default search action
David W. Chadwick
Person information
- affiliation: University of Kent, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c79]David W. Chadwick, Michael Kubach, Ioram Schechtman Sette, Isaac Henderson Johnson Jeyakumar:
Establishing Trust in SSI Verifiers. Open Identity Summit 2023 - [c78]David A. Cordova Morales, Ahmad Samer Wazan, David W. Chadwick, Romain Laborde, April Rains Reyes Maramara, Kalil Cabral:
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates. SEC 2023: 265-278 - 2022
- [j37]Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi:
On the Validation of Web X.509 Certificates by TLS Interception Products. IEEE Trans. Dependable Secur. Comput. 19(1): 227-242 (2022) - [c77]Isaac Henderson Johnson Jeyakumar, David W. Chadwick, Michael Kubach:
A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN. Open Identity Summit 2022: 27-38 - 2021
- [c76]Ahmad Samer Wazan, David W. Chadwick, Rémi Venant, Romain Laborde, Abdelmalek Benzekri:
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators. SEC 2021: 196-209 - 2020
- [j36]David W. Chadwick, Wenjun Fan, Gianpiero Costantino, Rogério de Lemos, Francesco Di Cerbo, Ian Herwono, Mirko Manea, Paolo Mori, Ali Sajjad, Xiao-Si Wang:
A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Gener. Comput. Syst. 102: 710-722 (2020) - [c75]Romain Laborde, Arnaud Oglaza, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri, David W. Chadwick, Rémi Venant:
Know Your Customer: Opening a new bank account online using UAAF. CCNC 2020: 1-2 - [c74]Romain Laborde, Arnaud Oglaza, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri, David W. Chadwick, Rémi Venant:
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework. CCNC 2020: 1-8
2010 – 2019
- 2019
- [j35]David W. Chadwick, Romain Laborde, Arnaud Oglaza, Rémi Venant, Ahmad Samer Wazan, Manreet Nijjar:
Improved Identity Management with Verifiable Credentials and FIDO. IEEE Commun. Stand. Mag. 3(4): 14-20 (2019) - [c73]Wenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono:
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud. CSCloud/EdgeCom 2019: 74-80 - [c72]Ioram Schechtman Sette, Marcus Rafael Xavier, Carlos A. G. Ferraz, David W. Chadwick:
Mapeamentos Sintático e Semântico em Federações de Políticas de Autorização para Nuvens Heterogêneas. SBRC 2019: 650-663 - 2017
- [j34]Ioram Schechtman Sette, David W. Chadwick, Carlos A. G. Ferraz:
Authorization Policy Federation in Heterogeneous Multicloud Environments. IEEE Cloud Comput. 4(4): 38-47 (2017) - [j33]Alejandro Pérez-Méndez, Gabriel López Millán, Rafael Marín López, David W. Chadwick, Ioram Schechtman Sette:
Integrating an AAA-based federation mechanism for OpenStack - The CLASSe view. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j32]Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri, Mustafa Kaiiali, Adib Habbal:
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Secur. Commun. Networks 2017: 6907146:1-6907146:23 (2017) - [c71]Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri:
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree? COMPSAC (1) 2017: 665-674 - [c70]Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos:
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. ICITST 2017: 293-297 - 2016
- [c69]Mohannad Alhanahnah, David W. Chadwick:
Boosting Usability for Protecting Online Banking Applications Against APTs. CCC 2016: 70-76 - [c68]Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri:
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches. LCN 2016: 531-534 - 2015
- [c67]Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick:
Security-as-a-Service in Multi-cloud and Federated Cloud Environments. IFIPTM 2015: 251-261 - 2014
- [j31]David W. Chadwick, Kristy W. S. Siu, Craig A. Lee, Yann Fouillat, Damien Germonville:
Adding Federated Identity Management to OpenStack. J. Grid Comput. 12(1): 3-27 (2014) - [j30]Christopher Bailey, David W. Chadwick, Rogério de Lemos:
Self-adaptive federated authorization infrastructures. J. Comput. Syst. Sci. 80(5): 935-952 (2014) - [c66]Kaniz Fatema, David W. Chadwick:
Resolving Policy Conflicts - Integrating Policies from Multiple Authors. CAiSE Workshops 2014: 310-321 - 2013
- [j29]Carly L. Huth, David W. Chadwick, William R. Claycomb, Ilsun You:
Guest editorial: A brief overview of data leakage and insider threats. Inf. Syst. Frontiers 15(1): 1-4 (2013) - [j28]David W. Chadwick, Matteo Casenove, Kristy W. S. Siu:
My private cloud - granting federated access to cloud resources. J. Cloud Comput. 2: 3 (2013) - [c65]David W. Chadwick, George Inman:
The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. ARES 2013: 285-290 - [c64]Christopher Bailey, David W. Chadwick, Rogério de Lemos, Kristy W. S. Siu:
Enabling the Autonomic Management of Federated Identity Providers. AIMS 2013: 100-111 - [c63]Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick:
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm. World Conference on Information Security Education 2013: 68-82 - [c62]David W. Chadwick, Mark Hibbert:
Towards Automated Trust Establishment in Federated Identity Management. IFIPTM 2013: 33-48 - [c61]Manabu Hirano, David W. Chadwick, Suguru Yamaguchi:
Use of Role Based Access Control for Security-Purpose Hypervisors. TrustCom/ISPA/IUCC 2013: 1613-1619 - 2012
- [j27]David W. Chadwick, Kaniz Fatema:
A privacy preserving authorisation system for the cloud. J. Comput. Syst. Sci. 78(5): 1359-1373 (2012) - [c60]David W. Chadwick, Mark Hibbert:
F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation. OTM Workshops 2012: 231-241 - [e2]Bart De Decker, David W. Chadwick:
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7394, Springer 2012, ISBN 978-3-642-32804-6 [contents] - 2011
- [c59]John P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick:
Federated Authentication and Authorisation in the Social Science Domain. ARES 2011: 541-548 - [c58]David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff:
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. IEEE CLOUD 2011: 752-753 - [c57]David W. Chadwick, Matteo Casenove:
Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time. CloudCom 2011: 792-798 - [c56]Christopher Bailey, David W. Chadwick, Rogério de Lemos:
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. DASC 2011: 37-44 - [c55]David W. Chadwick, George Inman, Kristy W. S. Siu, Mohammad Sadek Ferdous:
Leveraging social networks to gain access to organisational resources. Digital Identity Management 2011: 43-52 - [c54]Ioana Ciuciu, Gang Zhao, David W. Chadwick, Quentin Reul, Robert Meersman, Cristian Vasquez Paulus, Mark Hibbert, Sandra Winfield, Thomas Kirkham:
Ontology Based Interoperation for Securely Shared Services: Security Concept Matching for Authorization Policy Interoperability. NTMS 2011: 1-5 - [c53]Kaniz Fatema, David W. Chadwick, Brendan Van Alsenoy:
Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. PrimeLife 2011: 59-72 - [c52]Lei Lei Shi, David W. Chadwick:
A controlled natural language interface for authoring access control policies. SAC 2011: 1524-1530 - 2010
- [j26]David W. Chadwick, George Inman, Nate Klingenstein:
A conceptual model for attribute aggregation. Future Gener. Comput. Syst. 26(7): 1043-1052 (2010) - [j25]Ana Margarida Ferreira, Luis Filipe Coelho Antunes, David W. Chadwick, Ricardo João Cruz Correia:
Grounding information security in healthcare. Int. J. Medical Informatics 79(4): 268-283 (2010) - [j24]David W. Chadwick, Sean Anthony, Rune Bjerk:
Instant certificate revocation and publication using WebDAV. J. Comput. Secur. 18(3): 475-496 (2010) - [c51]David W. Chadwick, George Inman, Paul Coxwell:
CardSpace in the cloud. CCS 2010: 657-659 - [c50]Ana Ferreira, Ricardo João Cruz Correia, David W. Chadwick, Luis Antunes:
Access Control in Healthcare: the methodology from legislation to practice. MedInfo 2010: 666-670 - [c49]Kaniz Fatema, David W. Chadwick, Stijn F. Lievens:
A Multi-privacy Policy Enforcement System. PrimeLife 2010: 297-310
2000 – 2009
- 2009
- [j23]David W. Chadwick, George Inman:
Attribute Aggregation in Federated Identity Management. Computer 42(5): 33-40 (2009) - [j22]David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen:
Adding support to XACML for multi-domain user to user dynamic delegation of authority. Int. J. Inf. Sec. 8(2): 137-152 (2009) - [j21]Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson:
Obligations of trust for privacy and confidentiality in distributed transactions. Internet Res. 19(2): 153-173 (2009) - [c48]Ana Ferreira, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes:
How to Securely Break into RBAC: The BTG-RBAC Model. ACSAC 2009: 23-31 - [c47]David W. Chadwick, Kaniz Fatema:
An advanced policy based authorisation infrastructure. Digital Identity Management 2009: 81-84 - [c46]Thomas Kirkham, Ingo Dahn, David W. Chadwick, Marc Santos, Sandra Winfield:
Aggregating policies in user centric, real-time and distributed applications. ICITST 2009: 1-6 - [c45]David W. Chadwick:
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. IDtrust 2009: 94-102 - [c44]Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri:
Which Web Browsers Process SSL Certificates in a Standardized Way? SEC 2009: 432-442 - 2008
- [j20]David W. Chadwick, Linying Su, Romain Laborde:
Coordinating access control in grid services. Concurr. Comput. Pract. Exp. 20(9): 1071-1094 (2008) - [j19]David W. Chadwick, Gansen Zhao, Sassa Otenko, Romain Laborde, Linying Su, Tuan-Anh Nguyen:
PERMIS: a modular authorization infrastructure. Concurr. Comput. Pract. Exp. 20(11): 1341-1357 (2008) - [c43]Richard O. Sinnott, David W. Chadwick, Thomas Doherty, David B. Martin, Anthony Stell, Gordon Stewart, Linying Su, John P. Watt:
Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. CCGRID 2008: 106-113 - [c42]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c41]David W. Chadwick:
Federated Identity Management. FOSAD 2008: 96-120 - [c40]David W. Chadwick, Stijn F. Lievens:
Enforcing "sticky" security policies throughout a distributed application. Middleware Security 2008: 1-6 - [c39]Philip Inglesant, Martina Angela Sasse, David W. Chadwick, Lei Lei Shi:
Expressions of expertness: the virtuous circle of natural language for access control policy specification. SOUPS 2008: 77-88 - [c38]Gansen Zhao, David W. Chadwick:
On the Modeling of Bell-LaPadula Security Policies Using RBAC. WETICE 2008: 257-262 - 2007
- [j18]Ning Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi:
Achieving fine-grained access control in virtual organizations. Concurr. Comput. Pract. Exp. 19(9): 1333-1352 (2007) - [j17]David W. Chadwick:
Coordinated decision making in distributed applications. Inf. Secur. Tech. Rep. 12(3): 147-154 (2007) - [c37]Gansen Zhao, David W. Chadwick, Sassa Otenko:
Obligations for Role Based Access Control. AINA Workshops (1) 2007: 424-431 - [c36]Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick:
Flexible and Manageable Delegation of Authority in RBAC. AINA Workshops (2) 2007: 453-458 - [c35]Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson:
Obligations for Privacy and Confidentiality in Distributed Transactions. EUC Workshops 2007: 69-81 - [c34]David W. Chadwick, Sean Anthony:
Using WebDAV for Improved Certificate Revocation and Publication. EuroPKI 2007: 265-279 - [c33]David W. Chadwick, Wensheng Xu, Sassa Otenko, Romain Laborde, Bassem Nasser:
Multi-session Separation of Duties (MSoD) for RBAC. ICDE Workshops 2007: 744-753 - [c32]Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser:
Recognition of Authority in Virtual Organisations. TrustBus 2007: 3-13 - 2006
- [c31]Gansen Zhao, Sassa Otenko, David W. Chadwick:
Distributed Key Management for Secure Role based Messaging. AINA (1) 2006: 132-137 - [c30]Ana Ferreira, Ricardo João Cruz Correia, Luis Antunes, Pedro Farinha, E. Oliveira-Palhares, David W. Chadwick, Altamiro da Costa Pereira:
How to Break Access Control in a Controlled Manner. CBMS 2006: 847-854 - [c29]David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen:
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. Communications and Multimedia Security 2006: 67-86 - [c28]Richard O. Sinnott, David W. Chadwick, Jos Koetsier, O. Otenko, John P. Watt, Tuan-Anh Nguyen:
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid. e-Science 2006: 22 - [c27]Michael D. Wilson, Alvaro Arenas, David W. Chadwick, Theo Dimitrakos, Jürgen Doser, Pablo Giambiagi, David Golby, Christian Geuer-Pollmann, Jochen Haller, Ketil Stølen, Tobias Mahler, Lorenzo Martino, Xavier Parent, Santi Ristol, J. Sairamesh, Lutz Schubert, Nilufer Tuptuk:
The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises. I-ESA 2006: 365-375 - [c26]David W. Chadwick, Linying Su, Romain Laborde:
Providing secure coordinated access to grid services. MGC@Middleware 2006: 1 - [c25]David W. Chadwick, Linying Su, Alexander Otenko, Romain Laborde:
Coordination between Distributed PDPs. POLICY 2006: 163-172 - [c24]David W. Chadwick:
Authorisation Using Attributes from Multiple Authorities. WETICE 2006: 326-331 - [c23]Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor:
Privacy Preserving Trust Authorization Framework Using XACML. WOWMOM 2006: 673-678 - 2005
- [j16]David W. Chadwick:
Authorisation in Grid computing. Inf. Secur. Tech. Rep. 10(1): 33-40 (2005) - [j15]Sacha Brostoff, Martina Angela Sasse, David W. Chadwick, R. James Cunningham, Uche M. Mbanaso, Sassa Otenko:
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Softw. Pract. Exp. 35(9): 835-856 (2005) - [c22]Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko:
Experiences of Applying Advanced Grid Authorisation Infrastructures. EGC 2005: 265-274 - [c21]Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick:
A Heterogeneous Network Access Service Based on PERMIS and SAML. EuroPKI 2005: 55-72 - [c20]Wensheng Xu, David W. Chadwick, Sassa Otenko:
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. EuroPKI 2005: 162-179 - [c19]Gansen Zhao, David W. Chadwick:
Evolving Messaging Systems for Secure Role Based Messaging. ICECCS 2005: 216-223 - [c18]David W. Chadwick:
Operational Models for Reputation Servers. iTrust 2005: 108-115 - [c17]Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham:
Automated Decomposition of Access Control Policies. POLICY 2005: 3-13 - [c16]Adomas Svirskas, Michael D. Wilson, Alvaro E. Arenas, Emil C. Lupu, Nilufer Tuptuk, David W. Chadwick, Pablo Giambiagi, Theodosis Dimitrakos, Bob Roberts:
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures. CEC Workshops 2005: 3-11 - [c15]Gansen Zhao, David W. Chadwick:
Trust Infrastructure for Policy based Messaging In Open Environments. WETICE 2005: 144-149 - [e1]David W. Chadwick, Gansen Zhao:
Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3545, Springer 2005, ISBN 3-540-28062-6 [contents] - 2004
- [j14]Darren P. Mundy, David W. Chadwick:
Electronic transmission of prescriptions: towards realising the dream. Int. J. Electron. Heal. 1(1): 112-125 (2004) - [j13]Darren P. Mundy, David W. Chadwick:
An XML Alternative for Performance and Security: ASN.1. IT Prof. 6(1): 30-36 (2004) - [c14]David W. Chadwick, Sassa Otenko, Von Welch:
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure. Communications and Multimedia Security 2004: 251-261 - [c13]David W. Chadwick, Graeme Lunt, Gansen Zhao:
Secure Role Based Messaging. Communications and Multimedia Security 2004: 263-275 - 2003
- [j12]David W. Chadwick:
Deficiencies in LDAP when used to support PKI. Commun. ACM 46(3): 99-104 (2003) - [j11]David W. Chadwick, Darren P. Mundy, John P. New:
Experiences of using a PKI to access a hospital information system by high street opticians. Comput. Commun. 26(16): 1893-1903 (2003) - [j10]David W. Chadwick, Alexander Otenko:
The PERMIS X.509 role based privilege management infrastructure. Future Gener. Comput. Syst. 19(2): 277-289 (2003) - [j9]Edward Ball, David W. Chadwick, Darren P. Mundy:
Patient Privacy in Electronic Prescription Transfer. IEEE Secur. Priv. 1(2): 77-80 (2003) - [j8]David W. Chadwick, Alexander Otenko, Edward Ball:
Role-Based Access Control With X.509 Attribute Certificates. IEEE Internet Comput. 7(2): 62-69 (2003) - [c12]David W. Chadwick, Edward Ball, M. V. Sahalayev:
Modifying LDAP to Support PKI. DBSec 2003: 205-214 - [c11]Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody:
Persistent versus Dynamic Role Membership. DBSec 2003: 344-357 - [c10]David W. Chadwick, Darren P. Mundy:
Policy Based Electronic Transmission of Prescriptions. POLICY 2003: 197-206 - 2002
- [c9]David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:
Privacy and Civil Liberties. DBSec 2002: 331-346 - [c8]David W. Chadwick, Carmen Carroll, S. Harvey, John P. New, Andrew J. Young:
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. HICSS 2002: 156 - [c7]David W. Chadwick, Alexander Otenko:
The PERMIS X.509 role based privilege management infrastructure. SACMAT 2002: 135-140 - [c6]David W. Chadwick, Alexander Otenko:
RBAC Policies in XML for X.509 Based Privilege Management. SEC 2002: 39-54 - 2001
- [j7]David W. Chadwick, Andrew Basden:
Evaluating Trust in a Public Key Certification Authority. Comput. Secur. 20(7): 592-611 (2001) - [j6]Andrew Basden, Edward Ball, David W. Chadwick:
Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure. Expert Syst. J. Knowl. Eng. 18(5): 233-249 (2001) - [c5]David W. Chadwick, John P. New, D. M. McDowall, Darren P. Mundy:
Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. International Conference on Internet Computing (1) 2001: 535-542 - 2000
- [j5]David W. Chadwick, Rana Tassabehji, Andrew J. Young:
Experiences of using a public key infrastructure for the preparation of examination papers. Comput. Educ. 35(1): 1-20 (2000)
1990 – 1999
- 1999
- [j4]David W. Chadwick:
Smart Cards Aren't Always the Smart Choice. Computer 32(12): 142-143 (1999) - 1998
- [c4]David W. Chadwick, Andrew J. Young:
Enabling the Internet White Pages Service - the Directory Guardian. NDSS 1998 - 1997
- [j3]David W. Chadwick, Andrew J. Young, Nada Kapidzic Cicovic:
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model. IEEE Netw. 11(3): 16-24 (1997) - [c3]Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick:
Trust Models in ICE-TEL. NDSS 1997: 122-133 - [i1]David W. Chadwick:
Managing the X.500 Root Naming Context. RFC 2120: 1-14 (1997) - 1996
- [j2]David W. Chadwick:
Important lessons derived from X.500 case studies. IEEE Netw. 10(2): 22-34 (1996) - [j1]David W. Chadwick:
A method for collecting case study information via the Internet. IEEE Netw. 10(2): 36-38 (1996) - 1994
- [b1]David W. Chadwick:
Understanding X.500 - the directory. Chapman and Hall 1994, ISBN 978-0-412-43020-6, pp. I-XVII, 1-404 - [c2]David W. Chadwick, Nick Pope:
Interdomain Guardians in a Distributed Directory Service. INDC 1994: 347-365 - 1993
- [c1]Alex Andrianopoulos, David W. Chadwick:
Simulating The Global Directory Service With OPNET. Annual Simulation Symposium 1993: 162-172
Coauthor Index
aka: Alexander Otenko
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint