| 54 | [[ftp://orbit-lab.org/internal3/1133079.pdf SLS06]] Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking approach to analysing organisational controls in a loan origination process. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies'', pages 139--149, New York, NY, USA, 2006. ACM Press. |
| 55 | |
| 56 | [[ftp://orbit-lab.org/internal3/sandhu98how.pdf SM98]] Ravi S. Sandhu and Qamar Munawer. How to do Discretionary Access Control Using Roles. In ''ACM Workshop on Role-Based Access Control'', pages 47--54, 1998. |
| 57 | |
| 58 | [[ftp://orbit-lab.org/internal3/784768.pdf SM02a]] Andreas Schaad and Jonathan D. Moffett. A framework for organisational control principles. In ''ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference'', page 229, Washington, DC, USA, 2002. IEEE Computer Society. first 20 pages only. |
| 59 | |
| 60 | [[ftp://orbit-lab.org/internal3/schaad-lightweight.pdf SM02b]] Andreas Schaad and Jonathan D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In ''SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies'', pages 13--22, New York, NY, USA, 2002. ACM Press. |
| 61 | |
| 62 | [[ftp://orbit-lab.org/internal3/968177.pdf SM04]] Andreas Schaad and Jonathan Moffett. Separation, review and supervision controls in the context of a credit application process -- a case study of organisational control principles. In ''SAC '04: Proceedings of the 2004 ACM symposium on Applied computing'', pages 1380--1384, New York, NY, USA, 2004. ACM Press. |
| 63 | |
| 64 | [[ftp://orbit-lab.org/internal3/1015043.pdf SN04]] Mark Strembeck and Gustaf Neumann. An integrated approach to engineer and enforce context constraints in RBAC environments. ''ACM Trans. Inf. Syst. Secur.'', 7(3):392--427, 2004. |
| 65 | |
| 66 | [[ftp://orbit-lab.org/internal3/spenglergrsecurity.pdf Spe04]] Bradley Spengler. Increasing Performance and Granularity in Role-Based Access Control Systems -- A Case Study in GRSECURITY. Technical report, OpenOffice.org, May 2004. |
| 67 | |
| 68 | [[ftp://orbit-lab.org/internal3/1133082.pdf Sre06]] Vugranam C. Sreedhar. Data-centric security: role analysis and role typestates. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies'', pages 170--179, New York, NY, USA, 2006. ACM Press. |
| 69 | |
| 70 | [[ftp://orbit-lab.org/internal3/1066976.pdf SSW05]] Andreas Schaad, Pascal Spadone, and Helmut Weichsel. A case study of separation of duty properties in the context of the Austrian "eLaw" process. In ''SAC '05: Proceedings of the 2005 ACM symposium on Applied computing'', pages 1328--1332, New York, NY, USA, 2005. ACM Press. |
| 71 | |
| 72 | [[ftp://orbit-lab.org/internal3/1057979.pdf TAPH05]] William Tolone, Gail-Joon Ahn, Tanusree Pai, and Seng-Phil Hong. Access control in collaborative systems. ''ACM Comput. Surv.'', 37(1):29--41, 2005. |
| 73 | |
| 74 | [[ftp://orbit-lab.org/internal3/1133072.pdf WO06]] He Wang and Sylvia L. Osborn. Delegation in the role graph model. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies'', pages 91--100, New York, NY, USA, 2006. ACM Press. |
| 75 | |