2005 |
7 | | Jim J. Longstaff,
Mike A. Lockyer,
Tony Howitt,
Ian Elcoate,
Paul Massey:
A general model of authorisation for complex computing applications.
ICETE 2005: 74-79 |
2004 |
6 | EE | Briony J. Oates,
Gary Griffiths,
Mike A. Lockyer,
Barry D. Hebbron:
Empirical Methodologies for Web Engineering.
ICWE 2004: 311-315 |
2003 |
5 | EE | Mike A. Lockyer,
Gary Griffiths,
Barry D. Hebbron,
Briony J. Oates:
A Teaching Method & Tool for Web Engineering.
ICALT 2003: 284-285 |
4 | | Gary Griffiths,
Mike A. Lockyer,
Briony J. Oates,
Barry D. Hebbron:
Simple Techniques for Complex Web Applications.
ICWI 2003: 1068-1071 |
3 | EE | Jim J. Longstaff,
Mike A. Lockyer,
John Nicholas:
The tees confidentiality model: an authorisation model for identities and roles.
SACMAT 2003: 125-133 |
2002 |
2 | EE | Gary Griffiths,
Barry D. Hebbron,
Mike A. Lockyer,
Briony J. Oates:
A simple method & tool for web engineering.
SEKE 2002: 755-762 |
2000 |
1 | EE | Jim J. Longstaff,
Mike A. Lockyer,
M. G. Thick:
A model of accountability, confidentiality and override for healthcare and other applications.
ACM Workshop on Role-Based Access Control 2000: 71-76 |