Paul Ashley
According to our database1,
Paul Ashley
authored at least 19 papers
between 1998 and 2004.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2004
Enforcement of a P3P Privacy Policy.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
2001
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Comput. Commun., 2000
Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.).
Comput. Commun., 2000
Proceedings of the CCS 2000, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
An Implementation of a Secure Version of NFS including REBAC.
Aust. Comput. J., 1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
The Intranet Authorization Paradigm.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
Using SESAME to Secure Web Based Applications on an Intranet.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998