Author of the publication

Information governance in NHS's NPfIT: A case for policy specification.

. I. J. Medical Informatics, 76 (5-6): 432-437 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abductive Authorization Credential Gathering., , and . POLICY, page 1-8. IEEE Computer Society, (2009)Information governance in NHS's NPfIT: A case for policy specification.. I. J. Medical Informatics, 76 (5-6): 432-437 (2007)Cassandra: Distributed Access Control Policies with Tunable Expressiveness., and . POLICY, page 159-168. IEEE Computer Society, (2004)Specification and Analysis of Dynamic Authorisation Policies.. CSF, page 203-217. IEEE Computer Society, (2009)A graph layout algorithm for drawing metabolic pathways, and . Bioinformatics, 17 (5): 461-467 (2001)Information Flow in Credential Systems.. CSF, page 171-185. IEEE Computer Society, (2010)A logic for state-modifying authorization policies., and . ACM Trans. Inf. Syst. Secur., 13 (3): 20:1-20:28 (2010)Information flow in trust management systems.. Journal of Computer Security, 20 (6): 677-708 (2012)Opacity Analysis in Trust Management Systems., and . ISC, volume 7001 of Lecture Notes in Computer Science, page 229-245. Springer, (2011)The Role of Abduction in Declarative Authorization Policies., and . PADL, volume 4902 of Lecture Notes in Computer Science, page 84-99. Springer, (2008)