| 59 | |
| 60 | |
| 61 | == Role-Based Access Control (RBAC) Documents == |
| 62 | |
| 63 | [[775430.pdf AKS03]] Mohammad A. Al-Kahtani and Ravi Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies'', pages 142--148, New York, NY, USA, 2003. ACM Press. |
| 64 | |
| 65 | [[rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP. http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html. |
| 66 | |
| 67 | [[990044.pdf AM04]] Xuhui Ao and Naftaly H. Minsky. On the Role of Roles: from Role-Based to Role-Sensitive Access Control. In ''SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies'', pages 51--60, New York, NY, USA, 2004. ACM Press. |
| 68 | |
| 69 | [[oasisprofilev2.pdf And05]] Anne Anderson. Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. Technical report, OASIS Open, February 2005. |
| 70 | |
| 71 | [[382913.pdf AS00]] Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ''ACM Trans. Inf. Syst. Secur.'', 3(4):207--226, 2000. |
| 72 | |
| 73 | [[344295.pdf ASKP00]] Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to Secure a Web-based Workflow System. In ''RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control'', pages 1--10, New York, NY, USA, 2000. ACM Press. |
| 74 | |
| 75 | [[266759.pdf Bar97]] Larry S. Bartz. hyperDRIVE: leveraging LDAP to implement RBAC on the Web. In ''RBAC '97: Proceedings of the second ACM workshop on Role-based access control'', pages 69--74, New York, NY, USA, 1997. ACM Press. |
| 76 | |
| 77 | [[1095039.pdf BBB05]] Lior Berry, Lyn Bartram, and Kellogg S. Booth. Role-based control of shared application views. In ''UIST '05: Proceedings of the 18th annual ACM symposium on User interface software and technology'', pages 23--32, New York, NY, USA, 2005. ACM Press. |
| 78 | |
| 79 | [[501979.pdf BBF01]] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ''ACM Trans. Inf. Syst. Secur.'', 4(3):191--233, 2001. |
| 80 | |
| 81 | [[605437.pdf BCFP03]] Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ''ACM Trans. Inf. Syst. Secur.'', 6(1):71--127, 2003. |