1. D. W. Chadwick, L. Su and R. Laborde, “Coordinating access control in grid services”, Concurrency and Computation: Practice and Experience, vol. 20, no. 9, pp. 1071-1094, Jun. 2008.
  2. D. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su and T. A. Nguyen, “PERMIS: a modular authorization infrastructure”, Concurrency and Computation: Practice and Experience, vol. 20, no. 11, pp. 1341-1357, Aug. 2008.
  3. D. W. Chadwick et al., “Interface Intelligence”, Public Service Review: Home Affairs, PSCA International, no. 17, pp. 136-138, Spring 2008.


  1. D. W. Chadwick, “Dynamic Delegation of Authority in Web Services”, in Securing Web Services: Practical Usage of Standards and Specifications, P. Periorellis, Hershey, PA: IGI International, 2008, ch. 5, pp. 111-137.
  2. A. Ferreira, R. Cruz-Correia, L. Antunes and D. Chadwick, “Chapter III. Security of Electronic Medical Records”, in Handbook of Research on Distributed Medical Informatics and E-Health, A. A. Lazakidou, K. M. Siassiakos, Hershey, PA: IGI International, 2008, pp. 30-47.

Published Conference Proceedings

  1. I. Dahn, “Using Fedora in the European Project TAS³ to Handle Person-Related Information”, in 3rd Int. Conf. on Open Repositories, Southampton, UK, 2008.
  2. P. Inglesant, M. A. Sasse, D. Chadwick and L. L. Shi, “Expressions of expertness: the virtuous circle of natural language for access control policy specification”, in Proceedings of the 4th symposium on Usable privacy and security, Pittsburgh, PA, 2008, pp. 77-88.
  3. D. Bragin, D. Chadwick, “Problems with Using W3C XML schema for validating XML based security policies”, in 10th Annu. Conf. On World Wide Web Applications, Cape Town, South Africa, 2008.
  4. A. Ferreira, R. Correia, D. W. Chadwick and L. Antunes, “Improving the Implementation of Access Control to Electronic Medical Records”, in 42nd IEEE Int. Carnahan Conf. on Security Technology, Prague, Czech Republic, 2008, pp. 47-50.
  5. D. W. Chadwick, S. F. Lievens, “Enforcing “sticky” security policies throughout a distributed application”, in Proceedings of the 2008 workshop on Middleware security, 2008, pp. 1-6.
  6. A. Bertolino, G. De Angelis, F. Lonetti and A. Sabetta, “Let the puppets move! automated testbed generation for service-oriented mobile applications”, in 34th Euromicro Conference on Software Engineering and Advanced Applications, Parma, Italy, 2008, pp. 11-19.
  7. A. Bertolino, E. Cartaxo, P. Machado and E. Marchetti, “Weighting influence of user behavior in software validation”, in Proc of 1st Int. Workshop on Computer Users’ Behaviour in conjunction with the 19th International Conference on Database and Expert Systems Application, Turin, Italy, 2008, pp. 495-500.
  8. F. Corradini, F. Angelis, A. Polini and A. Polzonetti, “Improving Trust in Composite eServices Via Run-Time Participants Testing”, in Proceedings of the 7th international conference on Electronic Government, Turin, Italy, 2008, pp. 279-290.
  9. A. Bertolino, G. De Angelis and A. Sabetta, “VCR: Virtual Capture and Replay for Performance Testing”, in Proceedings of the 23rd International Conference on Automated Software Engineering, L’Aquila, Italy, 2008, pp. 50-54.
  10. A. Bertolino, G. De Angelis, A. Di Marco, P. Inverardi, A. Sabetta and M. Tivoli, “A Framework for Analyzing and Testing the Performance of Software Services”, in Proceedings of the 3rd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, Porto Sani, Greece, October 13-15 2008, pp. 206-220.
  11. S. Barker et al., “Panel Session: What Are the Key Challenges in Distributed Security?”, in LNCS, vol. 5094/2008, Data and Applications Security XXII, 2008, pp. 219-221.
  12. R. O. Sinnott, D. W. Chadwick, T. Doherty, D. Martin, A. Stell, G. Stewart, L. Su and J. Watt, “Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security models”, in Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid, Lyon, France, 2008, pp. 106-113.