Mark Vandenwauver

Learn More
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work was done in the framework of the EC-RACE project SESAME (A Secure European System in A Multivendor Environment). The SESAME project relies on the work done by ECMA (European(More)
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) e-commerce environment are also available for wireless transactions. In(More)
At the approach of the next millenium, enterprises are facing a lot of challenges and have to decide in which direction their communication networks will evolve. At the moment we see a large shift towards using global intranets and extranets. Most of the time it is also necessary to connect these networks to the Internet. During the consultancy work we(More)
In recent years there has been a phenomenal increase in the use of networking. Both Internet and Intranets have become a standard infrastructure to exchange information. Due to their success it has become possible to ooer services that were unthinkable ve years ago: electronic commerce, distance learning, remote libraries, etc. Cryptographic solutions are(More)