References
- R. Sandhu, 'Rationale for the RBAC96 Family of Access Control Models', Proc. of the First ACM Workshop on Role-Based Access Control, 1995 https://doi.org/10.1145/270152.270167
- D. Ferraio, J. Cugini, R. Kuhn, 'Role-based Access Control (RBAC) : Features and motivations', Proc. of the 11th Annual Computer Security Application Conference, 1995
- R. Sandhu, E. Coyne, H. Feinstein, C. Youman, 'Role-Based Access Control Models', IEEE Computer, Vol.29, No.2, 1996 https://doi.org/10.1109/2.485845
- S.I. Gavrila, J.F. Barkley, 'Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management', Proc. of the 3rd ACM workshop on Role-Based Access Control, 1998 https://doi.org/10.1145/286884.286902
- R. Sandhu, Bhamidipati, Q. Munawer, 'The ARBAC97 Model for Role-Based Administration of Roles', ACM Trans. on Information and Systems Security (TISSEC), Vol.2, 1999 https://doi.org/10.1145/300830.300839
- R. Sandhu, Q. Munawer, 'The ARBAC99 Model for Administration of Roles', Proc. of the Annual Computer Security Applications Conference, 1999
- R. Sandhu, Q. Munawer, 'The RRA97 Model for Role-Based Administration of Role Hierarchies', Proc. of the Annual Computer Security Applications Conference, 1998 https://doi.org/10.1109/CSAC.1998.738569
- J.D. Moffett, E.C. Lupu, 'The Uses of Role Hierarchies in Access Control', Proc. of the 4th ACM Workshop on Role-Based Access Control, 1999 https://doi.org/10.1145/319171.319186
- J. Crampton, 'Administrative Scope and Role Hierarchies Operations', Proc. of the 7th ACM Symposium on Access Control Models and Technologies, 2002 https://doi.org/10.1145/507711.507736
- J. Crampton, 'On permissions, Inheritance and Hierarchies', Proc. of the 10th ACM Conference on Computer and Communication Security, 2003 https://doi.org/10.1145/948109.948123
- W. Yao, K. Moody, J. Bacon, 'A model of OASIS role-based access control and its support for active security', Proc. of the sixth ACM symposium on Access control models and technologies, 2001 https://doi.org/10.1145/373256.373294
- J. Crampton, G. Loizou, 'A foundation for role-based administrative models', ACM Transactions on Information and System Security (TISSEC), 2003 https://doi.org/10.1145/762476.762478
- M. Koch, L. V. Mancini, F. Parisi-Presicce, 'Administrative scope in the graph-based framework', Proc. of the ninth ACM symposium on Access control models and technologies, 2004 https://doi.org/10.1145/990036.990051
- H. F. Wedde, M. Lischka, 'Cooperative role-based administration', Proc. of the eighth ACM symposium on Access control models and technologies, 2003 https://doi.org/10.1145/775412.775416