1 |
C.P.Pfleeger, 'Security in Computing', second edition, Prentice-Hall International Inc. 1997
|
2 |
D.Ferraiom J.Cugini, R.Kuhm, 'Rolebased Access Control(RBAC): Features and motivations', Proc. of 11th Annual Computer Security Application Conference, Dec.1995
|
3 |
E. Bertino, E.Ferrari, V.Atluri 'Specifica tion and Enforcement of Role-based Authorization Constraints in Workflow-Management Sys-tems', ACM Transactions on infonmtion and System Security, pp. 65-104, February, 1999
|
4 |
S. Oh and S. Park, 'Task-Role Based Access Control(T-RBAC): An Improved Access Control Model for Enterprise Environment,' Proceedings of the 11th International Conference on Database and Expert Systems Appli cations, DEXA 2000, pp. 264-273, 2000
|
5 |
R.ABotha, J.HP.Eloff, 'Separation of duties for access control enforcement in work flow environments,' IBM Systems Journal. Vol 40, No 3, pp. 666-682. 2001
|
6 |
Dong Gue Park, Yu Dong Hwang, Sun Hyung Kim, Extended Task Role-Based Access Control Model For Access Control Enforcement in Enterprise Environments, EALPIIT, 2002
|
7 |
M.S.Oliver, R.P.Reit, E.Gudes 'Specifying Application-level Security in work flow Systems', Proc. of 9th International Workshop on Database and Expert Systems Applications, 1998
|
8 |
W.K.Huang, V.Atluri 'Secure Flow: A Secure Web-enabled Workflow-Management System', Proc. of 4th ACM Workshop on Role-Based Access Control, 1999
|
9 |
G.- J, Ahn, R S. Sandhu, M Kang, and J, Park, 'Injecting RBAC to Secure a WebBased Workflow System,' Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin.July 26-28, 2000
|
10 |
R.S.Sandhu, E.J.Coyne, H.L. Feinstein, C.E. Youman 'Role-Based Access control Method', IEEE Computer, vol. 29, Feb. 1996
|
11 |
M H Kang, J, S. Park, and J, N. Froscher, 'Access Control Mechanisms for InterOrganizational Workflow,' Proceedings of the 6th ACM Symposium on Access Control Models and Technologies SACMAT 2001, Chantilly, VA 3-4 , pp. 66-74, May , 2001
|