David W Chadwick
David W Chadwick
Emeritus Professor, University of Kent. CEO Truetrust Ltd
Verified email at - Homepage
Cited by
Cited by
The PERMIS X. 509 role based privilege management infrastructure
DW Chadwick, A Otenko
Proceedings of the seventh ACM symposium on Access control models and …, 2002
Role-based access control with X. 509 attribute certificates
D Chadwick, A Otenko, E Ball
IEEE Internet Computing 7 (2), 62-69, 2003
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
O Scekic, HL Truong, S Dustdar
Communications of the ACM 56 (6), 72-82, 0
Federated identity management
DW Chadwick
Foundations of security analysis and design V, 96-120, 2009
How to break access control in a controlled manner
A Ferreira, R Cruz-Correia, L Antunes, P Farinha, E Oliveira-Palhares, ...
19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06), 847-854, 2006
A privacy preserving authorisation system for the cloud
DW Chadwick, K Fatema
Journal of Computer and System Sciences 78 (5), 1359-1373, 2012
Understanding X. 500 (The Directory)
DW Chadwick
International Thompson Publishing, 1996
How to securely break into RBAC: the BTG-RBAC model
A Ferreira, D Chadwick, P Farinha, R Correia, G Zao, R Chilro, L Antunes
2009 Annual Computer Security Applications Conference, 23-31, 2009
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
A cloud-edge based data security architecture for sharing and analyzing cyber threat information
David W Chadwick, Wenjun Fan, Gianpiero Constantino, Rogerio De Lemos ...
Future Generation Computer Systems 102, 710-722, 2020
RBAC policies in XML for X. 509 based privilege management
DW Chadwick, A Otenko
Security in the Information Society, 39-53, 2002
Attribute aggregation in federated identity management
DW Chadwick, G Inman
Computer 42 (5), 33-40, 2009
Adding federated identity management to openstack
DW Chadwick, K Siu, C Lee, Y Fouillat, D Germonville
Journal of Grid Computing 12 (1), 3-27, 2014
Access Control: how can it improve patients’ healthcare?
A FERREIRAabd, CC Ricardo, L Antunes, D Chadwick
Medical and care compunetics 4 (4), 65, 2007
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model
DW Chadwick, AJ Young, NK Cicovic
IEEE Network 11 (3), 16-24, 1997
Expressions of expertness: the virtuous circle of natural language for access control policy specification
P Inglesant, MA Sasse, D Chadwick, LL Shi
Proceedings of the 4th symposium on Usable privacy and security, 77-88, 2008
Use of SAML for OGSA Authorization
V Welch, R Ananthakrishnan, F Siebenlist, D Chadwick, S Meder, ...
Global Grid Forum, 2004
Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security models
RO Sinnott, DW Chadwick, T Doherty, D Martin, A Stell, G Stewart, L Su, ...
2008 Eighth IEEE International Symposium on Cluster Computing and the Grid …, 2008
Guest editorial: A brief overview of data leakage and insider threats
CL Huth, DW Chadwick, WR Claycomb, I You
Information Systems Frontiers 15 (1), 1-4, 2013
Using the Internet to access confidential patient records: a case study
DW Chadwick, PJ Crook, AJ Young, DM McDowell, TL Dornan, JP New
Bmj 321 (7261), 612-614, 2000
The system can't perform the operation now. Try again later.
Articles 1–20