Changes between Version 88 and Version 89 of Internal/Rbac/RbacResources


Ignore:
Timestamp:
Oct 25, 2006, 5:30:42 PM (18 years ago)
Author:
anonymous
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbac/RbacResources

    v88 v89  
    139139  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/chwall.pdf BN89]] David F. C. Brewer and Michael J. Nash. The Chinese Wall Security Policy. In A. L. Buczak, J. Zimmerman, and K. Kurapati, editors, ''1989 IEEE Symposium on Security and Privacy'', pages 206--214, Washington, DC, USA, May 1989. IEEE Computer Society.
    140140
     141  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/SmartRolesDataSheet.pdf Bri05]] Bridgestream Inc. SmartRoles™ Business Roles Automation. Bridgestream data sheet, 2005.
     142
    141143  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p71-brooks.pdf Bro99]] Kami Brooks. Migrating to Role-Based Access Control. In ''RBAC '99: Proceedings of the Fourth ACM Workshop on Role-Based Access Control'', pages 71--81, New York, NY, USA, 1999. ACM Press.
    142144
     
    287289  [[http://csrc.nist.gov/staff/kuhn/rkhome.html FKS06]] David F. Ferraiolo, D. Richard Kuhn, and Ravi S. Sandhu. Comments on 'A Critique of the ANSI Standard on Role Based Access Control'. ''IEEE Security and Privacy'', 2006. to appear 2006.
    288290
     291  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01662285.pdf Fle06]] Felix F. Flemish. Using CORBA and XML to Deliver Unified NGN Management Interfaces - Rationale and Summary. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--6, April 2006.
     292
    289293  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/drbac-icdcs02.pdf FPPE02]] Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. In ''Proceedings of the 22nd International Conference on Distributed Computing Systems'', pages 411--420, 2002.
    290294
     
    353357  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/hua98modeling.pdf HO98]] Lingling Hua and Sylvia Osborn. Modeling UNIX Access Control with a Role Graph. In ''Proceedings of 1998 International Conference on Computers and Information'', June 1998.
    354358
     359  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/060322.pdf Hoa06]] John C. Hoag. An Architecture for Network Operations and Management Based on State and Services. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--6, April 2006.
     360
    355361  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00646185.pdf Hof97]] J. Hoffman. Implementing RBAC on a Type Enforced System. In ''ACSAC '97: Proceedings of the 13th Annual Computer Security Applications Conference'', pages 158--163, Washington, DC, USA, 1997. IEEE Computer Society.
    356362
     
    451457  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/HPL-1999-59.pdf Lin99]] Along Lin. Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture. Technical Report HPL-1999-59, HP Labs, April 1999.
    452458
     459  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/BcN2006-PS13.pdf LM06]] Chae-Sub Lee and Naotaka Morita. Next Generation Network Standards in ITU-T. In ''Proceedings of The 1st International Workshop on Broadband Convergence Networks, 2006. BcN 2006'', pages 1--15, April 2006.
     460
    453461  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p11-lupu.pdf LMSY96]] Emil C. Lupu, Damian A. Marriott, Morris S. Sloman, and Nicholas Yialelis. A Policy Based Role Framework for Access Control. In ''RBAC '95: Proceedings of the First ACM Workshop on Role-Based Access Control'', page 11, New York, NY, USA, 1996. ACM Press.
    454462
     
    473481  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p112-liu.pdf LWGE06]] Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao, and Jing Zhang. Core Role-Based Access Control: Efficient Implementations by Transformations. In ''PEPM '06: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation'', pages 112--120, New York, NY, USA, 2006. ACM Press.
    474482
     483  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/mtechrbac.pdf M-T06]] M-Tech Information Technology, Inc. Beyond Roles: A Practical Approach to Enterprise User Provisioning. Web article, 2006. http://www.idsynch.com/docs/beyond-roles.html.
     484
    475485  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01176310.pdf Mar02]] Andrew D. Marshall. A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. In ''Proceedings of the 18th Annual Computer Security Applications Conference'', pages 382--390, Washington, DC, USA, 2002. IEEE Computer Society.
    476486
     
    651661  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01045125.pdf SAP02]] Dongwan Shin, Gail-Joon Ahn, and Joon S. Park. An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). In ''Proceedings of the 26th Annual International Computer Software and Applications Conference, COMPSAC 2002'', pages 934--939, Washington, DC, USA, 2002. IEEE Computer Society.
    652662
     663  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/DraftNGNmgt.pdf SB-05]] SB-43509. Principles for the Management of Next Generation Networks, February 2005. 41_01.doc.
     664
    653665  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sandhu97ura.pdf SB97]] Ravi S. Sandhu and Venkata Bhamidipati. The URA97 Model for Role-Based User-Role Assignment. In ''IFIP Workshop on Database Security'', pages 262--275, 1997.
    654666
     
    787799  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00790905.pdf WBS99]] Shukri Wakid, John Barkley, and Mark Skall. Object Retrieval and Access Management in Electronic Commerce. ''IEEE Communications Magazine'', 37(9):74--77, September 1999.
    788800
     801  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/wikirbac.pdf Wik06]] Wikipedia. Role-Based Access Control. Wikipedia article, 2006. http://en.wikipedia.org/wiki/RBAC.
     802
    789803  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01342816.pdf WJYJ04]] Xu Wei, Wei Jun, Liu Yu, and Li Jing. SOWAC: A Service-Oriented Workflow Access Control Model. In ''Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004'', volume 1, pages 128--134, September 2004.
    790804