|
Search the dblp DataBase
Mike A. Lockyer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gary Griffiths, Mike A. Lockyer, Briony J. Oates, Barry D. Hebbron
Simple Techniques for Complex Web Applications. [Citation Graph (0, 0)][DBLP] ICWI, 2003, pp:1068-1071 [Conf]
- Mike A. Lockyer, Gary Griffiths, Barry D. Hebbron, Briony J. Oates
A Teaching Method & Tool for Web Engineering. [Citation Graph (0, 0)][DBLP] ICALT, 2003, pp:284-285 [Conf]
- Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey
A general model of authorisation for complex computing applications. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:74-79 [Conf]
- Briony J. Oates, Gary Griffiths, Mike A. Lockyer, Barry D. Hebbron
Empirical Methodologies for Web Engineering. [Citation Graph (0, 0)][DBLP] ICWE, 2004, pp:311-315 [Conf]
- Jim J. Longstaff, Mike A. Lockyer, M. G. Thick
A model of accountability, confidentiality and override for healthcare and other applications. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 2000, pp:71-76 [Conf]
- Jim J. Longstaff, Mike A. Lockyer, John Nicholas
The tees confidentiality model: an authorisation model for identities and roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:125-133 [Conf]
- Gary Griffiths, Barry D. Hebbron, Mike A. Lockyer, Briony J. Oates
A simple method & tool for web engineering. [Citation Graph (0, 0)][DBLP] SEKE, 2002, pp:755-762 [Conf]
An automated student diagram assessment system. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|