@article{PDM_2012_2_a3,
author = {N. A. Semenova},
title = {Semantic {Role} {Based} {Access} {Control} model},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {50--64},
year = {2012},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2012_2_a3/}
}
N. A. Semenova. Semantic Role Based Access Control model. Prikladnaâ diskretnaâ matematika, no. 2 (2012), pp. 50-64. http://geodesic.mathdoc.fr/item/PDM_2012_2_a3/
[1] Role-Based Access Control, , National Institute of Standards and Technology http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf
[2] Ferraiolo D., Kuhn D., Chandramoul R., Role Based Access Control, Artech House, New York, 2003, 337 pp. | Zbl
[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya – Telekom, M., 2011, 320 pp.
[4] Sandhu R. S., Bhamidipati V., Munawer Q., “The ARBAC97 model for role-based aministration of roles”, ACM Trans. Information and Systems Security (New York), 2:1 (1999), 105–135 | DOI | MR
[5] Noks D., Sozdanie effektivnoi sistemy bezopasnosti dlya Oracle Database 10g, Lori, M., 2007, 576 pp.
[6] Dzhokhansson Dzh., Obespechenie bezopasnosti. Resursy Windows Server 2008, Russkaya redaktsiya, SPb., 2009, 544 pp.