1 |
R. Sandhu, 'Role Activation Hierarchies', Proc. of 3rd ACM Workshop on Role- Based Access Control, 1998.10
|
2 |
David D. Clark and David R. Wilson, 'A Comparison of Commercial and Military Computer Security Policies', Proc. of the 1987 IEEE Symposium on Security and Privacy, 1987. pp.184-194
|
3 |
R. Sandhu, E. Coyne, H. Feinstein, and C. Younman, 'Role-Based Access Control Models', IEEE Computer Magazine Vol. 29, 1996.2
|
4 |
C. Ramaswamy and R. Sandhu, 'Role- Based Access Control Features in Commercial Database Management Systems', NISSC, 1998
|
5 |
D. E. Bell and L. J. LaPadula, 'Secure Computer Systems: mathematical Foundations and Model', Mitre Corp. Report No. M74-244, Bedford, Mass., 1975
|
6 |
S. Osborn, R. Sandhu and Q. Munawer, 'Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies' , ACM Transactions on Information and Systems Security, vol.3, no. 2, 2000
|
7 |
K. J. Biba, 'Integrity Considerations for Secure Computer Systems', Mirte Corp. Report TR-3153, Bedford, Mass, 1977
|
8 |
U.S. Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, National Computer Security Center, 1985
|
9 |
S. Osborn, 'Mandatory Access Control and Role-Based Access Control Revisited', Proc. of RBAC97, ACM, 1997
|
10 |
R. Sandhu, 'Role-Hierarchies and Constraints for Lattice-Based Access Controls', Proc. Fourth European Symposium on Research in Computer Security, Rome, Italy, Sep. 25- 27, 1996
|