Books

  • Eaglestone B, North S & Poulovassilis A (2002) Foreword.

Journal articles

  • Farooqi N & North SD (2013) Performance Evaluation of Trust Based Access Control for XML Databases. Journal of Internet Technology and Secured Transactions, 2(1/2), 147-147.
  • Farooqi N & North S (2012) Logging in XML databases: Xlog file for trust based access control. World Congress on Internet Security, WorldCIS-2012, 174-175.
  • Farooqi N & North S (2012) Evaluation of practical trust based access control for XML databases. 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012, 336-340.
  • Al-Badawi M, Ramadhan HA, North S & Eaglestorne B (2012) A performance evaluation of a new bitmap-based XML processing approach over RDBMS. International Journal of Web Engineering and Technology, 7(2), 143-172.
  • Farooqi N & North S (2011) Trust-based access control for XML databases. 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, 764-765.
  • Derrick J, North S & Simons AJH (2011) Z2SAL: a translation-based model checker for Z. FORM ASP COMPUT, 23(1), 43-71. View this article in WRRO
  • Al-Badawi M, North S & Eaglestone B (2010) The 3D XML benchmark. WEBIST 2010 - Proceedings of the 6th International Conference on Web Information Systems and Technology, 1, 13-20.
  • Derrick J, North S & Simons AJH (2009) Z2SAL: a translation-based model checker for Z. Formal Aspects of Computing, 1-29.
  • North SD (1985) Implementation of a Pascal Database Management System. Journal of Pascal, Ada and Modula-2, 4(5), 15-28.
  • Ullmann JR & North SD (1984) A Pascal Database Management System. Journal of Pascal, Ada and Modula-2, 3(6), 15-22.
  • ATKINSON LV, MCGREGOR JJ & NORTH SD (1981) CONTEXT SENSITIVE EDITING AS AN APPROACH TO INCREMENTAL COMPILATION. COMPUT J, 24(3), 222-229.
  • ATKINSON LV & NORTH SD (1981) COPAS - A CONVERSATIONAL PASCAL SYSTEM. SOFTWARE PRACT EXPER, 11(8), 819-829.

Conference proceedings papers