Hierarchical role-based access control
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 69-71.

Voir la notice de l'article provenant de la source Math-Net.Ru

A new access control model is proposed. It is obtained by adding a hierarchy and type attributes to elements of the RBAC model family. The allowed access rights of subjects to entities in it are specified dependent on the values of the subject and entity attributes.
@article{PDMA_2012_5_a35,
     author = {D. N. Kolegov},
     title = {Hierarchical role-based access control},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {69--71},
     publisher = {mathdoc},
     number = {5},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/}
}
TY  - JOUR
AU  - D. N. Kolegov
TI  - Hierarchical role-based access control
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2012
SP  - 69
EP  - 71
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/
LA  - ru
ID  - PDMA_2012_5_a35
ER  - 
%0 Journal Article
%A D. N. Kolegov
%T Hierarchical role-based access control
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2012
%P 69-71
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/
%G ru
%F PDMA_2012_5_a35
D. N. Kolegov. Hierarchical role-based access control. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 69-71. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a35/

[1] Role Based Access Control (RBAC) and Role Based Security, National Institute of Standards and Technology, [Elektronnyi resurs]. Rezhim dostupa: http://csrc.nist.gov/groups/SNS/rbac

[2] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer, 43:6 (2010), 79–81 | DOI

[3] Sandhu R. S., Mohammad A. A., “A Model for Attribute-Based User-Role Assignment”, Proc. 18th Annual Computer Security Applications Conf. (San Diego, California, USA, December 09–13, 2002), IEEE Computer Society, Washington, 2002, 353

[4] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.