062012
How to securely break into RBAC: the BTG-RBAC model
A Ferreira, D Chadwick, P Farinha, R Correia, G Zao, R Chilro, L Antunes
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 23-31, 2009
1052009
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model
DW Chadwick, AJ Young, NK Cicovic
IEEE Network 11 (3), 16-24, 1997
751997
Access Control: how can it improve patients’ healthcare?
A FERREIRAabd, CC Ricardo, L Antunes, D Chadwick
Medical and Care Compunetics 4 127, 65, 2007
692007
Adding federated identity management to openstack
DW Chadwick, K Siu, C Lee, Y Fouillat, D Germonville
Journal of Grid Computing 12 (1), 3-27, 2014
672014
Attribute aggregation in federated identity management
DW Chadwick, G Inman
Computer 42 (5), 33-40, 2009
602009
Use of SAML for OGSA Authorization
V Welch, R Ananthakrishnan, F Siebenlist, D Chadwick, S Meder, ...
Global Grid Forum, 2004
522004
Using the Internet to access confidential patient records: a case study
DW Chadwick, PJ Crook, AJ Young, DM McDowell, TL Dornan, JP New
Bmj 321 (7261), 612-614, 2000
522000
Authorisation in Grid computing
D Chadwick
Information Security Technical Report 10 (1), 33-40, 2005
492005
Expressions of expertness: the virtuous circle of natural language for access control policy specification
P Inglesant, MA Sasse, D Chadwick, LL Shi
Proceedings of the 4th symposium on Usable privacy and security, 77-88, 2008
482008
‘R‐What?’Development of a role‐based access control policy‐writing tool for e‐Scientists
S Brostoff, MA Sasse, D Chadwick, J Cunningham, U Mbanaso, S Otenko
Software: Practice and Experience 35 (9), 835-856, 2005
462005
The system can't perform the operation now. Try again later.
Articles 1–20