Changes between Version 52 and Version 53 of Internal/Rbacinternal


Ignore:
Timestamp:
Aug 2, 2006, 6:01:28 PM (18 years ago)
Author:
hedinger
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbacinternal

    v52 v53  
    5050  RFC4519  LDAP: Schema for User Applications  [[ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc4519.txt.pdf RFC4519]]
    5151
    52 
    5352== Role-Based Access Control (RBAC) Documents ==
    5453
     54  [[ftp://orbit-lab.org/internal3/1133079.pdf SLS06]] Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking approach to analysing organisational controls in a  loan origination process. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 139--149, New York, NY, USA,  2006. ACM Press.
     55
     56  [[ftp://orbit-lab.org/internal3/sandhu98how.pdf SM98]] Ravi S. Sandhu and Qamar Munawer. How to do Discretionary Access Control Using Roles. In ''ACM Workshop on Role-Based Access Control'', pages 47--54,  1998.
     57
     58  [[ftp://orbit-lab.org/internal3/784768.pdf SM02a]] Andreas Schaad and Jonathan D. Moffett. A framework for organisational control principles. In ''ACSAC '02: Proceedings of the 18th Annual Computer Security  Applications Conference'', page 229, Washington, DC, USA, 2002. IEEE Computer  Society. first 20 pages only.
     59
     60  [[ftp://orbit-lab.org/internal3/schaad-lightweight.pdf SM02b]] Andreas Schaad and Jonathan D. Moffett. A lightweight approach to specification and analysis of role-based  access control extensions. In ''SACMAT '02: Proceedings of the seventh ACM symposium on  Access control models and technologies'', pages 13--22, New York, NY, USA,  2002. ACM Press.
     61
     62  [[ftp://orbit-lab.org/internal3/968177.pdf SM04]] Andreas Schaad and Jonathan Moffett. Separation, review and supervision controls in the context of a  credit application process -- a case study of organisational control  principles. In ''SAC '04: Proceedings of the 2004 ACM symposium on Applied  computing'', pages 1380--1384, New York, NY, USA, 2004. ACM Press.
     63
     64  [[ftp://orbit-lab.org/internal3/1015043.pdf SN04]] Mark Strembeck and Gustaf Neumann. An integrated approach to engineer and enforce context constraints in  RBAC environments. ''ACM Trans. Inf. Syst. Secur.'', 7(3):392--427, 2004.
     65
     66  [[ftp://orbit-lab.org/internal3/spenglergrsecurity.pdf Spe04]] Bradley Spengler. Increasing Performance and Granularity in Role-Based Access  Control Systems -- A Case Study in GRSECURITY. Technical report, OpenOffice.org, May 2004.
     67
     68  [[ftp://orbit-lab.org/internal3/1133082.pdf Sre06]] Vugranam C. Sreedhar. Data-centric security: role analysis and role typestates. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 170--179, New York, NY, USA,  2006. ACM Press.
     69
     70  [[ftp://orbit-lab.org/internal3/1066976.pdf SSW05]] Andreas Schaad, Pascal Spadone, and Helmut Weichsel. A case study of separation of duty properties in the context of the  Austrian "eLaw" process. In ''SAC '05: Proceedings of the 2005 ACM symposium on Applied  computing'', pages 1328--1332, New York, NY, USA, 2005. ACM Press.
     71
     72  [[ftp://orbit-lab.org/internal3/1057979.pdf TAPH05]] William Tolone, Gail-Joon Ahn, Tanusree Pai, and Seng-Phil Hong. Access control in collaborative systems. ''ACM Comput. Surv.'', 37(1):29--41, 2005.
     73
     74  [[ftp://orbit-lab.org/internal3/1133072.pdf WO06]] He Wang and Sylvia L. Osborn. Delegation in the role graph model. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 91--100, New York, NY, USA,  2006. ACM Press.
     75