참고문헌
- David F. Ferraiolo and D. Richard Kuhn, 'Rolebased access controls,' 15th NIST- NCSC National Computer Security Conference, pp.554-563, Baltimore. MD, October 13-16, 1992
- http://hissa.ncsl.nisl.gov/rbac/
- John F Barkley. Anthony V. Cincotta, David F. Ferraiolo, Servan Gavrilla. and D Richard Kuhn, 'Role Based Access Control for the World Wide Web,' 20th NISSC National Information Systems Security Conference, pp 331-340, Oct.. 7-10, Baltimore Convention Center, Baltimore, MD. April 8, 1997
- Larry S. Bartz, 'hyperDRIVE : leveraging LDAP to implement RBAC on the Web,' pp 69-74. REAC'97. Proceedings of the 2nd ACM workshop on Rolebased access control, Fairfax, VA, Nov. 6-7, 1997 https://doi.org/10.1145/266741.266759
- David Ferraiolo and John Ba가ley, 'Specifying and managing role-based access control within a corporate intranet,' pp.77-82, RBAC'97. Proceedings of the 2nd ACM workshop on Role-based access control, Fairfax, VA. Nov 6-7, 1997 https://doi.org/10.1145/266741.266761
- Ravi Sandhu and Jcon S. Park, 'Centralized userrole assignment for Web-based intranets,' pp 1-12, RBAC'98. Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, VA Oct. 22-23, 1998
- Joon S. Park and Ravi Sandhu. 'RBAC on the Web by Smart Certificates,' RBAC'99. Proceedings of the 4th ACM workshop on Role-based access control, Fairfax, VA, Oct. 28-29, 1999 https://doi.org/10.1145/319171.319172
- Raymond K. Wong, 'RBAC support In objectoriented role databases,' pp.109-120, RBAC'97. Proceedings of the 2nd ACM workshop on Role-based access control Fairfax, VA VA. Nov. 6-7, 1997 https://doi.org/10.1145/266741.266765
- Tor Didriksen, 'Rule based database access control - a practical approach,' pp 143-151, RBAC'97. Proceedings of the 2nd ACM workshop on Role-based access control Fairfax, VA VA. Nov. 6-7, 1997 https://doi.org/10.1145/266741.266772
- Ravi Sandhu and Venkaia Bhamid.ipati, 'An Oracle Implementation of the PRA97 model for permission-role assignment,' pp.13-21. RBAC'98. Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, VA Oct. 22-23, 1998 https://doi.org/10.1145/286884.286889
- David F Ferraiolo, Janet A. Cugini and D. Richard Kuhn, 'Role-Based Access Control(RBAC) : Features and Motivations,' Annual Computer Security; Applications Conference. pp 554-563. IEEE Computer Society. 1995
- David Ferraiolo, Dennis M, Gilbert, and Nickilyn Lynch. 'An examination of federal and commercial access control policy needs,' 16th NIST-NCSC National Computer Security Conference, pp107-116, Baltimore, MD, September 20-23, 1993
- Computer Systems Laboratory(CSL) Bulletin, 'An Introduction to Role-Based Access Control,' December, 1995
- http://csrc.omg.org/corba/sectrans htm#secl, 'CORBAServices : Common Object Services Specification.' 1998
- John F. Barkley, Konstantin Beznosov, and Jinny Uppal. 'Supportmg Relationships In Access Control Using Role Based Access Control,' pp.55-65. RBAC'99. Proceedings of the 4th ACM workshop on Role'-based access control, Fairfax, VA, Oct. 28-29. 1999
- ISO/lEC 15408-2, Information Technology-Securiry Techniques-Evaluation Criteria for IT Security - Part 2 : Security functional requirements. Aug, 1999
- ISO/lEC 9075-2, Information Technology - Database Language SQL-Part 2. Fooudation(SQL: 1999), Nov, 1999
- Jim Reynolds, Ramaswamy Chandramouli, Role-Based Access Control Protection Profile, Ver. 1.0, Cygnacom Solutions & NIST. July 30, 1998
- Ravi Sandhu, 'Role Hierarchies and Constraints for Lattice-Based Access Control.' Proc. Fourth European Symposium on Research in Computer Security. Rome. Italy, September 25-27, 1996
- Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, 'Role-Based Access Control models.' IEEE Computer, pp.38-47, Vol 29. No.2. February, 1996
- W. A. Jansen, 'Inheritance Properties of Role Hierarchies.' 21th NCSC/NIST NISSC National Information Systems Security Conference. pp 476-485. Crystal City, VA, October 5-8. 1998
- David F. Ferraiolo, John F. Barkley, and D Richard Kuhn, 'A Role Based Access Control Model and Reference Implementation within a Corporate Intranet,' ACM Transaction on Information System Security, pp.34-64. Vol.2 No.1, Feb., 1999 https://doi.org/10.1145/300830.300834