School of Computing

Publications by Prof David Chadwick

Also view these in the Kent Academic Repository

Article
Chadwick, D. W., Laborde, R., Oglaza, A., Venant, R., Wazan, A. S. and Nijjar, M. (2019) “Improved Identity Management with Verifiable Credentials and FIDO”, IEEE Communications Standards. IEEE, pp. 14-20. doi: https://doi.org/10.1109/MCOMSTD.001.1900020.
Chadwick, D. W., Fan, W., Constantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Mori, P., Sajjad, A., Wang, X.-S. and Manera, M. (2019) “A cloud-edge based data security architecture for sharing and analyzing cyber threat information”, Future Generation Computer Systems. Elsevier, pp. 710-722. doi: 10.1016/j.future.2019.06.026.
Sette, I. S., Chadwick, D. W. and Ferraz, C. A. G. (2017) “Authorization Policy Federation in Heterogeneous Multicloud Environments”, IEEE Cloud Computing. Institute of Electrical and Electronics Engineers, pp. 38-47. doi: 10.1109/MCC.2017.3791018.
Pérez Méndez, A., López Millán, G., Marín López, R., Chadwick, D. W. and Schechtman Sette, I. (2017) “Integrating an AAA-based federation mechanism for OpenStack - The CLASSe view”, Concurrency and Computation: Practice and Experience. Wiley. doi: 10.1002/cpe.4148.
Wazan, A. S., Laborde, R., Chadwick, D. W., Barrere, F., Benzekri, A., Habbal, A. M. and Kaiiali, M. (2017) “Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker”, Security and Communication Networks. Hindawi, pp. 1-23. doi: 10.1155/2017/6907146.
Bailey, C., Chadwick, D. W. and de Lemos, R. (2014) “Self-adaptive federated authorization infrastructures”, Journal of Computer and System Sciences. Academic Press, pp. 935-952. doi: doi:10.1016/j.jcss.2014.02.003.
Chadwick, D. W., Siu, K. W., Lee, C., Fouillat, Y. and Germonville, D. (2014) “Adding Federated Identity Management to OpenStack”, Journal of Grid Computing. Springer Netherlands, pp. 3-27. doi: 10.1007/s10723-013-9283-2.
Huth, C. L., Chadwick, D. W., Claycomb, W. and You, I. (2013) “Guest editorial: A brief overview of data leakage and insider threats”, Information Systems Frontiers. Springer, pp. 1-4. doi: 10.1007/s10796-013-9419-8.
Chadwick, D. W., Casenove, M. and Siu, K. (2013) “My private cloud--granting federated access to cloud resources”, Journal of Cloud Computing. Springer-Verlag, pp. 1-16. doi: 10.1186/2192-113X-2-3.
Chadwick, D. W. and Fatema, K. (2012) “A privacy preserving authorisation system for the cloud”, Journal of Computer and System Sciences. Academic Press, pp. 1359-1373. doi: 10.1016/j.jcss.2011.12.019.
Chadwick, D. W., Inman, G. and Klingenstein, N. (2010) “A Conceptual Model for Attribute Aggregation”, Future Generation Computer Systems. Elsevier, pp. 1043-1052. doi: 10.1016/j.future.2009.12.004.
Ferreira, A., Antunes, L., Chadwick, D. W. and Correi, R. (2010) “Grounding Information Security in Healthcare”, International Journal of Medical Informatics. Elsevier, pp. 182-196. doi: 10.1016/j.ijmedinf.2010.01.009.
Inman, G. and Chadwick, D. W. (2010) “A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems”, Upgrade. Privacy and Identity Management, pp. 182-196. Available at: http://www.cs.kent.ac.uk/pubs/2010/3028.
Chadwick, D. W., Antony, S. and Bjerk, R. (2010) “Instant certificate revocation and publication using WebDAV”, Journal of Computer Security. IOS Press, pp. 475-496. doi: 10.3233/JCS-2009-0372.
Chadwick, D. W. and Inman, G. (2009) “Attribute Aggregation in Federated Identity Management”, IEEE Computer, pp. 182-196. Available at: http://www.cs.kent.ac.uk/pubs/2009/3026.
Chadwick, D. W., Otenko, S. and Nguyen, T. A. (2009) “Adding Support to XACML for Multi-Domain User to User Dynamic Delegation of Authority”, International Journal of Information Security, pp. 182-196. doi: 10.1007/s10207-008-0073-y.
Mbanaso, U., Cooper, G., Chadwick, D. W. and Anderson, A. (2009) “Obligations of Trust for Privacy and Confidentiality in Distributed Transactions”, Internet Research, pp. 182-196. doi: 10.1108/10662240910952328.
Chadwick, D. W., Zhao, G., Otenko, S., Laborde, R., Su, L. and Nguyen, T. A. (2008) “PERMIS: a modular authorization infrastructure”, Concurrency and Computation: Practice and Experience. 5th UK e-Science All Hands Meeting (AHM 2006), Wiley, pp. 1341-1357. doi: 10.1002/cpe.1313.
Chadwick, D. W., Su, L. and Laborde, R. (2008) “Coordinating access control in grid services”, Concurrency and Computation: Practice and Experience. 7th International Middleware Conference, Wiley, pp. 1071-1094. doi: 10.1002/cpe.1284.
Zhang, N. F., Yao, L., Nenadic, A., Chin, J., Goble, C., Rector, A., Chadwick, D. W., Otenko, S. and Shi, Q. (2007) “Achieving Fine-grained Access Control in Virtual Organisations”, Concurrency and Computation: Practice and Experience. Wiley, pp. 1333-1352. doi: 10.1002/cpe.1099.
Chadwick, D. W. (2007) “Coordinated decision making in distributed applications”, Information Security Technical Report, Elsevier. Elsevier, pp. 147-154. doi: 10.1016/j.istr.2007.05.003.
Chadwick, D. W., Novikov, A. and Otenko, A. (2006) “GridShib and PERMIS Integration”, Campus-Wide Information Systems, pp. 297-308.
Chadwick, D. W. (2005) “Security and Trust Management Extensions to the PERMIS X.509 Privilege Management Infrastructure”, ERCIM News.
Chadwick, D. W. (2005) “The X.509 Privilege Management Standard”, UPGRADE: The European Journal for the Informatics Professional. Novática, pp. 41-46. Available at: http://www.cepis.org/upgrade/index.jsp?p=2142&n=2168.
Brostoff, S., Sasse, M. A., Chadwick, D. W., Cunningham, J., Mbanaso, U. and Otenko, S. (2005) “’R-What?’ Development of a role-based access control policy-writing tool for e-Scientists”, Software: Practice and Experience. John Wiley & Sons, pp. 835-856. doi: 10.1002/spe.691.
Chadwick, D. W. (2005) “Authorisation in Grid Computing”, Information Security Technical Report. Elsevier Science Bv, pp. 33-40.
Mundy, D., Chadwick, D. W. and Ball, E. (2004) “Some expectations and perceptions of electronic transfer of prescription systems”, British Journal of Health Care Computing and Information Management, March 2004, pp. 34-38.
Mundy, D. and Chadwick, D. W. (2004) “Electronic Transmission of Prescriptions - Towards Realising the Dream”, International Journal of Electronic Healthcare, pp. 112-125. doi: 10.1504/IJEH.2004.004659.
Mundy, D. and Chadwick, D. W. (2004) “An XML Alternative for Performance and Security: ASN.1”, IEEE IT Professional. IEEE Educational Activities Department Piscataway, NJ, USA, pp. 30-36. doi: 10.1109/MITP.2004.1265540.
Chadwick, D. W., Mundy, D. and New, J. (2003) “Experiences of Using a PKI to Access a Hospital Information System by High Street Opticians”, Computer Communications special edition on PKI. Elsevier, pp. 1893-1903. doi: 10.1016/S0140-3664(03)00084-7.
Chadwick, D. W. (2003) “Deficiencies in LDAP when used to support a Public Key Infrastructure”, Communications of the ACM. ACM New York, NY, USA, pp. 99-104. Available at: http://www.cs.kent.ac.uk/pubs/2003/2108.
Chadwick, D. W., Otenko, A. and Ball, E. (2003) “Implementing Role Based Access Controls Using X.509 Attribute Certificates”, IEEE Internet Computing, pp. 62-69. Available at: http://www.cs.kent.ac.uk/pubs/2003/2107.
Ball, E., Chadwick, D. W. and Mundy, D. (2003) “Patient Privacy in Electronic Prescription Transfer”, IEEE Security & Privacy magazine, pp. 77-80. Available at: http://www.cs.kent.ac.uk/pubs/2003/2106.
Chadwick, D. W. and Otenko, A. (2003) “The PERMIS X.509 Role Based Privilege Management Infrastructure”, Future Generation Computer Systems. Elsevier Science BV, pp. 277-289. Available at: http://www.cs.kent.ac.uk/pubs/2003/2109.
Mundy, D. and Chadwick, D. W. (2003) “Security issues in the electronic transfer of prescriptions”, Medical Informatics and the Internet in Medicine. TAYLOR & FRANCIS LTD, 4 PARK SQUARE, MILTON PARK, ABINGDON OX14 4RN, OXON, ENGLAND, pp. 253-277. doi: 10.1080/14639230310001621675.
Chadwick, D. W. and Basden, A. (2001) “Evaluating Trust in a Public Key Certification Authority”, Computers and Security, pp. 592-611. doi: 10.1016/S0167-4048(01)00710-6.
Basden, A., Ball, E. and Chadwick, D. W. (2001) “Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure”, Expert Systems. Blackwell, pp. 233-249. doi: 10.1111/1468-0394.00178.
Young, A. J., Chadwick, D. W. and New, J. (2001) “Providing secure remote access to legacy applications”, IEE Computing and Control Engineering Journal, pp. 148-156.
Chadwick, D. W., Cook, P., Young, A. J., McDowell, D. and New, J. (2000) “Using the Internet to Access Confidential Patient Records: A Case Study’’”, British Medical Journal, pp. 612-614.
Chadwick, D. W., Tassabehji, R. and Young, A. J. (2000) “Experiences of Using a Public Key Infrastructure for the Preparation of Examination Papers”, Computers and Education. Elsevier, pp. 1-20. doi: 10.1016/S0360-1315(99)00040-8.
Chadwick, D. W. (2000) “Windows 2000: A Threat to Internet Diversity and Open Standards?”, IEEE Computer. IEEE, pp. 107-109. doi: 10.1109/2.863989.
Chadwick, D. W. (1999) “Smart Cards Aren’t Always the Smart Choice”, IEEE Computer. IEEE Computer Soc, pp. 142-143.
Chadwick, D. W., Young, A. J. and Kapidzic Cicovic, N. (1997) “Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model”, IEEE Networks Special Publication on Internet Security. IEEE, pp. 16-24.
Chadwick, D. W. (1996) “Important Lessons Derived from X.500 Case Studies”, IEEE Network, pp. 22-34.
Chadwick, D. W. (1996) “A Method for Collecting Case Study Information via the Internet”, IEEE Network, pp. 36-38.
Ma, Y. and Chadwick, D. W. (1996) “Implementation of a Mechanism in the OSI Directory”, Minimicro Systems (China), pp. 5-10.
Book section
Giubilo, F., Sajjad, A., Shackleton, M., Chadwick, D. W., Fan, W. and de Lemos, R. (2018) “An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services”, in 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). 12th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE. doi: 10.23919/ICITST.2017.8356404.
Wazan, A. S., Laborde, R., Chadwick, D. W., Barrere, F. and Benzekri, A. (2016) “How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches”, in 2016 IEEE 41st Conference on Local Computer Networks (LCN). IEEE 41st Conference on Local Computer Networks (LCN), IEEE, pp. 531-534. doi: 10.1109/LCN.2016.85.
Alhanahnah, M. and Chadwick, D. (2016) “Boosting usability for Protecting Online Banking Applications Against APTs”, in Amman, J. (ed.) 2016 Cybersecurity and Cyberforensics Conference (CCC). 2016 Cybersecurity and Cyberforensics Conference (CCC 2016), IEEE, pp. 70-76. doi: 10.1109/CCC.2016.13.
Fatema, K., Chadwick, D. W. and van Alsenoy, B. (2012) “Extracting Access Control and Conflict Resolution Policies from European Data Protection Law”, in Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., and Russello, G. (eds.) Privacy and Identity Management for Life. Springer Boston, pp. 59-72. doi: 10.1007/978-3-642-31668-5_5.
Chadwick, D. W. and Casenove, M. (2011) “Security APIs for My Private Cloud-Granting access to anyone, from anywhere at any time”, in 2011 IEEE Third International Conference on Cloud Computing Technology and Science. 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), IEEE, pp. 792-798. doi: 10.1109/CloudCom.2011.122.
Chadwick, D. W., Inman, G., Siu, K. W. and Ferdous, M. S. (2011) “Leveraging social networks to gain access to organisational resources”, in Proceedings of the 7th ACM workshop on Digital identity management. Proceedings of the 7th ACM workshop on Digital identity management, New York, USA: ACM, pp. 43-51. doi: 10.1145/2046642.2046653.
Watt, J., Sinnott, R. O., Inman, G. and Chadwick, D. (2011) “Federated Authentication and Authorisation in the Social Science Domain”, in 2011 Sixth International Conference on Availability, Reliability and Security. 2011 Sixth International Conference on Availability, Reliability and Security (ARES 2011), IEEE, pp. 541-548. doi: 10.1109/ARES.2011.83.
Chadwick, D. W., Lievens, S. F., den Hartog, J. I., Pashalidis, A. and Alhadeff, J. (2011) “My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud”, in 2011 IEEE 4th International Conference on Cloud Computing. Cloud Computing (CLOUD), 2011 IEEE International Conference on, IEEE, pp. 752-753. doi: 10.1109/CLOUD.2011.113.
Shi, L. and Chadwick, D. W. (2011) “A controlled natural language interface for authoring access control policies”, in Proceedings of the 2011 ACM Symposium on Applied Computing. SAC Symposium on Applied Computing, New York, USA: ACM, pp. 1524-1530. doi: 10.1145/1982185.1982510.
Fatema, K., Chadwick, D. W. and Lievens, S. F. (2011) “A Multi-privacy Policy Enforcement System”, in Fischer-Hubner, S., Duquenoy, P., Hansen, M., Leenes, R., and Zhang, G. (eds.) Privacy and Identity Management for Life. Boston: Springer, pp. 297-310. doi: 10.1007/978-3-642-20769-3_24.
Ferreira, A., Correia, R., Chadwick, D. W., Santos, H., Gomes, R., Reis, D. and Antunes, L. (2010) “Password Sharing and How to Reduce It”, in Chryssanthou, A., Apostolakis, I., and Varlamis, I. (eds.) Certification and Security in Health-Related Web Applications: Concepts and Solutions. New York: Medical Information Science Reference, pp. 243-263.
Ferreira, A., Chadwick, D. W., Farinha, P., Cruz-Correia, R., Zhao, G., Chilro, R. and Antunes, L. (2009) “How to securely break into RBAC: the BTG-RBAC model”, in 2009 Annual Computer Security Applications Conference. Computer Security Applications Conference, 2009. ACSAC’09. Annual, IEEE, pp. 23-31. doi: 10.1109/ACSAC.2009.12.
Chadwick, D. W. and Fatema, K. (2009) “An advanced policy based authorisation infrastructure”, in DIM ’09 Proceedings of the 5th ACM workshop on Digital identity management. ACM Computer and Communications Security Conference, New York, USA: ACM, pp. 81-84. doi: 10.1145/1655028.1655045.
Chadwick, D. W. (2009) “Federated Identity Management”, in Aldini, A., Barthe, G., and Gorrieri, R. (eds.) FOSAD 2008/2009. Berlin: Springer-Verlag, pp. 182-196. doi: 10.1007/978-3-642-03829-7_3.
Zhao, G. and Chadwick, D. W. (2008) “On the Modeling of Bell-LaPadula Security Policies using RBAC”, in 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. Proceedings of 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, IEEE. doi: 10.1109/WETICE.2008.34.
Sinnott, R. O., Chadwick, D. W., Doherty, T., Martin, D., Stell, A., Stewart, G., Su, L. and Watt, J. (2008) “Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models”, in 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID). Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 08), IEEE, pp. 106-113. doi: 10.1109/CCGRID.2008.67.
Chadwick, D. W. (2007) “Operational Models for Reputation Servers”, in Herrmann, P., Issarny, V., and Shiu, S. (eds.) Trust Management: Third International Conference, iTrust 2005. The Third International Conference on Trust Management, Berlin: Springer, pp. 108-115.
Mbanaso, U., Cooper, G., Chadwick, D. W. and Anderson, A. (2007) “Obligations for Privacy and Confidentiality in Distributed Transactions”, in Denko, M. K. (ed.) Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops. IFIP International Conference Embedded and Ubiquitous Computing, Berlin, Germany: Springer, pp. 69-81. doi: 10.1007/978-3-540-77090-9_7.
Chadwick, D. W. (2007) “Dynamic Delegation of Authority in Web Services”, in Periorellis, P. (ed.) Securing Web Services: Practical Usage of Standards and Specifications. United States: IGI Global, pp. 111-137.
Nguyen, T. A., Chadwick, D. W. and Nasser, B. (2007) “Recognition of Authority in Virtual Organisations”, in Trust, Privacy and Security in Digital Business 4th International Conference. The 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus07), Berlin, Germany: Springer, pp. 3-13. doi: 10.1007/978-3-540-74409-2_3.
Chadwick, D. W. and Anthony, S. (2007) “Using WebDAV for Improved Certificate Revocation and Publication”, in Public Key Infrastructure 4th European PKI Workshop. LNCS 4582. Public Key Infrastructure, Proceedings of 4th European PKI Workshop, Palma de Mallorca, Spain, Berlin, Germany: Springer, pp. 265-279. doi: 10.1007/978-3-540-73408-6_19.
Ferreira, A., Cruz-Correia, R., Antunes, L. and Chadwick, D. W. (2007) “Access Control: how can it improve patients’ healthcare?”, in Bos, L. and Blobel, B. (eds.) Medical and Care Compunetics 4. Netherlands: IOS Press, pp. 65-76.
Nguyen, T. A., Su, L., Inman, G. and Chadwick, D. W. (2007) “Flexible and Manageable Delegation of Authority in RBAC”, in 21st International Conference on Advanced Information Networking and Applications Workshops. The 2007 IEEE International Symposium on Ubisafe Computing (UbiSafe-07), Niagara Falls, Canada, IEEE, pp. 453-458. doi: 10.1109/AINAW.2007.187.
Chadwick, D. W., Xu, W., Otenko, S., Laborde, R. and Nasser, B. (2007) “Multi-Session Separation of Duties (MSoD) for RBAC”, in 2007 IEEE 23rd International Conference on Data Engineering Workshop. First International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP’07), IEEE, pp. 744-753. doi: 10.1109/ICDEW.2007.4401062.
Chadwick, D. W. (2007) “Unifying Grid and Organisational Security Mechanisms”, in Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing. United States: Auerbach Publications, CRC Press, pp. 239-254.
Sinnott, R. O., Chadwick, D. W., Koetsier, J., Otenko, O., Watt, J. and Nguyen, T. A. (2006) “Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid”, in 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science’06). 2nd IEEE International Conference on e-Science and Grid Computing, IEEE, p. 22. doi: 10.1109/E-SCIENCE.2006.261106.
Chadwick, D. W., Su, L. and Laborde, R. (2006) “Providing Secure Coordinated Access to Grid Services”, in Proceedings of the 4th international workshop on Middleware for grid computing. Proceedings of 4th International Workshop on Middleware for Grid Computing - MGC 2006, In conjunction with ACM/IFIP/USENIX 7th International Middleware Conference 2006, New York, USA: ACM, p. 1. doi: 10.1145/1186675.1186677.
Chadwick, D. W., Otenko, S. and Nguyen, T. A. (2006) “Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains”, in Communications and Multimedia Security. Proc of 10th IFIP TC-6 TC-11 Int Conf, CMS 2006, Springer Berlin/Heidelberg, pp. 67-86. doi: 10.1007/11909033.
Chadwick, D. W., Zhao, G., Otenko, S., Laborde, R., Su, L. and Nguyen, T. A. (2006) “Building a Modular Authorization Infrastructure”, in All Hands Meeting. All Hands Meeting. Available at: http://www.allhands.org.uk/2006/proceedings/papers/677.pdf.
Chadwick, D. W. (2006) “Authorisation using Attributes from Multiple Authorities”, in Reddy, S. M. (ed.) 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’06). 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), IEEE, pp. 326-331. doi: 10.1109/WETICE.2006.22.
Chadwick, D. W., Su, L., Otenko, O. and Laborde, R. (2006) “Co-ordination between Distributed PDPs”, in Burgess, M. and Wijesekera, D. (eds.) Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’06). Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, IEEE, pp. 163-172. doi: 10.1109/POLICY.2006.14.
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha, P., Oliveira-Palhares, E., Chadwick, D. W. and Costa-Pereira, A. (2006) “How to break access control in a controlled manner”, in 19th IEEE Symposium on Computer-Based Medical Systems (CBMS’06). 19th IEEE International Symposium on Computer-Based Medical Systems, IEEE, pp. 847-851. doi: 10.1109/CBMS.2006.95.
Mbanaso, U., Cooper, G., Chadwick, D. W. and Proctor, S. (2006) “Privacy Preserving Trust Authorization Framework Using XACML”, in 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM’06). IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, IEEE, pp. 673-678. doi: 10.1109/WOWMOM.2006.92.
Zhao, G., Otenko, S. and Chadwick, D. W. (2006) “Distributed Key Management for Secure Role Based Messaging”, in 20th International Conference on Advanced Information Networking and Applications. Proceeding of The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), IEEE, pp. 132-137. doi: 10.1109/AINA.2006.146.
Su, L., Chadwick, D. W., Basden, A. and Cunningham, J. (2005) “Automated Decomposition of Access Control Policies”, in Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05). IEEE 6th International Workshop on Policies for Distributed Systems and Networks, IEEE, pp. 3-13. doi: 10.1109/POLICY.2005.10.
Zhao, G. and Chadwick, D. W. (2005) “Trust Infrastructure for Policy based Messaging In Open Environments”, in 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE’05). 14th IEEE International Workshops on Enabling Technologies, Washington, DC, USA: IEEE Computer Society, pp. 144-149. doi: 10.1109/WETICE.2005.60.
Sinnott, R. O., Stell, A., Chadwick, D. W. and Otenko, O. (2005) “Experiences of Applying Advanced Grid Authorisation Infrastructures”, in Advances in Grid Computing - EGC 2005 European Grid Conference. Proceedings of European Grid Conference (EGC), Berlin, Germany: Springer, pp. 265-274. doi: 10.1007/11508380_28.
Chadwick, D., Otenko, S. and Welch, V. (2005) “Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure”, in Chadwick, D. W. and Preneel, B. (eds.) Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Communications and Multimedia Security, Boston, Massachusetts, USA: Springer, pp. 251-261. doi: 10.1007/0-387-24486-7_19.
Chadwick, D., Lunt, G. and Zhao, G. (2005) “Secure Role-based Messaging”, in Chadwick, D. W. and Preneel, B. (eds.) Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004),Windermere, UK, Springer, pp. 263-275. doi: 10.1007/0-387-24486-7_20.
Chadwick, D. (2005) “Threat Modelling for Active Directory”, in Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Proceedings of Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Boston, Massachusetts, USA: Springer, pp. 173-182. doi: 10.1007/0-387-24486-7_13.
Chadwick, D. W. (2004) “The X.509 Privilege Management Infrastructure”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Security and Privacy in Advanced Networking Technologies. Amsterdam: IOS Press, pp. 15-25.
Chadwick, D. W. and Mundy, D. (2004) “The Secure Electronic Transfer of Prescriptions”, in Bryant, J. (ed.) Current Perspectives in Healthcare Computing Conference. Current Perspectives in Healthcare Computing, BCS HIC, pp. 11-28.
Mundy, D. and Chadwick, D. W. (2004) “Secure Knowledge Management”, in Wickramasinghe, N., Gupta, J. N. D., and Sharma, S. K. (eds.) Creating Knowledge Based Health Care Organizations. Idea Publishing Group, pp. 321-337.
Chadwick, D. W. and Otenko, A. (2004) “Implementing Role Based Access Controls using X.509 Privilege Management - the PERMIS Authorisation Infrastructure”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Security and Privacy in Advanced Networking Technologies. IOS Press, pp. 26-39.
Chadwick, D. W., Sahalayev, M. and Ball, E. (2003) “Modifying LDAP to Support PKIs”, in Data and Applications Security XVII Status and Prospects. 17th Annual Working Conference on Data and Applications Security, Boston, Massachusetts, USA: Springer, pp. 205-214. doi: 10.1007/1-4020-8070-0_15.
Chadwick, D. W. and Mundy, D. (2003) “Policy Based Electronic Transmission of Prescriptions”, in Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. 4th IEEE International Workshop on Policies for Distributed Systems and Networks, IEEE, pp. 197-206. doi: 10.1109/POLICY.2003.1206974.
Chadwick, D. W. (2003) “The X.509 Privilege Management Infrastructure”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, Bled, Slovenia. IOS Press, p. 1525. Available at: http://www.cs.kent.ac.uk/pubs/2003/2124.
Ball, E., Chadwick, D. W. and Basden, A. (2003) “The Implementation of a System for Evaluating Trust in a PKI Environment”, in Petrovic, O., Ksela, M., Fallenbock, M., and Kitti, C. (eds.) Trust in the Network Economy. Springer-Verlag, Austria, pp. 263-279. Available at: http://www.cs.kent.ac.uk/pubs/2003/2126.
Chadwick, D. and Otenko, A. (2002) “RBAC Policies in XML for X.509 Based Privilege Management”, in Ghonaimy, A., El-Hadidi, M. T., and Aslan, H. K. (eds.) Security in the Information Society: Visions and Perspectives. Security in the Information Society: Visions and Perspectives: IFIP TC11 17th Int. Conf. On Information Security (SEC2002), Cairo, Egypt, Boston, Massachusetts, USA: Springer, pp. 39-54. doi: 10.1007/978-0-387-35586-3_3.
Chadwick, D., Carroll, C., Harvey, S., New, J. and Young, A. (2002) “Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet”, in Sprague Jr, R. H. (ed.) Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Proceedings of the 35th Annual Hawaii International Conference on System Sciences 2002 (HICCS 2002), IEEE. doi: 10.1109/HICSS.2002.994127.
Chadwick, D. W. (2001) “An X.509 Role Based Privilege Management Infrastructure”, in Cooper, E. (ed.) Briefing - Global InfoSecurity 2002, World Markets Research Centre Ltd. London: World Markets Research Centre.
Chadwick, D. W. (2000) “Network Firewall Technologies”, in Schneider, W., Jerman-Blazic, B., and Klobucar, T. (eds.) Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 149-166.
Chadwick, D. W. and Young, A. J. (2000) “A Directory Application Level Firewall - the Guardian DSA”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 133-147.
Chadwick, D. W., Harvey, S., New, J. and Young, A. J. (2000) “Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 201-209.
Chadwick, D. W. (2000) “Secure Directories”, in Jerman-Blazic, B., Schneider, W., and Klobucar, T. (eds.) Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 123-131.
Basden, A., Evans, J. B., Chadwick, D. W. and Young, A. J. (1998) “Coping with Poorly Understood Domains: the Example of Internet Trust”, in Research and Development in Expert Systems XV Proceedings of ES98, the Eighteenth Annual International Conference of the British Computer Society Specialist Group on Expert Systems. Research and Development in Expert Systems, 1998, London, UK: Springer, pp. 114-132. doi: 10.1007/978-1-4471-0835-1_8.
Young, A. J., Kapidzic Cicovic, N. and Chadwick, D. W. (1997) “Trust Models in ICE-TEL”, in Proceedings of SNDSS ’97: Internet Society 1997 Symposium on Network and Distributed System Security. The Internet Society 1997 Symposium on Network and Distributed Systems Security (NDSS 97) San Diego, California, IEEE, pp. 122-133. doi: 10.1109/NDSS.1997.579230.
Chadwick, D. and Pope, N. (1994) “Interdomain Guardians in a Distributed Directory Service”, in Veiga, P. and Khakhar, D. (eds.) Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communication. Information Networks and Data Communications - Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communications, Funchal, Madeira Island, Portugal, Amsterdam, Netherlands: North-Holland Publishing Co, pp. 347-365.
Andrianopoulos, A. and Chadwick, D. W. (1993) “Simulating the Global Directory Service with OPNET”, in Proceedings 26th Annual Simulation Symposium. Proceedings of the IEEE 26th Annual Simulation Symposium, Washington, IEEE, pp. 162-172. doi: 10.1109/SIMSYM.1993.639126.
Chadwick, D. W. (1992) “Distributed Aspects of the 1992 Directory Standard”, in Tzafestas, S., Borne, P., and Grandinetti, L. (eds.) Parallel and Distributed Computing in Engineering Systems: Proceedings of the IMACS/IFAC International Symposium on Parallel and Distributed Computing in Engineering Systems. Parallel and Distributed Computing in Engineering Systems, North-holland, 1992, Elsevier, pp. 471-476.
Conference or workshop item
Laborde, R., Oglaza, A., Wazan, A. S., Barrere, F., Benzekri, A., Chadwick, D. W. and Venant, R. (2020) “A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework”, in 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), IEEE. doi: 10.1109/CCNC46108.2020.9045440.
Laborde, R., Oglaza, A., Wazan, A. S., Chadwick, D. W., Barrere, F., Benzekri, A. and Venant, R. (2020) “Know Your Customer: Opening a new bank account online using UAAF”, in 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), IEEE. doi: 10.1109/CCNC46108.2020.9045148.
Wazan, A. S., Laborde, R., Chadwick, D. W., Barrere, F. and Benzekri, A. (2017) “TLS Connection Validation by Web Browsers: Why do Web Browsers still not agree?”, in COMPSAC 2017, Building Digital Autonomy for a Sustainable World. COMPSAC 2017, Building Digital Autonomy for a Sustainable World, Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/COMPSAC.2017.240.
Chadwick, D. W., Sette, I. S. and Sui, K. W. (2015) “Opening Up OpenStack’s Identity Service”, in Terena Networking Conference 2015. Terena Networking Conference 2015. Available at: https://tnc15.terena.org/core/presentation/100.
Pawar, P., Sajjad, A., Dimitrakos, T. and Chadwick, D. W. (2015) “Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings”, in Trust Management IX 9th IFIP WG 11.11 International Conference. Trust Management IX 9th IFIP WG 11.11 International Conference, Springer International Publishing, pp. 251-261. doi: 10.1007/978-3-319-18491-3.
Pawar, P., Sajjad, A., Chadwick, D. W. and Dimitrakos, T. (2015) “Security-as-a-Service in Multi-cloud and Federated Cloud Environments”, in. Hamburg, Germany: Springer International Publishing, pp. 251-261. doi: 10.1007/978-3-319-18491-3_21.
Bailey, C. J., Chadwick, D. W. and de Lemos, R. (2011) “Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models”, in Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing, IEEE, pp. 182-196. doi: 10.1109/DASC.2011.31.
Chadwick, D. W., You, I. and Chang, H. (eds.) (2009) “Proceedings of the 1st International Workshop on Managing Insider Security Threats (MIST2009),”, in. West Lafayette, USA, pp. 182-196. Available at: http://www.cs.kent.ac.uk/pubs/2009/3032.
Inglesant, P., Sasse, M. A., Chadwick, D. W. and Shi, L. L. (2008) “Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification”, in.
Chadwick, D. W., Beitis, G. and Owen, G. (2008) “Adding Authorisation to EduRoam”, in TERENA Networking Conference. TERENA Networking Conference, Brugge, Belgium.
Inman, G., Chadwick, D. W. and Klingenstein, N. (2007) “Authorisation using Attribute from Multiple Authorities - A Study of Requirements”, in Proceedings of HCSIT Summit - ePortfolio International Conference. Proceedings of HCSIT Summit - ePortfolio International Conference, Maastricht, The Netherlands.
Ferreira, A., Chadwick, D. W. and Antunes, L. (2007) “Modelling Access Control For Healthcare Information Systems”, in Doctoral consortium at 9th International Conference on Enterprise Information Systems (ICEIS2007). Doctoral consortium at 9th International Conference on Enterprise Information Systems (ICEIS2007).
Zhao, G., Chadwick, D. W. and Otenko, S. (2007) “Obligation for Role Based Access Control”, in IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS07). IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS07).
Chadwick, D. W. and Sasse, A. (2006) “The Virtuous Circle of Expressing Authorisation Policies”, in Proceedings of the ISWC’06 Workshop on Semantic Web Policy (SWPW’06). Proceedings of the ISWC’06 Workshop on Semantic Web Policy (SWPW’06), Georgia, USA.
Sinnott, R. O., Stell, A., Watt, J. and Chadwick, D. W. (2006) “Advanced Security Infrastructures for Grid Education”, in 10th World Multi-Conference on Systemics,Cybernetics and Informatics (WMSCI 2006). 10th World Multi-Conference on Systemics,Cybernetics and Informatics (WMSCI 2006).
Wilson, M., Arenas, A., Chadwick, D. W., Dimitrakos, T., Doser, J., Giambiagi, P., Golby, D., Geuer-Pollman, C., Haller, J. and Ketil, S. (2006) “The TrustCoM approach to enforcing agreements between interoperating enterprises”, in 2nd International Conference on Interoperability for Enterprise Software and Applications. 2nd International Conference on Interoperability for Enterprise Software and Applications, Bordeaux, France, pp. 365-375.
Xu, W., Chadwick, D. W. and Otenko, S. (2005) “A PKI Based Secure Audit Web Server”, in IASTED Communications, Network and Information and CNIS. IASTED Communications, Network and Information and CNIS, Phoenix, USA.
Lopez, G., Canovas, O., Gomez-Skarmeta, A. F., Otenko, S. and Chadwick, D. W. (2005) “A Heterogeneous Network Access Service based on PERMIS and SAML”, in 2nd EuroPKI Workshop. 2nd EuroPKI Workshop.
Xu, W., Chadwick, D. W. and Otenko, S. (2005) “Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server”, in 2nd EuroPKI Workshop. 2nd EuroPKI Workshop.
Zhao, G. and Chadwick, D. W. (2005) “Evolving Messaging Systems for Secure Role Based Messaging”, in 10th IEEE International Conference on Engineering of Complex Computer Systems. 10th IEEE International Conference on Engineering of Complex Computer Systems, IEEE Computer Society, pp. 216-223.
Chadwick, D. W. (2005) “Delegation Issuing Service”, in NIST 4th Annual PKI Workshop. NIST 4th Annual PKI Workshop, Gaithersberg, USA, pp. 62-73.
Chadwick, D. W., Otenko, S. and Xu, W. (2005) “Adding Distributed Trust Management to Shibboleth”, in NIST 4th Annual PKI Workshop. NIST 4th Annual PKI Workshop, Gaithersberg, USA, pp. 3-14.
Chadwick, D. W. (2004) “Autonomic Privilege Management - extending PERMIS to contribute to the TrustCOM objectives”, in E-Challenges 2004. E-Challenges 2004, Vienna, Austria: IOS Press, pp. 1216-1222.
Onions, R. and Chadwick, D. W. (2004) “Small and medium enterprises at risk in the United Kingdom”, in Digital Accounting Research Conference, Facultad De Ciencias Empresariales, University Of Huelva, 11 Plaza De La Merced, Huelva (Spain). Digital Accounting Research Conference, Facultad De Ciencias Empresariales, University Of Huelva, 11 Plaza De La Merced, Huelva (Spain).
Sinnott, R. O. and Chadwick, D. W. (2004) “Experiences of Using the GGF SAML AuthZ Interface”, in Proceedings of the UK e-Science All Hands Meeting. Proceedings of the UK e-Science All Hands Meeting, Nottingham, UK.
Chadwick, D. W., Dimitrakos, T., Dam, K. K.-V., Randal, D. M., Matthews, B. and Otenko, A. (2004) “Multilayer Privilege Management for Dynamic Collaborative Scientific Communities”, in Workshop on Grid Security Practice and Experience, Oxford, UK. Workshop on Grid Security Practice and Experience, Oxford, UK, pp. II 7-14.
Brostoff, S., Sassea, M., Chadwick, D. W., Cunningham, J., Mbanaso, U. and Otenko, S. (2004) “RBAC What? Development of a Role-Based Access Control Policy Writing Tool for E-Scientists”, in Workshop on Grid Security Practice and Experience, Oxford, UK. Workshop on Grid Security Practice and Experience, Oxford, UK, pp. 835-856. doi: 10.1002/spe.691.
Chadwick, D. W. (2004) “PKI Past, Present and Future”, in First EuroPKI Workshop, Samos. First EuroPKI Workshop, Samos.
Crawford, S. and Chadwick, D. W. (2004) “Experiences of Establishing Trust in a Distributed System Operated by Mutually Distrusting Parties”, in 3rd Annual PKI R&D Workshop. 3rd Annual PKI R&D Workshop, NIST, Gaithersburg MD. Available at: http://www.cs.kent.ac.uk/pubs/2004/2280.
Mundy, D. and Chadwick, D. W. (2003) “The Benefits in and Barriers towards the Implementation of Electronic Transfer of Prescriptions within the United Kingdom National Health Service”, in 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick, UK. 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick, UK. Available at: http://www.cs.kent.ac.uk/pubs/2003/2073.
Mundy, D., Chadwick, D. W., Ball, E., Marsden, P. K., Bell, C., Whatley, J., Sobreperez, P. and New, J. (2003) “Towards Electronic Transfer of Prescriptions (ETP) in the United Kingdom National Health Service - Stakeholder Evaluation of ETP Pilots”, in 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick. 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick. Available at: http://www.cs.kent.ac.uk/pubs/2003/2072.
Chadwick, D. W. (2003) “An Authorisation Interface for the GRID”, in E-Science All Hands Meeting 2003, Nottingham. E-Science All Hands Meeting 2003, Nottingham. Available at: http://www.cs.kent.ac.uk/pubs/2003/2074.
Bacon, J., Moody, K., Chadwick, D. W. and Otenko, S. (2003) “Session Limited vs. Persistent Role Membership”, in Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado. Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado. Available at: http://www.cs.kent.ac.uk/pubs/2003/2075.
Mundy, D., Chadwick, D. W. and Ball, E. (2003) “An Application Programming Interface for the Electronic Transmission of Prescriptions”, in Proceedings of the International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmeaunu, Germany, May 22-24 2003. Proceedings of the International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmeaunu, Germany, May 22-24 2003, pp. 27-38. Available at: http://www.cs.kent.ac.uk/pubs/2003/2081.
Mundy, D. and Chadwick, D. W. (2003) “Comparing the Performance of Abstract Syntax Notation One (ASN.1) vs eXtensible Markup Language (XML)”, in Terena Networking Conference, Zagreb. Terena Networking Conference, Zagreb. Available at: http://www.cs.kent.ac.uk/pubs/2003/2082.
Chadwick, D. W. and Otenko, O. (2003) “A Comparison of the Akenti and PERMIS Authorization Infrastructures in Ensuring Security in IT Infrastructures”, in El-Hadidi, M. T. (ed.) Proceedings of the ITI First International Conference on Information and Communications Technology (ICICT 2003) Cairo University. Proceedings of the ITI First International Conference on Information and Communications Technology (ICICT 2003) Cairo University, pp. 5-26. Available at: http://www.cs.kent.ac.uk/pubs/2003/2071.
Mundy, D. and Chadwick, D. W. (2002) “A System for Secure Electronic Prescription Handling”, in Proc of The Hospital of the Future, Second International Conference On The Management Of Healthcare And Medical Technology, Illinois Institute of Technology, Chicago, Illinois, USA. Proc of The Hospital of the Future, Second International Conference On The Management Of Healthcare And Medical Technology, Illinois Institute of Technology, Chicago, Illinois, USA.
Chadwick, D. W. and Otenko, A. (2002) “The PERMIS X.509 Role Based Privilege Management Infrastructure”, in Proc 7th ACM Symposium On Access Control Models And Technologies (SACMAT 2002), Monterey, USA. Proc 7th ACM Symposium On Access Control Models And Technologies (SACMAT 2002), Monterey, USA, pp. 135-140.
Chadwick, D. W., Otenko, O., Hunter, D. and Leoni, C. (2002) “Privilege Management for E-Construction”, in Rezgui, Y., Ingirige, B., and Aouad, G. (eds.) Proc European Conf on Information and Communication Technology Advances and Innovation in the Knowledge Society, Part B. Proc European Conf on Information and Communication Technology Advances and Innovation in the Knowledge Society, Part B, pp. 91-102.
Chadwick, D. W. (2001) “Deficiencies in LDAP when used to Support a Public Key Infrastructure”, in Terena Networking Conference. Terena Networking Conference.
Chadwick, D. W., New, J., McDowell, D. and Mundy, D. (2001) “Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition”, in Graham, P., Maheswaran, M., and Eskicioglu, R. (eds.) The International Conference On Internet Computing 2001. The International Conference On Internet Computing 2001, CSREA Press, pp. 535-541.
Chadwick, D. W., Harvey, S., New, J. and Young, A. J. (2000) “Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet”, in Information Security Solutions Europe (ISSE) 2000, Barcelona. Information Security Solutions Europe (ISSE) 2000, Barcelona.
Chadwick, D. W. and Young, A. J. (1998) “Enabling the Internet White Pages Service -- the Directory Guardian”, in Internet Society Symposioum on Network and Distributed Systems Security (NDSS 98), San Diego, California. Internet Society Symposioum on Network and Distributed Systems Security (NDSS 98), San Diego, California.
Chadwick, D. W., Basden, A., Evans, J. and Young, A. J. (1998) “Intelligent Computation of Trust”, in Terena Networking Conference, TNC98, Dresden, Germany. Terena Networking Conference, TNC98, Dresden, Germany, pp. 114-132.
Chadwick, D. W. (1996) “The ICE-TEL Public Key Infrastructure and Trust Model”, in DIMACS Workshop on Trust Management, New York, USA. DIMACS Workshop on Trust Management, New York, USA.
Chadwick, D. W. (1996) “The Internet Directory is NOT Primarily a Technology Issue”, in INET 96 Conference, Montreal, Canada. INET 96 Conference, Montreal, Canada.
Chadwick, D. W. (1991) “X.500: 1988 v 1992”, in Proceedings of the Electronic Directories Conference, London. Proceedings of the Electronic Directories Conference, London, Pinner:Blenheim Publications, pp. 23-29.
Chadwick, D. W. (1990) “The 1992 Directory Standards - implications for earlier implementations of the Directory”, in Colloquium on the Global Directory, London. Colloquium on the Global Directory, London, IEE.
Chadwick, D. W. (1990) “The Directory and its implications for name registration”, in Proceedings of the Open Systems and Interoperability Conference, London. Proceedings of the Open Systems and Interoperability Conference, London, Blenheim Online Publications.
Chadwick, D. W. (1990) “Tutorial on X.500 - The Directory”, in IFIP TCC 3rd Int Conf on Information Network and Data Communication, Lillehammer. IFIP TCC 3rd Int Conf on Information Network and Data Communication, Lillehammer, pp. T3-1.
Chadwick, D. W. (1989) “The Directory - existing services and proposed enhancements”, in Proceedings of the Open Systems 89 Conference (London). Proceedings of the Open Systems 89 Conference (London), Blenheim Online Publications, pp. 107-132.
Chadwick, D. W. (1987) “FTAM. The Development of a Commercial Product.”, in Proceedings of the Open Systems Conference (London). Proceedings of the Open Systems Conference (London), Online Publications.
Chadwick, D. W. (1986) “Issues in the Implementation of Application Layer Standards”, in Proceedings of the Open Systems Conference (London). Proceedings of the Open Systems Conference (London), Online Publications.
Book
Chadwick, D. W. (1996) Understanding X.500 (The Directory). International Thompson Publishing.
Other
Chadwick, D. W. and Sahalayev, M. (2003) “Internet X.509 Public Key Infrastructure LDAP Schema for X.509 Attribute Certificates”. Internet Draft. Available at: http://www.cs.kent.ac.uk/pubs/2003/2142.
Chadwick, D. W. and Sahalayev, M. (2003) “Internet X.509 Public Key Infrastructure LDAP Schema for X.509 CRLs”. INTERNET-DRAFT. Available at: http://www.cs.kent.ac.uk/pubs/2003/2143.
Chadwick, D. W. (2002) “The PERMIS X.509 Based Privilege Management Infrastructure”. University of Salford Salford M5 4WT England: IS Institute.
Chadwick, D. W. (2002) “LDAPv3 DN strings for use with PKIs”. Salford: IS Institute, University of Salford.
Chadwick, D. W. (2002) “Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3”. University of Salford Salford England M5 4WT: IS Institute.
Farrell, S. and Chadwick, D. W. (2000) “Limited Attribute Certificate Acquisition Protocol”. University of Salford.
Chadwick, D. W., Howes, T. and Wahl, M. (1999) “Referrals and Knowledge References in LDAP Directories.”
Chadwick, D. W. (1999) “Compound (Families of) Entries.”
Edited book
Decker, B. and Chadwick, D. W. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Edited by D. W. Chadwick and B. de Decker. Springer-Verlag.
Chadwick, D. W. and Zhao, G. (eds.) (2005) Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, Public Key Infrastructure. Berlin, Germany: Springer. doi: 10.1007/11533733.
Chadwick, D. and Preneel, B. (eds.) (2005) Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Communications and Multimedia Security. Boston, Massachusetts, USA: Springer, pp. 1-290. doi: 10.1007/b105674.
Internet publication
Chadwick, D. W. and Legg, S. (2002) Internet X.509 Public Key Infrastructure -- LDAP Schema for PKIs. Internet Draft.
Chadwick, D. W. and Mullan, S. (2002) Returning Matched Values with LDAPv3.
Total publications in KAR: 173 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 20/06/2021