[1]
|
R. W. Baldwin, “Naming and Grouping Privileges to Simply Security,” Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, 7-9 May 1990, pp. 116-132.
|
[2]
|
D. F. Ferraiolo, R. Sandhu, and R. Chandramouli, “Proposed NIST Standard for Role-based Access Control,” ACM Transactions of Information System Security, Vol. 4, No. 3, 2012, pp. 224-274.
http://dx.doi.org/10.1145/501978.501980
|
[3]
|
S. J. Greenwald, “A New Security Policy for Distributed Resources Management & Access Control,” ACM New Security Paradigm Workshop Lake, Arrow Head, 2011, pp. 4-6.
|
[4]
|
M. Nynchama and S. Osborn, “Access Rights Administration in Role Based Security Systems,” Database Security, VIII: Status and Prospects, 2010, pp. 37-56.
|
[5]
|
G. Neuman, “Design and Implementation of a Flexible RBAC-Service in an Object Oriented Scripting Language,” ACM Workshop on Role Based Access Control, 2011, pp. 12-18.
|
[6]
|
R. Sandhu, “Role-Based Access Control,” Proceedings of the 10th IEEE Conference on Computer Security Applications, 20 December 1994, pp. 3-6.
|
[7]
|
R. Sandhu, “Role Activation Hierarchies,” Proceedings of the 3rd ACM Workshop on Role-Based Access Control, 2008, pp. 11-12.
|
[8]
|
R. Simon and R. Zurko, “Separation of Duty in Role Based Access Control Environments,” New Security Paradigms Workshop, 2011, pp. 11-17.
|
[9]
|
D. J. Thomsen. “Role-Based application Design and Enforcement,” Database Security, IV: Status and Prospects, 2012, pp. 151-168.
|
[10]
|
S. J. Westfolds, E. Horvitz, S. Srinivase and C. Rouokangas, “A Decision-Theoretic Approach to the Display of Information for Time-Critical Decisions: The Vista Project,” Proceedings of SOAR-92 Conference on Space Operations Automation and Research, Houston.
|