| | 59 | |
| | 60 | |
| | 61 | == Role-Based Access Control (RBAC) Documents == |
| | 62 | |
| | 63 | [[775430.pdf AKS03]] Mohammad A. Al-Kahtani and Ravi Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies'', pages 142--148, New York, NY, USA, 2003. ACM Press. |
| | 64 | |
| | 65 | [[rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP. http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html. |
| | 66 | |
| | 67 | [[990044.pdf AM04]] Xuhui Ao and Naftaly H. Minsky. On the Role of Roles: from Role-Based to Role-Sensitive Access Control. In ''SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies'', pages 51--60, New York, NY, USA, 2004. ACM Press. |
| | 68 | |
| | 69 | [[oasisprofilev2.pdf And05]] Anne Anderson. Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. Technical report, OASIS Open, February 2005. |
| | 70 | |
| | 71 | [[382913.pdf AS00]] Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ''ACM Trans. Inf. Syst. Secur.'', 3(4):207--226, 2000. |
| | 72 | |
| | 73 | [[344295.pdf ASKP00]] Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to Secure a Web-based Workflow System. In ''RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control'', pages 1--10, New York, NY, USA, 2000. ACM Press. |
| | 74 | |
| | 75 | [[266759.pdf Bar97]] Larry S. Bartz. hyperDRIVE: leveraging LDAP to implement RBAC on the Web. In ''RBAC '97: Proceedings of the second ACM workshop on Role-based access control'', pages 69--74, New York, NY, USA, 1997. ACM Press. |
| | 76 | |
| | 77 | [[1095039.pdf BBB05]] Lior Berry, Lyn Bartram, and Kellogg S. Booth. Role-based control of shared application views. In ''UIST '05: Proceedings of the 18th annual ACM symposium on User interface software and technology'', pages 23--32, New York, NY, USA, 2005. ACM Press. |
| | 78 | |
| | 79 | [[501979.pdf BBF01]] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ''ACM Trans. Inf. Syst. Secur.'', 4(3):191--233, 2001. |
| | 80 | |
| | 81 | [[605437.pdf BCFP03]] Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ''ACM Trans. Inf. Syst. Secur.'', 6(1):71--127, 2003. |