2001 |
15 | EE | Paul Ashley,
Heather M. Hinton,
Mark Vandenwauver:
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce.
ACSAC 2001: 296-308 |
2000 |
14 | EE | Åsa Hagström,
Viiveke Fåk,
Mark Vandenwauver:
EWS-A Case Study on Access Control in Workflow Systems.
WETICE 2000: 213-218 |
13 | EE | Paul Ashley,
Mark Vandenwauver,
Frank Siebenlist:
Applying authorization to intranets: architectures, issues and APIs.
Computer Communications 23(17): 1613-1620 (2000) |
1999 |
12 | EE | Paul Ashley,
Bradley Broom,
Mark Vandenwauver:
An Implementation of a Secure Version of NFS Including RBAC.
ACISP 1999: 213-227 |
11 | | Paul Ashley,
Mark Vandenwauver,
Joris Claessens:
Using SESAME to Secure Web Based Applications on an Intranet.
Communications and Multimedia Security 1999: 303-318 |
10 | | Mark Vandenwauver,
Paul Ashley,
Gary Gaskell:
The Intranet Authorization Paradigm.
Conference on Information Security Management & Small Systems Security 1999: 145-160 |
9 | EE | Paul Ashley,
Mark Vandenwauver:
Using SESAME to Implement Role-Based Access Control in Unix File Systems.
WETICE 1999: 141-146 |
8 | EE | Mark Vandenwauver,
Joris Claessens,
Wim Moreau,
Calin Vaduva,
Robert Maier:
Why Enterprises Need More than Firewalls and Intrusion Detection Systems.
WETICE 1999: 152-157 |
7 | | Paul Ashley,
Bradley Broom,
Mark Vandenwauver:
An Implementation of a Secure Version of NFS including REBAC.
Australian Computer Journal 31(2): 54-64 (1999) |
1998 |
6 | EE | Paul Ashley,
Mark Vandenwauver,
Bradley Broom:
A Uniform Approach to Securing Unix Applications Using SESAME.
ACISP 1998: 24-35 |
5 | | Mark Looi,
Paul Ashley,
Loo Tang Seet,
Richard Au,
Gary Gaskell,
Mark Vandenwauver:
Enhancing SESAMEV4 with Smart Cards.
CARDIS 1998: 193-202 |
4 | EE | Joris Claessens,
Mark Vandenwauver,
Bart Preneel,
Joos Vandewalle:
Setting up a Secure Web Server and Clients on an Intranet.
WETICE 1998: 295-300 |
3 | EE | Paul Ashley,
Mark Vandenwauver,
Mark Rutherford,
Sebastien Boving:
Using SESAME's GSS-API to add Security to Unix Applications.
WETICE 1998: 359-364 |
1997 |
2 | EE | Mark Vandenwauver,
Frank Jorissen:
Securing Internet Electronic Mail.
State of the Art in Applied Cryptography 1997: 208-223 |
1 | EE | Mark Vandenwauver,
René Govaerts,
Joos Vandewalle:
How Role Based Access Control is Implemented in SESAME.
WETICE 1997: 293-298 |