[1]
Kapadia, J. Al-Muhtadi, R. Campbell, and D. Mickunas, IRBAC 2000: secure interoperability using dynamic role translation, Proceedings of 1st International Conference on Internet Computing, (2000).
Google Scholar
[2]
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments, " Proc. 22nd Int'l Conf. Distributed Computing Systems (ICDCS , 02), July 2002, pp.411-420.
DOI: 10.1109/icdcs.2002.1022279
Google Scholar
[3]
J. Park, R. Sandhu, The UCON ABC Usage Control Model, , ACM Trans. Information and Systems Security, vol. 7, no. 1, 2004, p.128–174.
DOI: 10.1145/984334.984339
Google Scholar
[4]
R. Sandhu, P. Samarati, Access Control: Principles and Practice, IEEE Communications Magazine, September 1994, p.40–48.
Google Scholar
[5]
D. Ferraiolo, R. Sandhu, and S. Gavrila, D. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol. 4, no. 3, 2001, p.224–274.
DOI: 10.1145/501978.501980
Google Scholar
[6]
G. Russello, N. Dulay, Cross domain usage control through shared data spaces, the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, Washington, DC, USA: IEEE Computer Society, 2009, p.178–181.
DOI: 10.1109/policy.2009.18
Google Scholar
[7]
J. Park, R. Sandhu, A Vision for Next Generation Access control, Proceedings of The 2nd Intemational Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003, p.17–31.
Google Scholar
[8]
Z. D. Li, X. J. Ye, Towards a Dynamic Multi-Policy Dissemination control Model(DMDCON), ACM SIGMOD Record, 2006, p.33–38.
DOI: 10.1145/1121995.1122001
Google Scholar
[9]
X. ZHANG, J. PARK, F. PARISI-PRESICCE, et al, A logical specification for usage control, ACM Symposium on Access Cotrol Models and Technologies, 2004, p.1–26.
DOI: 10.1145/990036.990038
Google Scholar
[10]
T. JAEGER, J. E. TIDSWELL, Practical safety in flexible access control models, ACM Transactions on Information and Systems Security, 2001, p.34–58.
DOI: 10.1145/501963.501966
Google Scholar