Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2012_5_a40, author = {D. V. Chernov}, title = {Attribute based access control models}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {79--82}, publisher = {mathdoc}, number = {5}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/} }
D. V. Chernov. Attribute based access control models. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 79-82. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/
[1] Bishop M., Introduction to Computer Security, Addison-Wesley, USA, 2005
[2] Yuan E., Tong J., “Attributed Based Access Control (ABAC) for Web Services”, Proc. IEEE Intern. Conf. on Web Services (ICWS' 05), Washington, DC, USA, 2005, 561–569
[3] Xinwen Z., Yingjiu L., Divya N., “An Attribute-Based Access Matrix Model”, Proc. ACM Symposium Appl. Computing (SAC' 05), Santa Fe, New Mexico, USA, March 2005, 359–363
[4] Al-Kahtani M. A., Sandhu R., “A model for attribute-based user-role assignment”, Annual Computer Security Appl. Conf., IEEE Computer Society, Las Vegas, NV, USA, 2002, 353–364
[5] Chunxiao Y., Zhongfu W., Yunqing F., “An Attribute-Based Delegation Model and Its Extension”, J. Res. Practice Inform. Technol., 38:1 (2006), 220–234
[6] Rakesh B., Omid F., Fariba K., et al., “Using Attribute-Based Access Control to Enable Attribute-Based Messaging”, Proc. 22nd Annual Computer Security Appl. Conf. (ACSAC' 06), Miami Beach, FL, USA, December 2006, 403–413
[7] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer, 43:6 (2010), 79–81 | DOI
[8] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.