References
- Charles P. Pfleeger, Security in Computing, Prentice Hall
- Silvana Castano, DATABASE SECURITY, ADDISON-WESLEY
- Warwick Ford, Computer Communications Security, Prentice Hall
- Matunda Nyanchama, Sylvia Osborn. 'Modeling Mandatory Access Control in Role-Based Security Systems,' Database Security IX status and prospects, pp.129-144, 8, 1995
- David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, 'Role-Based Access Control (READ: Features and Motivations.' COMPUTER SECURITY APPLICATIONS Conference, IEEE, pp,241-248, 12, 1995
- Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman, 'Role-Based Access Control Models,' COMPUTER SOCIETY, IEEE, FEB. pp,38-47, 1996
- Sylvia Osborn, 'Mandatory Access Control and Role-Based Access Control Revisited,' Second ACM Workshop on RBAC, pp.31-40. 11, 1997 https://doi.org/10.1145/266741.266751
- Ravi S. Sandhu and Pierangela Samarati, 'Access Control: Principles and Practice,' IEEE Communications Magazine, pp.40-48, 9. 1994
- Ravi S. Sandhu, 'Lattice-Based Access Control Models,' IEEE COMPUTER, 11, 1993. pp,9-19 https://doi.org/10.1109/2.241422
- Ravi Sandhu, 'Access Control: The Neglected Frontier,' Proc. First Australasian Conference on Information Security and Privacy, 6, 1996 https://doi.org/10.1007/BFb0023301
- Ravi S. Sandhu, 'Role Hierarchies and Constraints for Lattice-Based Access Controls,' Proc, Forth European Symposium on Research in COMPUTER SECURITY, pp.1-19, 9. 1996 https://doi.org/10.1007/3-540-61770-1_28
- David d, Clark, David R. 'Nilson, 'A Comparison of commercial and Military computer policies,' IEEE, 1987
- Anthony Boswell, 'Specification and Validation of a Security Policy Model,' IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol.21 , No,2, pp,63-68, 2, 1995 https://doi.org/10.1109/32.345822
- J. E. Dobson and J. A. McDermid, Security Models and Enterprise Models, Database Security II : Status & Prospects, pp.1 - 39, 1989
- David Rann, John Turner and Jenny Whitworth, '2: A Beginner's Guide,' School of Computing Staffordshire University, 1994
- Bryan Ratcliff, 'INTRODUCING SPECIFICATION USING 2 ; A Practical Case Study Approach,' McGRAW-HILL BOOK COMPANY, 1994
- Moms Sloman, Network and Distributed Systems Management, Addison-Wesley, 1994
- ITU-T X.741 : 'Information Technology - Open Systems Interconnection - System Management - Objects and Attributes for Access Control'
- ITU-T X.812 : 'Information Technology - Open Systems Interconnection - Security Frameworks For Open System Access Control Framework'
- 최은복, 이형효, 노봉남, 'Biba 모델과 역할기반 접근제어 모델의 상호연동', 한국통신정보보호학회 종합학술발표회 논문집, 제8권 제1호, 1998
- 이형효, 최은복, 노봉남, '역할기반 접근통제 시스템에서 응용프로그램의 설계 및 실행지원 프레임워크', 한국정보처리학회 논문지, 제6권 제11호, 1999