References
- D. Ferraiolo And D.R.Kuhn, 'Role-based access controls', 15th NIST_NICS National Computer Security Conference, pp.554-563, Baltimore, MD, October 13-16, 1992
- D. Ferraiolo, J. Cugini and D.R.Kuhn, 'Role-based Access Control : Features and Motivations', In Annual Computer Security Applications Conference, pp.241-248, November 09, 1995
- Ravi Sandhu, Edward j. Coyne, Hal L. Feinstein and Charles E. Youman, 'Role-based Access Control Model', IEEE, pp.38-47, Feb., 1996
- Ezedin Barka and Ravi Shanhu, 'A Role-Based Delegation model and Some Extensions', Proc, Of 23rd National Information System Security Conference(NISSC 2000), pp.168-176, December, 2000
- Ezedin Barka and Ravi Shanhu, 'Framework for Role-based Delegation Model and Some Extensions', Proceedings of the 23rd NIST-NCSC National Information Systems Security Conference, pp.101-114, Baltimore, USA, October, 2000. 3
- Gail-Joon Ahn, 'Specification and Classification of Role-based Authorization Policies', In Proceedings of 8th IEEE International Workshop on Enterprise Security (WETICE2003), pp.202-207, June 9-11, 2000
- Gail-Joon Ahn and Ravi Shanhu, 'Role-based Authorization Constraints Specification', ACM Trans on Information and System Security, Vol.3, No.4, pp.207-226, November, 2000 https://doi.org/10.1145/382912.382913
- Zhang L, Gail-Joon Ahn and Chun B.T, 'A Rule-based Framework for Role-based Delegation Revocation', ACM Transactions on Information and System Security, Vol.6, No.3, pp.404-441, August, 2003 https://doi.org/10.1145/937527.937530
- XinWen Zhang, Sejong Oh and Ravi Sandhu, 'PBDM: A Flexible Delegation Model in RBAC', 8th ACM Symposium on Access Control Models and Technologies(SACMAT -03), pp.149-157, June, 2003 https://doi.org/10.1145/775412.775431
- Chunxiao Ye, Yunqing Fu, Zhingfu Wu, 'An attribute-Based-Delegation-Model', ACM International Conference Proceeding Series, Vol85, Proceedings of the 3rd international Conference in Information security, pp.220-221, November 14-16, 2004 https://doi.org/10.1145/1046290.1046338
- Nighui Li, Mahesh V, Triounitara, 'Security Analysis in Role-Based Access Control', Proceedings of the Ninth ACM Symposium in Access Control Models and Techniques (SACMAT 2004), pp.126-135, June 2-4, 2004 https://doi.org/10.1145/990036.990058
- Serban I, Bavrila, Jogn F, Barklev, 'Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management', ACM Workshop on Role-Based Access Control, pp.81-90, 1998 https://doi.org/10.1145/286884.286902