Task–role-based access control model
Tài liệu tham khảo
Pfleger, 1997
D. Russel, G.T. Gangemi Sr, Computer Security Basics, O’Reilly & Associates, Sebastopol, CA, 1991.
J.B.D. Joshi, W.G. Aref, A. Ghafoor, E.H. Spafford, Security model for web-based applications, Communications ACM 44(2) (2001).
Amoroso, 1994
Sandhu, 1996, Role-based access control method, IEEE Comput., 29, 20, 10.1109/2.485845
D. Ferraio, J. Cugini, R. Kuhn, Role-based access control (RBAC): features and motivations, Proceedings of the 11th Annual Computer Security Application Conference, New Orleans, LA, 1995, p. 12.
Dagstull, G. Coulouris, J. Dollimore, A security model for cooperative work: a model and its system implications, Position paper for ACM European SIGOPS Workshop, Dagstuhl Castle, September 1994.
G. Herrmann, G. Pernul, Towards security semantics in workflow management, Proceedings of the 31st Hawaii International Conference on System Sciences, Hawaii 1998.
R.K. Thomas, Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environment, Proceedings of the Second ACM Workshop on Role-Based Access Control, Fairfax, VA, 1997.
R.K. Thomas, R. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP WG11.3 Workshop on Database Security, Vancouver, Canada, 1997.
T. Jaeger, On the increasing importance of constraints, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, October 1999.
R.S. Sandhu, G.J. Ahn, The RSL language for role-based separation of duty constraints, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, 1999.
J.E. Tidswell, T. Jager, Integrated constraints and inheritance in DTAC, Proceedings of the Fifth ACM Workshop on Role-Based Access Control, Berlin, 2000.
Workflow Management Coalition (WfMC), Workflow Reference Model, WF-TC-1003 V1.1, January 1995.
R.S. Sandhu, Role activation hierarchies, Proceedings of the Third ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
G.J. Ahn, R. Sandhu, The RSL99 language for role-based separation of duty constraints, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, October 1999.
E. Barka, R. Sandhu, Framework for role-based delegation models, Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC/2000), New Orleans, LA, 2000.
D.R. Kuhn, Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems, Proceedings of the Second ACM Workshop on Role-Based Access Control, Fairfax, VA, 1997.
J.D. Moffett, E.C. Lupu, The use of role hierarchies in access control, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Fairfax, VA, 1999.
S. Oh, S. Park, The RBAC agent model on enterprise environment, 5-minute talk, 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, May 2000.
S. Oh, S. Park, Task-role-based access control (T-RBAC): an improved access control method for enterprise environment, Lecture Note in Computer Science, Vol. 1873, Database and Expert Systems Applications, Springer, Berlin, Proceedings of the 11th International Conference, DEXA 2000, London, September 2000.
S. Oh, S. Park, An integration model of role-based access control and activity-based access control using task, Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000.
Oh, 2000, Task-role-based access control model for enterprise environment, J Korea Inst Information Security Cryptology, 11, 2
R.R. Simon, M.E. Zurko, Separation of duty in role-based environments, Proceedings of the 10th Computer Security Foundations Workshop (CSFW’97), Rockport, MA, 1997.
Y. Al-Salqan, N. Shahmehri, W. Wen, M. Debbabi, Final Summary Report on Enterprise Security, Proceedings of the IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’99), San Jose, CA, 1999.
S.I. Gavrila, J.F. Barkley, Formal specification for role based access control user/role and role/role relationship management, Proceedings of the 3rd ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
C.J. Date, An Introduction to Database Systems, 6th ed., Addison-Wesley, New York, 1995.