Changes between Version 50 and Version 51 of Internal/Rbacinternal


Ignore:
Timestamp:
Aug 2, 2006, 5:56:56 PM (18 years ago)
Author:
hedinger
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbacinternal

    v50 v51  
    5050  RFC4515  LDAP: String Representation of Search Filters  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4515.txt.pdf RFC4515]]
    5151
    52   RFC4516  LDAP: Uniform Resource Locator  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4516.txt.pdf RFC4516]]
     52  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4516.txt.pdf RFC4516  LDAP: Uniform Resource Locator]]
    5353
    5454  RFC4517  LDAP: Syntaxes and Matching Rules  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4517.txt.pdf RFC4517]]
     
    6161== Role-Based Access Control (RBAC) Documents ==
    6262
    63 [[775430.pdf AKS03]] Mohammad A. Al-Kahtani and Ravi Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access  control models and technologies'', pages 142--148, New York, NY, USA, 2003.  ACM Press.
    64 
    65 [[rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP.  http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html.
    66 
    67 [[990044.pdf AM04]] Xuhui Ao and Naftaly H. Minsky. On the Role of Roles: from Role-Based to Role-Sensitive  Access Control. In ''SACMAT '04: Proceedings of the ninth ACM symposium on Access  control models and technologies'', pages 51--60, New York, NY, USA, 2004. ACM  Press.
    68 
    69 [[oasisprofilev2.pdf And05]] Anne Anderson. Core and Hierarchical Role Based Access Control (RBAC)  Profile of XACML v2.0. Technical report, OASIS Open, February 2005.
    70 
    71 [[382913.pdf AS00]] Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ''ACM Trans. Inf. Syst. Secur.'', 3(4):207--226, 2000.
    72 
    73 [[344295.pdf ASKP00]] Gail-Joon Ahn, Ravi Sandhu, Myong Kang, and Joon Park. Injecting RBAC to Secure a Web-based Workflow System. In ''RBAC '00: Proceedings of the fifth ACM workshop on Role-based  access control'', pages 1--10, New York, NY, USA, 2000. ACM Press.
    74 
    75 [[266759.pdf Bar97]] Larry S. Bartz. hyperDRIVE: leveraging LDAP to implement RBAC on the Web. In ''RBAC '97: Proceedings of the second ACM workshop on  Role-based access control'', pages 69--74, New York, NY, USA, 1997. ACM Press.
    76 
    77 [[1095039.pdf BBB05]] Lior Berry, Lyn Bartram, and Kellogg S. Booth. Role-based control of shared application views. In ''UIST '05: Proceedings of the 18th annual ACM symposium on  User interface software and technology'', pages 23--32, New York, NY, USA,  2005. ACM Press.
    78 
    79 [[501979.pdf BBF01]] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ''ACM Trans. Inf. Syst. Secur.'', 4(3):191--233, 2001.
    80 
    81 [[605437.pdf BCFP03]] Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. A logical framework for reasoning about access control models. ''ACM Trans. Inf. Syst. Secur.'', 6(1):71--127, 2003.