참고문헌
- http://www.boran.com/security/tcsec.html
- J. Cramption, W. Leung, K. Beznosov, "The Secondary and Approximate Authoriztion Model and Its Application to Bell-LaPadula Policies", Proc, of 11th ACM SACMAT, pp. 111-120, June, 2006.
- S. Osborn, R. Sandhu and Q. Munawer, "Configurig Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Polices", ACM Transactions on information and Systems Security, vol.3, no.2, pp. 85-106, 2000. https://doi.org/10.1145/354876.354878
- 김경자, 장태무, "유비쿼터스 환경을 위한 CASA기반의 동적 접근제어 기법", 한국컴퓨터정보학회논문지, 13권 4호, 205-211쪽, 2008.
- Vijayalakshmi Atluri and Avigdor Gal, "An authorization model for temporal and derived data : Securing information portals", ACM Trans. Inf. Syst. Secur., vol.5 no.1, pp.63-94, 2002.
- D.E. Denning, "A Lattice model of Secure Information Flow", Joural, Commu., ACM, Vol. 19, No. 5, pp. 236-243, May, 1976. https://doi.org/10.1145/360051.360056
- Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman, "Role-Based Access Control Models", COMPUTER SOCIETY, IEEE, pp.38-47, FEB. 1996.
- Kaijun Tan, Jason Crampton and Carl A. Gunter, "The Consistency of Task-Based Authorization Constraints in Workflow Sysems", In CSFW, pp.155-162, 2004.
- Christian Wolter and Andreas Schaad. "Modeling of Task-Based Authoriztion Constraints in BPMN", In Proceedings of the 5th International Conference on BPM, pp.64-79, 2007.
- Hong Chen, Ninghui Li, "Constraint Generation for Separation of Duty", Proc. of 11th ACM SACMAT, 130-138쪽, June, 2006.
- 황유동, 박동규, "유비쿼터스 환경의 접근제어를 위한 확장된 GTRBAC 모델", 한국컴퓨터정보학회논문지, 10권 3호, 45-54쪽, 2005.