|
Search the dblp DataBase
Jim J. Longstaff:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey
A general model of authorisation for complex computing applications. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:74-79 [Conf]
- Jim J. Longstaff, Mike A. Lockyer, M. G. Thick
A model of accountability, confidentiality and override for healthcare and other applications. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 2000, pp:71-76 [Conf]
- Jim J. Longstaff, Mike A. Lockyer, John Nicholas
The tees confidentiality model: an authorisation model for identities and roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:125-133 [Conf]
Search in 0.001secs, Finished in 0.001secs
|