Changes between Version 88 and Version 89 of Internal/Rbac/RbacResources
- Timestamp:
- Oct 25, 2006, 5:30:42 PM (18 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Internal/Rbac/RbacResources
v88 v89 139 139 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/chwall.pdf BN89]] David F. C. Brewer and Michael J. Nash. The Chinese Wall Security Policy. In A. L. Buczak, J. Zimmerman, and K. Kurapati, editors, ''1989 IEEE Symposium on Security and Privacy'', pages 206--214, Washington, DC, USA, May 1989. IEEE Computer Society. 140 140 141 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/SmartRolesDataSheet.pdf Bri05]] Bridgestream Inc. SmartRoles™ Business Roles Automation. Bridgestream data sheet, 2005. 142 141 143 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p71-brooks.pdf Bro99]] Kami Brooks. Migrating to Role-Based Access Control. In ''RBAC '99: Proceedings of the Fourth ACM Workshop on Role-Based Access Control'', pages 71--81, New York, NY, USA, 1999. ACM Press. 142 144 … … 287 289 [[http://csrc.nist.gov/staff/kuhn/rkhome.html FKS06]] David F. Ferraiolo, D. Richard Kuhn, and Ravi S. Sandhu. Comments on 'A Critique of the ANSI Standard on Role Based Access Control'. ''IEEE Security and Privacy'', 2006. to appear 2006. 288 290 291 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01662285.pdf Fle06]] Felix F. Flemish. Using CORBA and XML to Deliver Unified NGN Management Interfaces - Rationale and Summary. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--6, April 2006. 292 289 293 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/drbac-icdcs02.pdf FPPE02]] Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. In ''Proceedings of the 22nd International Conference on Distributed Computing Systems'', pages 411--420, 2002. 290 294 … … 353 357 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/hua98modeling.pdf HO98]] Lingling Hua and Sylvia Osborn. Modeling UNIX Access Control with a Role Graph. In ''Proceedings of 1998 International Conference on Computers and Information'', June 1998. 354 358 359 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/060322.pdf Hoa06]] John C. Hoag. An Architecture for Network Operations and Management Based on State and Services. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--6, April 2006. 360 355 361 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00646185.pdf Hof97]] J. Hoffman. Implementing RBAC on a Type Enforced System. In ''ACSAC '97: Proceedings of the 13th Annual Computer Security Applications Conference'', pages 158--163, Washington, DC, USA, 1997. IEEE Computer Society. 356 362 … … 451 457 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/HPL-1999-59.pdf Lin99]] Along Lin. Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture. Technical Report HPL-1999-59, HP Labs, April 1999. 452 458 459 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/BcN2006-PS13.pdf LM06]] Chae-Sub Lee and Naotaka Morita. Next Generation Network Standards in ITU-T. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--15, April 2006. 460 453 461 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p11-lupu.pdf LMSY96]] Emil C. Lupu, Damian A. Marriott, Morris S. Sloman, and Nicholas Yialelis. A Policy Based Role Framework for Access Control. In ''RBAC '95: Proceedings of the First ACM Workshop on Role-Based Access Control'', page 11, New York, NY, USA, 1996. ACM Press. 454 462 … … 473 481 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p112-liu.pdf LWGE06]] Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao, and Jing Zhang. Core Role-Based Access Control: Efficient Implementations by Transformations. In ''PEPM '06: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation'', pages 112--120, New York, NY, USA, 2006. ACM Press. 474 482 483 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/mtechrbac.pdf M-T06]] M-Tech Information Technology, Inc. Beyond Roles: A Practical Approach to Enterprise User Provisioning. Web article, 2006. http://www.idsynch.com/docs/beyond-roles.html. 484 475 485 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01176310.pdf Mar02]] Andrew D. Marshall. A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. In ''Proceedings of the 18th Annual Computer Security Applications Conference'', pages 382--390, Washington, DC, USA, 2002. IEEE Computer Society. 476 486 … … 651 661 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01045125.pdf SAP02]] Dongwan Shin, Gail-Joon Ahn, and Joon S. Park. An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). In ''Proceedings of the 26th Annual International Computer Software and Applications Conference, COMPSAC 2002'', pages 934--939, Washington, DC, USA, 2002. IEEE Computer Society. 652 662 663 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/DraftNGNmgt.pdf SB-05]] SB-43509. Principles for the Management of Next Generation Networks, February 2005. 41_01.doc. 664 653 665 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sandhu97ura.pdf SB97]] Ravi S. Sandhu and Venkata Bhamidipati. The URA97 Model for Role-Based User-Role Assignment. In ''IFIP Workshop on Database Security'', pages 262--275, 1997. 654 666 … … 787 799 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00790905.pdf WBS99]] Shukri Wakid, John Barkley, and Mark Skall. Object Retrieval and Access Management in Electronic Commerce. ''IEEE Communications Magazine'', 37(9):74--77, September 1999. 788 800 801 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/wikirbac.pdf Wik06]] Wikipedia. Role-Based Access Control. Wikipedia article, 2006. http://en.wikipedia.org/wiki/RBAC. 802 789 803 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01342816.pdf WJYJ04]] Xu Wei, Wei Jun, Liu Yu, and Li Jing. SOWAC: A Service-Oriented Workflow Access Control Model. In ''Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004'', volume 1, pages 128--134, September 2004. 790 804