Tees confidentiality model (TCM2): Supporting dynamic authorization and overrides in attribute- based access control

Jim Longstaff, Tony Howitt

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)

    Fingerprint Dive into the research topics of 'Tees confidentiality model (TCM2): Supporting dynamic authorization and overrides in attribute- based access control'. Together they form a unique fingerprint.

    Engineering & Materials Science