참고문헌
- Lynn Andrea Stein, 'Delegation Is Inheritance,' Proc. of Object-Oriented Programming System, Languages, and Applications(OOPSLA '87). Vol.22, No.12, pp.138-146, 1987 https://doi.org/10.1145/38765.38820
- Moffett, J.D., 'Delegation of Authority Using Domain Based Access Rules,' PhD Thesis. Dept of Computing, Imperial College, University of London, 1990
- Morrie Gasser, Ellen McDermott, 'An architecture for practical Delegation in a Distributed System,' Proc. of IEEE Computer Society Symposium on Research in Security and Provacy, pp.20-30, 1990 https://doi.org/10.1109/RISP.1990.63835
- Nataraj Nagaratnam, Doug Lea, 'Securt Delegation for Distributed Object Environments,' Proc. of USENIX Conference on Object Oriented Technologies and Systems, pp. 101-116, 1998
- Cheh Goh and Adrian Baldwin, 'Towards a more complete Model of Role,' Proc. of 3rd ACM Workshop on Role-Based Access Control, pp.55-62, 1998
- Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, 'The ARBAC97 Model for Role-Based Administration of Roles,' ACM Transactions on Information and System Security, Vol.2, No.1, pp.105-135, 1999 https://doi.org/10.1145/300830.300839
- Ezedin Barka and Ravi Sandhu, 'Framework for Role-Based Delegation Models,' Proc. of 16th Annual Computer Security Application Conference(ACSAC 2000), pp.168-176, 2000 https://doi.org/10.1109/ACSAC.2000.898870
- Ezedin Barka and Ravi Sandhu, 'A Role-Based Delegation Model and Some Extensions,' Proc. of 23rd national Information Systems Security Conference (NISSC 2000), pp. 2000
- Longhua Zhang, Gail-Joon Ahn, and Bei-Tseng Chu, 'A Rule-Based Framework for Role-Based Delegation,' Proc. of 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), pp.404-441, 2001
- Sejong Oh, Ravi Sandhu, 'A Model of role Administration Using Organization Structure,' Proc. of 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), pp.155-162, 2002 https://doi.org/10.1145/507711.507737
- Xingwen Zhang, Sejong Oh and Ravi Sandhu, 'PBDM : A Felxible Delegation Model in RBAC,' Proc. of 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pp.149-157, 2003 https://doi.org/10.1145/775412.775431