63 | | [[775430.pdf AKS03]] Mohammad A. Al-Kahtani and Ravi Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies'', pages 142--148, New York, NY, USA, 2003. ACM Press. |
64 | | |
65 | | [[rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP. http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html. |
66 | | |
67 | | [[990044.pdf AM04]] Xuhui Ao and Naftaly H. Minsky. On the Role of Roles: from Role-Based to Role-Sensitive Access Control. In ''SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies'', pages 51--60, New York, NY, USA, 2004. ACM Press. |
68 | | |
69 | | [[oasisprofilev2.pdf And05]] Anne Anderson. Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. Technical report, OASIS Open, February 2005. |
70 | | |
71 | | [[382913.pdf AS00]] Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ''ACM Trans. Inf. Syst. Secur.'', 3(4):207--226, 2000. |
72 | | |
73 | | [[344295.pdf ASKP00]] Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to Secure a Web-based Workflow System. In ''RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control'', pages 1--10, New York, NY, USA, 2000. ACM Press. |
74 | | |
75 | | [[266759.pdf Bar97]] Larry S. Bartz. hyperDRIVE: leveraging LDAP to implement RBAC on the Web. In ''RBAC '97: Proceedings of the second ACM workshop on Role-based access control'', pages 69--74, New York, NY, USA, 1997. ACM Press. |
76 | | |
77 | | [[1095039.pdf BBB05]] Lior Berry, Lyn Bartram, and Kellogg S. Booth. Role-based control of shared application views. In ''UIST '05: Proceedings of the 18th annual ACM symposium on User interface software and technology'', pages 23--32, New York, NY, USA, 2005. ACM Press. |
78 | | |
79 | | [[501979.pdf BBF01]] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ''ACM Trans. Inf. Syst. Secur.'', 4(3):191--233, 2001. |
80 | | |
81 | | [[605437.pdf BCFP03]] Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ''ACM Trans. Inf. Syst. Secur.'', 6(1):71--127, 2003. |