The PERMIS X. 509 role based privilege management infrastructure DW Chadwick, A Otenko Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 743 | 2002 |
Role-based access control with X. 509 attribute certificates D Chadwick, A Otenko, E Ball IEEE Internet Computing 7 (2), 62-69, 2003 | 324 | 2003 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. O Scekic, HL Truong, S Dustdar Communications of the ACM 56 (6), 72-82, 0 | 323* | |
Federated identity management DW Chadwick Foundations of security analysis and design V, 96-120, 2009 | 257 | 2009 |
How to break access control in a controlled manner A Ferreira, R Cruz-Correia, L Antunes, P Farinha, E Oliveira-Palhares, ... 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06), 847-854, 2006 | 164 | 2006 |
A privacy preserving authorisation system for the cloud DW Chadwick, K Fatema Journal of Computer and System Sciences 78 (5), 1359-1373, 2012 | 160 | 2012 |
How to securely break into RBAC: the BTG-RBAC model A Ferreira, D Chadwick, P Farinha, R Correia, G Zao, R Chilro, L Antunes 2009 Annual Computer Security Applications Conference, 23-31, 2009 | 147 | 2009 |
Understanding X. 500 (The Directory) DW Chadwick International Thompson Publishing, 1996 | 143 | 1996 |
PERMIS: a modular authorization infrastructure D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008 | 130 | 2008 |
A cloud-edge based data security architecture for sharing and analyzing cyber threat information David W Chadwick, Wenjun Fan, Gianpiero Constantino, Rogerio De Lemos ... Future Generation Computer Systems 102, 710-722, 2020 | 111 | 2020 |
RBAC policies in XML for X. 509 based privilege management DW Chadwick, A Otenko Security in the Information Society, 39-53, 2002 | 111 | 2002 |
Attribute aggregation in federated identity management DW Chadwick, G Inman Computer 42 (5), 33-40, 2009 | 85 | 2009 |
Adding federated identity management to openstack DW Chadwick, K Siu, C Lee, Y Fouillat, D Germonville Journal of Grid Computing 12 (1), 3-27, 2014 | 83 | 2014 |
Access Control: how can it improve patients’ healthcare? A FERREIRAabd, CC Ricardo, L Antunes, D Chadwick Medical and care compunetics 4 (4), 65, 2007 | 81 | 2007 |
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model DW Chadwick, AJ Young, NK Cicovic IEEE Network 11 (3), 16-24, 1997 | 81 | 1997 |
Expressions of expertness: the virtuous circle of natural language for access control policy specification P Inglesant, MA Sasse, D Chadwick, LL Shi Proceedings of the 4th symposium on Usable privacy and security, 77-88, 2008 | 63 | 2008 |
Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security models RO Sinnott, DW Chadwick, T Doherty, D Martin, A Stell, G Stewart, L Su, ... 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid …, 2008 | 62 | 2008 |
Use of SAML for OGSA Authorization V Welch, R Ananthakrishnan, F Siebenlist, D Chadwick, S Meder, ... Global Grid Forum, 2004 | 61 | 2004 |
Guest editorial: A brief overview of data leakage and insider threats CL Huth, DW Chadwick, WR Claycomb, I You Information Systems Frontiers 15 (1), 1-4, 2013 | 56 | 2013 |
Using the Internet to access confidential patient records: a case study DW Chadwick, PJ Crook, AJ Young, DM McDowell, TL Dornan, JP New Bmj 321 (7261), 612-614, 2000 | 56 | 2000 |