![]() | ![]() |
2005 | ||
---|---|---|
3 | Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey: A general model of authorisation for complex computing applications. ICETE 2005: 74-79 | |
2003 | ||
2 | EE | Jim J. Longstaff, Mike A. Lockyer, John Nicholas: The tees confidentiality model: an authorisation model for identities and roles. SACMAT 2003: 125-133 |
2000 | ||
1 | EE | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick: A model of accountability, confidentiality and override for healthcare and other applications. ACM Workshop on Role-Based Access Control 2000: 71-76 |
1 | Ian Elcoate | [3] |
2 | Tony Howitt | [3] |
3 | Mike A. Lockyer | [1] [2] [3] |
4 | Paul Massey | [3] |
5 | John Nicholas | [2] |
6 | M. G. Thick | [1] |