Journal articles

  • Farooqi N & North SD (2013) Performance Evaluation of Trust Based Access Control for XML Databases. Journal of Internet Technology and Secured Transactions, 2(1/2), 147-147.
  • Farooqi N & North S (2012) Evaluation of practical trust based access control for XML databases. 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012, 336-340.
  • Al-Badawi M, Ramadhan HA, North S & Eaglestorne B (2012) A performance evaluation of a new bitmap-based XML processing approach over RDBMS. International Journal of Web Engineering and Technology, 7(2), 143-172.
  • Farooqi N & North S (2011) Trust-based access control for XML databases. 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, 764-765.
  • Derrick J, North S & Simons AJH (2011) Z2SAL: a translation-based model checker for Z. FORM ASP COMPUT, 23(1), 43-71. View this article in WRRO
  • Al-Badawi M, North S & Eaglestone B (2010) The 3D XML benchmark. WEBIST 2010 - Proceedings of the 6th International Conference on Web Information Systems and Technology, 1, 13-20.
  • Derrick J, North S & Simons AJH (2009) Z2SAL: a translation-based model checker for Z. Formal Aspects of Computing, 1-29.

Conference proceedings papers