참고문헌
- S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-202, Springer-Verlag Heidelderg, 2004. https://doi.org/10.1007/978-3-540-39881-3_18
- S. A. Weis, "Security and Privacy in Radio-Frequency Identification Devices" MS Thesis, MIT.May, 2003.
- S. E. Sarma, S. A. Weis, D. W. Engels. "RFID systems, Security & Privacy Implications", White Paper MIT-AUTOID-WH-014, MIT AUTO-ID CENTER, 2002.
- Sanjay E.Sarma, Stephen A. Weis and Daiel W.Engels, "Radio-Frequency Identification Systems", In Proceeding of CHES '02, pp. 454-469. Springer-Verlag, 2002. LNCS No.2523.
- Weis, S. et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, First International Conference on Security in Pervasive Computing (SPC), 2003.
- R. Laborde, B. Nasser, F. Grasset, F. Barrere, A. Benzekri, "A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies" Electronic Notes in Theoretical Computer Science 121 2005, pp. 117-142 https://doi.org/10.1016/j.entcs.2004.10.011
- Andrea Omicini Alessandro Ricci Mirko Viroli, "RBAC for Organisation and Security in an Agent Coordination Infrastructure" Electronic Notes in Theoretical Computer Science 128, 2005, pp. 65-85 https://doi.org/10.1016/j.entcs.2004.11.045
- XinyuWANG, Member, Jianling SUN, Xiaohu YANG, Chao HUANG,and Di WU "Security Violation Detection for RBAC Based Interoperation in Distributed Environment" IEICE TRANS. INF. & SYST., VOL.E91-D, NO.5 MAY 2008, pp. 1447-1456 https://doi.org/10.1093/ietisy/e91-d.5.1447
- Jacques Wainer, Akhil Kumar, Paulo Barthelmess "DW-RBAC: A formal security model of delegation and revocation in workflow systems" Information Systems 32, 2007, pp. 365-384 https://doi.org/10.1016/j.is.2005.11.008
- Celia Li, Cungang Yang, Richard Cheung, "Key management for role hierarchy in distributed systems" Journal of Network and Computer Applications 30, 2007, pp. 920-936 https://doi.org/10.1016/j.jnca.2005.07.009
- Chlara Braghin, Daniele Gorla and Vladimiro Sassone, "Role-based access control for a distributed calculus Chiara Braghin" Journal of Computer Security 14, 2006, pp. 113-155 https://doi.org/10.3233/JCS-2006-14202
- Wei She and Bhavani Thuraisingham, "Security for Enterprise Resource Planning Systems" Information Systems Security, 2007, pp. 152-163