Changes between Version 56 and Version 57 of Internal/Rbacinternal


Ignore:
Timestamp:
Aug 9, 2006, 4:10:07 PM (18 years ago)
Author:
hedinger
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbacinternal

    v56 v57  
    5252== Role-Based Access Control (RBAC) Documents ==
    5353
    54   [[ftp://orbit-lab.org/internal3/rbacwebapps.pdf Ali]] Saqib Ali. RBAC for WebApps using LDAP.  http://www.networksecurityarchive.org/html/Web-App-Sec/2005-08/msg00036.html.
    55 
    56   [[ftp://orbit-lab.org/internal3/826869.pdf KBME03]] Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida,  Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, and  Gilles Trouessin. Organization Based Access Control. In ''POLICY '03: Proceedings of the 4th IEEE International  Workshop on Policies for Distributed Systems and Networks'', page 120,  Washington, DC, USA, 2003. IEEE Computer Society.
    57 
    58   [[ftp://orbit-lab.org/internal3/1133079.pdf SLS06]] Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking approach to analysing organisational controls in a  loan origination process. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 139--149, New York, NY, USA,  2006. ACM Press.
    59 
    60   [[ftp://orbit-lab.org/internal3/sandhu98how.pdf SM98]] Ravi S. Sandhu and Qamar Munawer. How to do Discretionary Access Control Using Roles. In ''ACM Workshop on Role-Based Access Control'', pages 47--54,  1998.
    61 
    62   [[ftp://orbit-lab.org/internal3/784768.pdf SM02a]] Andreas Schaad and Jonathan D. Moffett. A framework for organisational control principles. In ''ACSAC '02: Proceedings of the 18th Annual Computer Security  Applications Conference'', page 229, Washington, DC, USA, 2002. IEEE Computer  Society. first 20 pages only.
    63 
    64   [[ftp://orbit-lab.org/internal3/schaad-lightweight.pdf SM02b]] Andreas Schaad and Jonathan D. Moffett. A lightweight approach to specification and analysis of role-based  access control extensions. In ''SACMAT '02: Proceedings of the seventh ACM symposium on  Access control models and technologies'', pages 13--22, New York, NY, USA,  2002. ACM Press.
    65 
    66   [[ftp://orbit-lab.org/internal3/968177.pdf SM04]] Andreas Schaad and Jonathan Moffett. Separation, review and supervision controls in the context of a  credit application process -- a case study of organisational control  principles. In ''SAC '04: Proceedings of the 2004 ACM symposium on Applied  computing'', pages 1380--1384, New York, NY, USA, 2004. ACM Press.
    67 
    68   [[ftp://orbit-lab.org/internal3/1015043.pdf SN04]] Mark Strembeck and Gustaf Neumann. An integrated approach to engineer and enforce context constraints in  RBAC environments. ''ACM Trans. Inf. Syst. Secur.'', 7(3):392--427, 2004.
    69 
    70   [[ftp://orbit-lab.org/internal3/spenglergrsecurity.pdf Spe04]] Bradley Spengler. Increasing Performance and Granularity in Role-Based Access  Control Systems -- A Case Study in GRSECURITY. Technical report, OpenOffice.org, May 2004.
    71 
    72   [[ftp://orbit-lab.org/internal3/1133082.pdf Sre06]] Vugranam C. Sreedhar. Data-centric security: role analysis and role typestates. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 170--179, New York, NY, USA,  2006. ACM Press.
    73 
    74   [[ftp://orbit-lab.org/internal3/1066976.pdf SSW05]] Andreas Schaad, Pascal Spadone, and Helmut Weichsel. A case study of separation of duty properties in the context of the  Austrian "eLaw" process. In ''SAC '05: Proceedings of the 2005 ACM symposium on Applied  computing'', pages 1328--1332, New York, NY, USA, 2005. ACM Press.
    75 
    76   [[ftp://orbit-lab.org/internal3/1057979.pdf TAPH05]] William Tolone, Gail-Joon Ahn, Tanusree Pai, and Seng-Phil Hong. Access control in collaborative systems. ''ACM Comput. Surv.'', 37(1):29--41, 2005.
    77 
    78   [[ftp://orbit-lab.org/internal3/1133072.pdf WO06]] He Wang and Sylvia L. Osborn. Delegation in the role graph model. In ''SACMAT '06: Proceedings of the eleventh ACM symposium on  Access control models and technologies'', pages 91--100, New York, NY, USA,  2006. ACM Press.
    79 
     54  [