[1]
Osborn Sylvia, Sandhu Ravi, and Munawer Qamar. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 85-106(2000), p. vol. 3, no. 2.
DOI: 10.1145/354876.354878
Google Scholar
[2]
Mossakowski, T., Drouineaud, M., and Sohr, K. A Temporal-Logic Extension of Role-based Access Control Covering Dynamic Separation of Duties. In Proceedings of the 4th International Conference on Temporal Logic, IEEE Computer Society Press, 83-90(2003).
DOI: 10.1109/time.2003.1214883
Google Scholar
[3]
Steinmiiller, B. and Safafik, J. Extending Role-based Access Control Model with States. In Proceedings of the International Conference on Trends in Communications, Bratislava, 398-399(2001), p.
Google Scholar
[4]
Crampton, J. and Loizou, G. Administrative Scope and Role Hierarchy Operations. In Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, California, USA, ACM Press, 145-154(2002), p.
DOI: 10.1145/507711.507736
Google Scholar
[5]
Crampton, J. Specifying and Enforcing Constraints in Role-based Access Control. In Proceedings of the eighth ACM symposium on Access control models and technologies, Como, Italy, ACM Press, 43-50(2003), p.
DOI: 10.1145/775412.775419
Google Scholar
[6]
Sandhu, R. and Bhamidipati, V. The ASCAA Principles for Next-Generation Role-Based Access Control. ARES 2008 - International Conference on Availability, Reliability and Security, 27-32, (2008), p.
Google Scholar
[7]
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 105-135(1999), p. vol. 2, no. 1.
DOI: 10.1145/300830.300839
Google Scholar
[8]
S. Oh and R. Sandhu. A model for role administration using organization structure. Proceedings of the seventh ACM symposium on Access control models and technologies, 155-162(2002), p.
DOI: 10.1145/507711.507737
Google Scholar
[9]
S. Oh, R. Sandhu, and X. Zhang. An effective role administration model using organization structure. ACM Transactions on Information and System Security (TISSEC), 113-137(2006), p. vol. 9, no. 2.
DOI: 10.1145/1151414.1151415
Google Scholar
[10]
M. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. Proceedings of 17th Annu. Computer Security Applications Conf. Las Vegas, NV, 353-362(2002), p.
DOI: 10.1109/csac.2002.1176307
Google Scholar
[11]
Yahalom R, Klein B. and Beth T. Trust relationships in secure systems-a distributed authentication perspective. Proc. 1993 IEEE Symp. Research in Security and Privacy. 150-164(1993), p.
DOI: 10.1109/risp.1993.287635
Google Scholar