![]() |
| 2005 | ||
|---|---|---|
| 3 | Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey: A general model of authorisation for complex computing applications. ICETE 2005: 74-79 | |
| 2003 | ||
| 2 | EE | Jim J. Longstaff, Mike A. Lockyer, John Nicholas: The tees confidentiality model: an authorisation model for identities and roles. SACMAT 2003: 125-133 |
| 2000 | ||
| 1 | EE | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick: A model of accountability, confidentiality and override for healthcare and other applications. ACM Workshop on Role-Based Access Control 2000: 71-76 |
| 1 | Ian Elcoate | [3] |
| 2 | Tony Howitt | [3] |
| 3 | Mike A. Lockyer | [1] [2] [3] |
| 4 | Paul Massey | [3] |
| 5 | John Nicholas | [2] |
| 6 | M. G. Thick | [1] |