참고문헌
- 강명희, 'PMI : Privilege Management Infrastructure 개요', 퓨처시스템 Technical Report, June 2002
- 김봉환, 김기수, 원유재 'RBAC을 이용한 PMI기반 권한관리, 한국정보처리학회', 정보처리학회지, Vol.10, No.2(2003)
- 심완보, 박석 '애드호크러시 조직의 특성을 고려한 역할기반모델'. 한국정보보호학회, 정보보호학회지, 12(4), 2002. 8
- 진승헌, 최대선 '속성인증기술과 PMI', 한국 정보보호학회, 정보보호학회지, Vol.10, No.4 (2000)
- 추경균, '정부의 행정전자서명인증체계(GPKI) 활성화 및 발전방안', 정보보호학회 논문지, 2004. 4
- 한국전산원, 'e-비즈니스 보안인증을 위한통 합접근관리방안 연구', 연구용역보고서, 2003. 10
- Ahn, G. and R. Sandhu, 'Role-based Authorization Constraints Specification', ACM Transactions on Information and System Security, November 2000
- Ahn, G., R. Sandhu., M. Kang, and J. Park, 'Injecting RBAC to secure a Web based workflow system', In Proceedings of 5th ACM Workshop on Role-Based Access Control, July 2000
- Ferraiolo, D., J. Cugini, and D. RKuhn. 'Role Based Access Control : Features and Motivations', In Annual Computer Security Applications Conference, IEEE Computer Society Press, 1995
- Hang, L., G. Ahn, and B. Chu, 'A Rule- Based Framework for Role-Based Delegation', In Proceedings of ACM Symposium on Access Control Models and Technologies, May 2001
- ITU-T, 'ITU-T Recommendation X.509. Information Technology : Open Systems Interconnection - The Directory : Public - Key And Attribute Certificate Frameworks', ITU-T, 2000
- Markus Lorch, 'First Experiences Using XACML for Access Control in Distributed Systems', ACM Workshop on XML Security, 2003
- M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari. 'Certificate- based Access Control for Widely Distributed Resources', In Proceedings of the 8th USENIX Security Symposium, August 1999
- Park, J., Ahn, G., and R. Sandhu, 'RBAC on the Web using LDAP', In Proceedings of the 15th IFIP WG 11.3 Working Conference on Database and Application Security, July 2001
- Park, J., R. Sandhu, and G. Ahn., 'Rolebased Access Control on the Web', ACM Transactions on Information and System Security, February 2001
- S. Farrell and R. Housley, 'An Internet Attribute Certificate Profile for Authorization', PKIX WorkingGroup, June 2001
- Sandhu. R., 'Role-hierarchies and Constraints for lattice-based access control', In Proceedings of 4th Enropean Symposium on Research in Computer Security, 1996
- Sandhu, R., E. J. Coyne, H. L. Feinstein, and C. E. Youman, 'Role Based Access. Control Model', IEEE Computer, February 1996