Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paul Anthony Ashley is active.

Publication


Featured researches published by Paul Anthony Ashley.


workshop on privacy in the electronic society | 2002

E-P3P privacy policies and privacy authorization

Paul Anthony Ashley; Satoshi Hada; Günter Karjoth; Matthias Schunter

Enterprises collect large amounts of personal data from their customers. To ease privacy concerns, enterprises publish privacy statements that outline how data is used and shared. The Platform for Enterprise Privacy Practices (E-P3P) defines a fine-grained privacy policy model. A Chief Privacy Officer can use E-P3P to formalize the desired enterprise-internal handling of collected data. A particular data user is then allowed to use certain collected data for a given purpose if and only if the E-P3P authorization engine allows this request based on the applicable E-P3P policy. By enforcing such formalized privacy practices, E-P3P enables enterprises to keep their promises and prevent accidental privacy violations.


annual computer security applications conference | 2001

Wired versus wireless security: the Internet, WAP and iMode for E-commerce

Paul Anthony Ashley; Heather Maria Hinton; Mark Vandenwauver

The perceived lack of security in the wireless environment has delayed many initiatives in providing access to E-commerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) E-commerce environment are also available for wireless transactions. We show that these perceptions are misplaced. We describe the security properties and mechanisms available for Internet (wired), WAP based and iMode E-commerce. We find that both WAP and iMode provide excellent security features and are geared to provide other security provisions over and above those commonly available in a wired environment.


india software engineering conference | 2002

Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control

Calvin S. Powers; Paul Anthony Ashley; Matthias Schunter

Regulations and consumer backlash force many organizations to re-evaluate the way they manage private data. As a first step, they publish privacy promises as text or P3P. These promises are not backed up by privacy technology that enforces the promises throughout the enterprise. Privacy tools cover fractions of the problem while leaving the main challenge unanswered. This article describes a new approach towards enterprisewide enforcement of the privacy promises. Its core is a new framework for managing collected personal data in a sensitive, trustworthy way. The framework enables enterprises to publish clear privacy promises, to collect and manage user preferences and consent, and to enforce the privacy promises throughout the enterprise. This article shows how this new approach extends the traditional view of access control to provide a more complete coverage of privacy management issues.


Computer Communications | 2000

Applying authorization to intranets: architectures, issues and APIs

Paul Anthony Ashley; Mark Vandenwauver; Frank Siebenlist

There are a number of proposed solutions to solve the Intranet authorization problem. They fall into two categories: architectures for providing an authorization framework, and generic authorization application programmer interfaces (APIs) for allowing applications access to the authorization services. This paper examines the leading initiatives in these areas: DCE, SESAME and Windows2000 as authorization frameworks and the GSS-API, GAA-API and AZN-API. The paper stresses the important issues related to implementing an authorization service.


international conference on information security and cryptology | 2001

Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment

Richard Au; Mark Looi; Paul Anthony Ashley; Loo Tang Seet

New portable computers and wireless communication technologies have significantly enhanced mobile computing. The emergence of network technology that supports user mobility and universal network access has prompted new requirements and concerns, especially in the aspects of access control and security. In this paper, we propose a new approach using authorisation agents for cross-domain access control in a mobile computing environment. Our framework consists of three main components, namely centralised authorisation servers, authorisation tokens and authorisation agents. An infrastructure of centralised authorisation servers and application servers from different domains is proposed for supporting trust propagation to mobile hosts instantaneously. While the authorisation token is a form of static capability, the authorisation agent on the client side can be regarded as a dynamic capability to provide the functionality in client-server interactions. It works collaboratively with remote servers to provide authorisation service with finer access granularity and higher flexibility.


Archive | 2004

Method and system for externalizing session management using a reverse proxy server

Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver


new security paradigms workshop | 2002

From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise

Paul Anthony Ashley; Calvin S. Powers; Matthias Schunter


Archive | 2003

METHOD AND SYSTEM FOR STEPPING UP TO CERTIFICATE-BASED AUTHENTICATION WITHOUT BREAKING AN EXISTING SSL SESSION

Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver


Archive | 2004

Method and system for implementing privacy policy enforcement with a privacy proxy

Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver


Archive | 2003

Method and system for providing user control over receipt of cookies from e-commerce applications

Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver

Researchain Logo
Decentralizing Knowledge