Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Paul Anthony Ashley.
workshop on privacy in the electronic society | 2002
Paul Anthony Ashley; Satoshi Hada; Günter Karjoth; Matthias Schunter
Enterprises collect large amounts of personal data from their customers. To ease privacy concerns, enterprises publish privacy statements that outline how data is used and shared. The Platform for Enterprise Privacy Practices (E-P3P) defines a fine-grained privacy policy model. A Chief Privacy Officer can use E-P3P to formalize the desired enterprise-internal handling of collected data. A particular data user is then allowed to use certain collected data for a given purpose if and only if the E-P3P authorization engine allows this request based on the applicable E-P3P policy. By enforcing such formalized privacy practices, E-P3P enables enterprises to keep their promises and prevent accidental privacy violations.
annual computer security applications conference | 2001
Paul Anthony Ashley; Heather Maria Hinton; Mark Vandenwauver
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to E-commerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) E-commerce environment are also available for wireless transactions. We show that these perceptions are misplaced. We describe the security properties and mechanisms available for Internet (wired), WAP based and iMode E-commerce. We find that both WAP and iMode provide excellent security features and are geared to provide other security provisions over and above those commonly available in a wired environment.
india software engineering conference | 2002
Calvin S. Powers; Paul Anthony Ashley; Matthias Schunter
Regulations and consumer backlash force many organizations to re-evaluate the way they manage private data. As a first step, they publish privacy promises as text or P3P. These promises are not backed up by privacy technology that enforces the promises throughout the enterprise. Privacy tools cover fractions of the problem while leaving the main challenge unanswered. This article describes a new approach towards enterprisewide enforcement of the privacy promises. Its core is a new framework for managing collected personal data in a sensitive, trustworthy way. The framework enables enterprises to publish clear privacy promises, to collect and manage user preferences and consent, and to enforce the privacy promises throughout the enterprise. This article shows how this new approach extends the traditional view of access control to provide a more complete coverage of privacy management issues.
Computer Communications | 2000
Paul Anthony Ashley; Mark Vandenwauver; Frank Siebenlist
There are a number of proposed solutions to solve the Intranet authorization problem. They fall into two categories: architectures for providing an authorization framework, and generic authorization application programmer interfaces (APIs) for allowing applications access to the authorization services. This paper examines the leading initiatives in these areas: DCE, SESAME and Windows2000 as authorization frameworks and the GSS-API, GAA-API and AZN-API. The paper stresses the important issues related to implementing an authorization service.
international conference on information security and cryptology | 2001
Richard Au; Mark Looi; Paul Anthony Ashley; Loo Tang Seet
New portable computers and wireless communication technologies have significantly enhanced mobile computing. The emergence of network technology that supports user mobility and universal network access has prompted new requirements and concerns, especially in the aspects of access control and security. In this paper, we propose a new approach using authorisation agents for cross-domain access control in a mobile computing environment. Our framework consists of three main components, namely centralised authorisation servers, authorisation tokens and authorisation agents. An infrastructure of centralised authorisation servers and application servers from different domains is proposed for supporting trust propagation to mobile hosts instantaneously. While the authorisation token is a form of static capability, the authorisation agent on the client side can be regarded as a dynamic capability to provide the functionality in client-server interactions. It works collaboratively with remote servers to provide authorisation service with finer access granularity and higher flexibility.
Archive | 2004
Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver
new security paradigms workshop | 2002
Paul Anthony Ashley; Calvin S. Powers; Matthias Schunter
Archive | 2003
Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver
Archive | 2004
Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver
Archive | 2003
Paul Anthony Ashley; Sridhar R. Muppidi; Mark Vandenwauver