1 |
http://www.korcham.net/EconNews/KcciReport/CRE01101L.asp
|
2 |
D.F Ferraiolo and D.R. Kuhn. “Role Based Access Control,” In Proc. of the 15th National Computer Security Conference, Oct., 1992.
|
3 |
David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Information Security and Privacy Series. Artech House, 2 edition, 2007.
|
4 |
Axel Kern and Claudia Walhorn. “Rule Support for Role-Based Access Control.” In Proc. of the Tenth ACM Symposium on Access Control Models and Technologies (SACMAT '05), pp 130-138, New York, NY, USA, 2005.
DOI
|
5 |
Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo, “The Role Mining Problem: Finding a Minimal Descriptive Set of Roles,” In Proc. of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT '07), pp 175-184, New York, NY, USA, 2007.
DOI
|
6 |
National Institute of Standards and Technology, http://csrc.nist.gov/groups/sns/rbac/case studies.html
|
7 |
A. Kern. “Advanced Features for Enterprise-Wide Role-Based Access Control,” In Proc. of the 18th Computer Security Applications Conference, pp.333-342, 2002.
DOI
|
8 |
Gustaf Neumann and Mark Strembeck. “A Scenario-Driven Role Engineering Process for Functional RBAC Roles,” In Proc. of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT '02), pp.33-42, New York, USA, 2002.
DOI
|
9 |
J.B.D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, “A Generalized Temporal Role-Based Access Control Model,” IEEE Transactions on Knowledge and Data Engineering, 17(1):4-23, Jan., 2005.
DOI
ScienceOn
|
10 |
Ruslan Dimov, Sean W. Smith, and Sara Sinclair, “Making RBAC Work in Dynamic, Fast-Changing Corporate Environments,” Technical Report of Dartmouth College Computer Science, 2008.
|
11 |
Seoncheol Hwang et al., “Development of WWW-based TelePACS using Satellite Data Communication System,” In Proc. of the 20th Annual International Conference of the IEEE, Vol.3, pp.1281-1283, Oct.29-Nov.1, 1998.
DOI
|
12 |
WebPACS, http://www.methodist.healthsystem.org/
|
13 |
Reid, J. Cheong, I. Henricksen, and M. Smith, J. “A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems,” In Proc. of Lecture Notes in Computer Science, Vol.2727, No.1, pp.403-415, 2003.
DOI
ScienceOn
|
14 |
조현숙, 이봉환, “그리드 보안을 위한 역할기반의 신뢰 협상 모델”, 한국정보처리학회논문지 제15-C권, 제6호, pp.455-468, 2008. 12.
|
15 |
http://www.w3c.org/TR/REC-xml
|
16 |
Patrick C. K. Hung, “Towards a Privacy Access Control Model for e-Healthcare Services,” In Proc. of 3th Annual Conference on Privacy, Security and Trust, 2005. 10.
|
17 |
최준, 김남현, 유선국, “다중 환자 정보 저장소에 대한 웹기반 보안 접근”, 대한의료정보학회지 제 10권 3호, 2004. 9.
|