References
- 15th NIST-NCSC National Computer Security Conference Role-based access controls David F. Ferraiolo;D. Richard kuhn
- 16th NIST-NCSC National Computer Security Conference An examination of federal and commercial access control policy needs David Ferraiolo;Dennis M. Gilbert;Nickilyn Lynch
- Annual Computer Security Applications Conference Role-Based Access Control(RBAC) : Features and Motivations David F. Ferraiolo;Janet A. Cugini:D. Richard Kuhn
- IEEE Computer v.29 no.2 Role-Based Access Control Models Ravi S. Sandhu;Edward J. Coyne;Hal L. Feinstein;Charles E. Youman
- 20th NISSC National Information Systems Security Conference, Oct. 7-10 Role Based Access Control for the World Wide Web John F. Barkley;Anthony V. Cincotta;David F. Ferraiolo;Servan Gavrilla;D. Richard Kuhn
- ACM Transaction on Information System Security v.2 no.1 A Role Based Access Control Model and Reference Implementation within a Corporate Intranet David F. Ferraiolo;John F. Barkley;D. Richard Kuhn
- 21th NCSC/NIST NISSC National Information Systems Security Conference Inheritance Properties of Role Hierarchies W.A. Jansen
- 한국통신정보보호학회논문지 v.9 no.1 확장된 역할기반 접근 통제 모델 김학범;홍기융;김동규
- An Introduction to Role-Based Access Control Computer Systems Laboratory(CSL) Bulletin
- CORBAServices : Common Object Services Specification
- NIST&SETA A Marketing Survey of Civil Federal Government Organizations to Determine the Need for a Role-Based Access Control(RBAC) Security Product Charles L. Smith;Edward J. Coyne;Charles E. Youman;Srinivas Ganta
- Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 2 : Security functional require ments
- Role-Based Access Control Protection Profile, Ver. 1.0 Jim Reynolds;Ramaswamy Chand ramouli
- Information Technology - Database Language SQL - Part 2, Foundation(SQL : 1999)
- RBAC 2000 Proceedings of the Fourth ACM workshop on Role-based access control The NIST Model for Role-Based Access Control : Towards A Unified Standard Ravi S. Sandhu;David Ferraiolo;D. Richard Kuhn