| 2001 |
| 11 | EE | Jonathon Tidswell,
John Potter:
A graphical definition of authorization schema in the DTAC model.
SACMAT 2001: 109-120 |
| 10 | EE | Trent Jaeger,
Jonathon Tidswell:
Practical safety in flexible access control models.
ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001) |
| 2000 |
| 9 | EE | Jonathon Tidswell,
Trent Jaeger:
An access control model for simplifying constraint expression.
ACM Conference on Computer and Communications Security 2000: 154-163 |
| 8 | EE | Alain Gefflaut,
Trent Jaeger,
Yoonho Park,
Jochen Liedtke,
Kevin Elphinstone,
Volkmar Uhlig,
Jonathon Tidswell,
Luke Deller,
Lars Reuther:
The SawMill multiserver approach.
ACM SIGOPS European Workshop 2000: 109-114 |
| 7 | EE | Trent Jaeger,
Jonathon Tidswell,
Alain Gefflaut,
Yoonho Park,
Kevin Elphinstone,
Jochen Liedtke:
Synchronous IPC over transparent monitors.
ACM SIGOPS European Workshop 2000: 189-194 |
| 6 | EE | Trent Jaeger,
Jonathon Tidswell:
Rebuttal to the NIST RBAC model proposal.
ACM Workshop on Role-Based Access Control 2000: 65-66 |
| 5 | EE | Jonathon Tidswell,
Trent Jaeger:
Integrated constraints and inheritance in DTAC.
ACM Workshop on Role-Based Access Control 2000: 93-102 |
| 1999 |
| 4 | EE | Jonathon Tidswell,
Geoffrey H. Outhred,
John Potter:
Dynamic Rights: Safe Extensible Access Control.
ACM Workshop on Role-Based Access Control 1999: 113-120 |
| 1998 |
| 3 | EE | Jonathon Tidswell,
John Potter:
A Dynamically Typed Access Control Model.
ACISP 1998: 308-319 |
| 1997 |
| 2 | | Jonathon Tidswell,
John Potter:
An Approach to Dynamic Domain and Type Enforcement.
ACISP 1997: 26-37 |
| 1996 |
| 1 | | Antonios Symvonis,
Jonathon Tidswell:
An Empirical Study of Off-Line Permutation Packet Routing on Two-Dimensional Meshes Based on the Multistage Routing Method.
IEEE Trans. Computers 45(5): 619-625 (1996) |