Slaymaker, Mark
60  results:
Search for persons X
?
1

Bob or Bot: Exploring ChatGPT's Answers to University Compu..:

Richards, Mike ; Waugh, Kevin ; Slaymaker, Mark...
ACM Transactions on Computing Education.  24 (2024)  1 - p. 1-32 , 2024
 
?
 
?
4

Automatic Conformance Checking of Role-Based Access Control..:

, In: Lecture Notes in Computer Science; Engineering Secure Software and Systems,
 
?
5

Automatic conformance checking of role-based access control..:

, In: Proceedings of the Third international conference on Engineering secure software and systems,
 
?
6

GIMI: the past, the present and the future:

Simpson, Andrew ; Power, David ; Russell, Douglas...
Philosophical Transactions: Mathematical, Physical and Engineering Sciences.  368 (2010)  1925 - p. 3891-3905 , 2010
 
?
7

Accessing and aggregating legacy data sources for healthcar..:

, In: Proceedings of the 2008 ACM symposium on Applied computing,
Slaymaker, Mark ; Power, David ; Russell, Douglas.. - p. 1317-1324 , 2008
 
?
8

On tracker attacks in health grids:

, In: Proceedings of the 2006 ACM symposium on Applied computing,
Simpson, Andrew ; Power, David ; Slaymaker, Mark - p. 209-216 , 2006
 
?
9

Multimodal Imaging Techniques for the Extraction of Detaile..:

Pitt-Francis, Joe ; Chen, Dan ; Slaymaker, Mark...
Computational and Mathematical Methods in Medicine.  7 (2006)  2-3 - p. 177-188 , 2006
 
?
10

Protecting sensitive patient data via query modification:

, In: Proceedings of the 2005 ACM symposium on Applied computing,
Power, David ; Slaymaker, Mark ; Politou, Eugenia. - p. 224-230 , 2005
 
?
11

A relational approach to the capture of DICOM files for Gri..:

, In: Proceedings of the 2004 ACM symposium on Applied computing,
Power, David ; Politou, Eugenia ; Slaymaker, Mark.. - p. 272-279 , 2004
 
?
12

SoNeUCON_{ABC}Pro: an access control model for social netwo..:

González Manzano, Lorena ; Slaymaker, Mark ; Fuentes García-Romero de Tejada, José María de.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.  , 2018
 
?
13

The formalisation and transformation of access control poli..:

Slaymaker, M ; Slaymaker, Mark
https://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb.  , 2016
 
1-15