Changes between Version 49 and Version 50 of Internal/Rbacinternal


Ignore:
Timestamp:
Aug 2, 2006, 5:53:42 PM (18 years ago)
Author:
hedinger
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbacinternal

    v49 v50  
    5757
    5858  RFC4519  LDAP: Schema for User Applications  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4519.txt.pdf RFC4519]]
     59
     60
     61== Role-Based Access Control (RBAC) Documents ==
     62
     63[[775430.pdf AKS03]] Mohammad A. Al-Kahtani and Ravi Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access  control models and technologies'', pages 142--148, New York, NY, USA, 2003.  ACM Press.
     64
     65[[rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP.  http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html.
     66
     67[[990044.pdf AM04]] Xuhui Ao and Naftaly H. Minsky. On the Role of Roles: from Role-Based to Role-Sensitive  Access Control. In ''SACMAT '04: Proceedings of the ninth ACM symposium on Access  control models and technologies'', pages 51--60, New York, NY, USA, 2004. ACM  Press.
     68
     69[[oasisprofilev2.pdf And05]] Anne Anderson. Core and Hierarchical Role Based Access Control (RBAC)  Profile of XACML v2.0. Technical report, OASIS Open, February 2005.
     70
     71[[382913.pdf AS00]] Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ''ACM Trans. Inf. Syst. Secur.'', 3(4):207--226, 2000.
     72
     73[[344295.pdf ASKP00]] Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to Secure a Web-based Workflow System. In ''RBAC '00: Proceedings of the fifth ACM workshop on Role-based  access control'', pages 1--10, New York, NY, USA, 2000. ACM Press.
     74
     75[[266759.pdf Bar97]] Larry S. Bartz. hyperDRIVE: leveraging LDAP to implement RBAC on the Web. In ''RBAC '97: Proceedings of the second ACM workshop on  Role-based access control'', pages 69--74, New York, NY, USA, 1997. ACM Press.
     76
     77[[1095039.pdf BBB05]] Lior Berry, Lyn Bartram, and Kellogg S. Booth. Role-based control of shared application views. In ''UIST '05: Proceedings of the 18th annual ACM symposium on  User interface software and technology'', pages 23--32, New York, NY, USA,  2005. ACM Press.
     78
     79[[501979.pdf BBF01]] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ''ACM Trans. Inf. Syst. Secur.'', 4(3):191--233, 2001.
     80
     81[[605437.pdf BCFP03]] Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ''ACM Trans. Inf. Syst. Secur.'', 6(1):71--127, 2003.