Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2012_2_a3, author = {N. A. Semenova}, title = {Semantic {Role} {Based} {Access} {Control} model}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {50--64}, publisher = {mathdoc}, number = {2}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2012_2_a3/} }
N. A. Semenova. Semantic Role Based Access Control model. Prikladnaâ diskretnaâ matematika, no. 2 (2012), pp. 50-64. http://geodesic.mathdoc.fr/item/PDM_2012_2_a3/
[1] Role-Based Access Control, , National Institute of Standards and Technology http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf
[2] Ferraiolo D., Kuhn D., Chandramoul R., Role Based Access Control, Artech House, New York, 2003, 337 pp. | Zbl
[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya – Telekom, M., 2011, 320 pp.
[4] Sandhu R. S., Bhamidipati V., Munawer Q., “The ARBAC97 model for role-based aministration of roles”, ACM Trans. Information and Systems Security (New York), 2:1 (1999), 105–135 | DOI | MR
[5] Noks D., Sozdanie effektivnoi sistemy bezopasnosti dlya Oracle Database 10g, Lori, M., 2007, 576 pp.
[6] Dzhokhansson Dzh., Obespechenie bezopasnosti. Resursy Windows Server 2008, Russkaya redaktsiya, SPb., 2009, 544 pp.