1 |
ANSI/INCITS 359-2004, 'Information Technology-Role Based Access Control, International Committee for Information Technology Standards', 2004
|
2 |
Bill Brenner, 'Societe Generale: A cautionary tale of insider threats', SearchSecurity.com, 2008
|
3 |
Gail-joon Ahn, R. S. Sandhu, 'The RSL99 Language for Role-Base Separartion of Duties constraints', In Proceedings of 4thACM Workshop on Role-Based Access Control, pp. 43-54, 1999
|
4 |
Seong-Min Jeong, Seung-Wan Han, Hyeong-Seok Lim, 'A Role Based Access Control Method Considering Task in the Mobile Agent-based Workflow System', ITC-CSCC(1), pp. 549-552, 2000
|
5 |
Warwick Pord, 'Computer Communications Security', pp. 149-158, Prentice Hall, 1994
|
6 |
ITU-T Rec. X.509 ISO/IEC 9594-8, 'The Directory:Public-key and Attribute Certificate Frameworks', 2001
|
7 |
D. F. Ferraiolo, J. A. Cugini. D. R. Kuhn, 'Rolebased access control : Features and Motivations', 11th Annual Computer Security Applications Conference, 1995
|
8 |
Venkata Bhamidipati, Ravi Sandhu, 'Push Architectures for User Role Assignment', Proceedings of the 23nd National Information System, 2004
|
9 |
Ferraiolo, Kuhn, Chandramouli, Role-Based Access Control Second Edition, pp. 326-359, pp. 171-183, pp. 213-237, ARTECH HOUSE, 2007
|
10 |
ITU-T Rec. X.812 ISO/IEC 10181-3:1996, 'Security frameworks in open systems: Access control Framework' 1996
|
11 |
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman,. 'Role-Based Access Control Models', IEEE Computer. Vol. 29. No. 2. pp. 38-47, 1996
|