Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2012_5_a35, author = {D. N. Kolegov}, title = {Hierarchical role-based access control}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {69--71}, publisher = {mathdoc}, number = {5}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/} }
D. N. Kolegov. Hierarchical role-based access control. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 69-71. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/
[1] Role Based Access Control (RBAC) and Role Based Security, National Institute of Standards and Technology, [Elektronnyi resurs]. Rezhim dostupa: http://csrc.nist.gov/groups/SNS/rbac
[2] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer, 43:6 (2010), 79–81 | DOI
[3] Sandhu R. S., Mohammad A. A., “A Model for Attribute-Based User-Role Assignment”, Proc. 18th Annual Computer Security Applications Conf. (San Diego, California, USA, December 09–13, 2002), IEEE Computer Society, Washington, 2002, 353
[4] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.