Journal articles

  • Farooqi N & North SD (2013) Performance Evaluation of Trust Based Access Control for XML Databases. Journal of Internet Technology and Secured Transactions, 2(1/2), 147-147. RIS download Bibtex download
  • Farooqi N & North S (2012) Evaluation of practical trust based access control for XML databases. 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012, 336-340. RIS download Bibtex download
  • Al-Badawi M, Ramadhan HA, North S & Eaglestorne B (2012) A performance evaluation of a new bitmap-based XML processing approach over RDBMS. International Journal of Web Engineering and Technology, 7(2), 143-172. RIS download Bibtex download
  • Farooqi N & North S (2011) Trust-based access control for XML databases. 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, 764-765. RIS download Bibtex download
  • Derrick J, North S & Simons AJH (2011) Z2SAL: a translation-based model checker for Z. FORM ASP COMPUT, 23(1), 43-71. View this article in WRRO RIS download Bibtex download
  • Al-Badawi M, North S & Eaglestone B (2010) The 3D XML benchmark. WEBIST 2010 - Proceedings of the 6th International Conference on Web Information Systems and Technology, 1, 13-20. RIS download Bibtex download
  • Derrick J, North S & Simons AJH (2009) Z2SAL: a translation-based model checker for Z. Formal Aspects of Computing, 1-29. RIS download Bibtex download

Conference proceedings papers

  • Alsubai S & North SD (2017) A Prime Number Approach to Matching an XML Twig Pattern including Parent-Child Edges. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES (pp 204-211), 25 April 2017 - 27 May 2017. View this article in WRRO RIS download Bibtex download
  • Al Zadjali H & North S (2016) XML Labels Compression using Prefix-encodings. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1 (WEBIST) (pp 69-75) View this article in WRRO RIS download Bibtex download
  • Farooqi N & North S (2015) Time cost evaluation of trust based access control for XML databases. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) (pp 324-326) View this article in WRRO RIS download Bibtex download
  • Derrick J, North S & Simons AJH (2011) Building a refinement checker for Z. Refine@FM, Vol. 55 (pp 37-52) RIS download Bibtex download
  • Al-Badawi M, Eaglestone B & North S (2009) PACD: A BITMAP-BASED FRAMEWORK FOR PROCESSING XML DATA. WEBIST 2009: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES (pp 66-71) RIS download Bibtex download
  • Kader YA, Eaglestone B & North S (2008) An analysis of relational storage strategies for partially structured XML. WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1 (pp 165-170) RIS download Bibtex download
  • Derrick J, North S & Simons AJH (2008) Z2SAL-Building a Model Checker for Z. ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, Vol. 5238 (pp 280-293) View this article in WRRO RIS download Bibtex download
  • Derrick J, North S & Simons T (2006) Issues in implementing a model checker for Z. Formal Methods and Software Engineering, Proceedings, Vol. 4260 (pp 678-696) RIS download Bibtex download