References
- 11th Annual Computer Security Applications Conference Role-Based Access Control(RBAC) : Features and Motivations David F. Ferraiolo;Janet A. Cugini;D. Richard Kuhn
- IEEE Computer v.29 no.2 Role-Based Access Control Models Ravi S. Sandhu;Edward J. Coyne;Hal L. Feinstein;Charles E. Youman
- Advances in Computers v.46 Role-Based Access Control Ravi S. Sandhu
- 11th Annual Computer Security Applications Conference A New Model for Role-Based Access Control Luigi Giuri
- 20th National Information Systems Security Conference Observations on the Real-World Implementation of Role-Based Access Control Burkhard Hilchenbach
- 21th National Information Systems Security Conference Ingeritance Properties of Role Hierarchies W. A. Jansen
- CALS Expo International & 21st Century Commerce 1998 : Global Business Solutions for the New Millennium Role-Based Access Control for the Web Barkley, Kuhn, Rosenthal, Skall, Cin-cotta
- 제3회 정보보호 심포지움 금융정보망 정보보호현황 및 강화방향 조이남
- 16th National Computer Security Conference An Examination of Federal and Commercial Access Control Policy Needs David F. Ferraiolo;Dennis M. Gilbert;Nickilyn Lynch