@article{PDMA_2012_5_a35,
author = {D. N. Kolegov},
title = {Hierarchical role-based access control},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {69--71},
year = {2012},
number = {5},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/}
}
D. N. Kolegov. Hierarchical role-based access control. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 69-71. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/
[1] Role Based Access Control (RBAC) and Role Based Security, National Institute of Standards and Technology, [Elektronnyi resurs]. Rezhim dostupa: http://csrc.nist.gov/groups/SNS/rbac
[2] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer, 43:6 (2010), 79–81 | DOI
[3] Sandhu R. S., Mohammad A. A., “A Model for Attribute-Based User-Role Assignment”, Proc. 18th Annual Computer Security Applications Conf. (San Diego, California, USA, December 09–13, 2002), IEEE Computer Society, Washington, 2002, 353
[4] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.