Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2012_3_a7, author = {D. N. Kolegov}, title = {Hierarchical role-based access control development}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {70--76}, publisher = {mathdoc}, number = {3}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/} }
D. N. Kolegov. Hierarchical role-based access control development. Prikladnaâ diskretnaâ matematika, no. 3 (2012), pp. 70-76. http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/
[1] National Institute of Standards and Technology. Role Based Access Control (RBAC) and Role Based Security, [Elektronnyi resurs]. Rezhim dostupa: http://csrc.nist.gov/groups/SNS/rbac
[2] Ferraiolo D. F., Kuhn D. R., “Role Based Access Controls”, Proc. 15th National Computer Security Conference (Baltimore, October 1992), 554–563
[3] Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E., “Role-Based Access Control Models”, IEEE Computer., 29:2 (1996), 38–47 | DOI
[4] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.
[5] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer., 43:6 (2010), 79–81 | DOI
[6] Sandhu R. S., Al-Kahtani M. A., “A Model for Attribute-Based User-Role Assignment”, Proc. 18th Annual Computer Security Applications Conference, ACSAC' 02 (Las Vegas, December 09–13, 2002), 353
[7] Joshi J., Bertino E. A., Latif U., Ghafoor A., “A Generalized Temporal Role-Based Access Control Model”, IEEE Trans. Knowledge and Data Engineering, 17:1 (2005), 4–23 | DOI
[8] Bertion E., Catania B., Damiani M. L., “GEO-RBAC: A Spatially Aware RBAC”, Proc. 10th ACM Symposium on Access Control Models and Technologies, SACMAT' 05 (Stockholm, Sweeden, June 2005), 29–37
[9] Thomas R. K., “Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments”, Proc. Second ACM Workshop on Role-based Access Control, RBAC' 97 (Fairfax, Virginia, USA, November 1997), 13–19
[10] Devyanin P. N., “Formirovanie slovarya terminov teorii modelirovaniya bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh”, Prikladnaya diskretnaya matematika, 2011, no. 2, 17–39