A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS Topics: Data and Systems Security and Privacy; e-Commerce Security and Reliability Issues; Identification and Authentication In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, 74-79, 2005 , Reading, United Kingdom