1. John Barkley, "Implementing Role Based Access Control Using Object Technology", First ACM Workshop on Role Based Access Control, November 1995.
2. John Barkley, Anthony Cincotta, "Managing Role/Permission Relationships Using Object Access Types", http://hissa.ncsl.nist.gov/rbac/rgperms/rgperms.htm, 1998.
3. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri, "A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems", RBAC 97 Workshop, 1997.
4. Elisa Bertino, Lorenzo Martino, "Authorization", Chapter 6, Object-Oriented Database Systems Concepts and Architectures, 1993
5. C. C. Chang, "Organization''s Ontology", National Defense Management College Technical Report, 1995.
6. George Coulouris, Jean Dollimore, Marcus Roberts, "Role and Task-based Access Control in the PerDis Groupware Platform", Third ACM Workshop on Role-Based Access Control, George Mason University, VA. October 1998.
7. David Ferraiolo, Richard Kuhn, "Role-Based Access Control", In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554-563, October 1992.
8. David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, "Role-Based Access Control (RBAC): Features and Motivations", Proceedings of 11th Annual Computer Security Application Conference, IEEE Computer Society Press, pages 241-248, December 1995.
9. Luigi Giuri, Pietro lglio, "A Role-Based Secure Database Design Tool", Proceedings 12th Annual Computer Security Applications Conference, Dec 1996.
10. Virgil D. Gligor, Serban I. Gavrila, David Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and Their Composition", Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society, May 1998.
11. Mats Gustafsson, Benoit Deligny, Nahid Shahmehri, "Using NFS to Implement Role-Based Access Control", Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 1997.
12. Michael J. Nash, Keith R. Poland, "Some Conundrums Concerning Separation of Duty", Proceedings of IEEE Computer Society Symposium on Security and Privacy, IEEE Computer Society Press, May 1990.
13. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-Based Access Control Models", IEEE Computer, 29(2), pp.38-47, February 1996.
14. Ravi Sandhu, Venkata Bhamidipati, "The URA97 Model for Role-Based Administration of User-Role Assignment", In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects, North-Holland, 1997.
15. Ravi Sandhu, Qamar Munawer, "The RRA97 Model for Role-Based Administration of Role Hierarchies*", ACSAC98 conference, December 1998.
16. Kathrin Schier, "Multifunctional Smartcards for Electronic Commerce-Application of the Role and Task Based Security Model", 14th Annual Computer Security Applications Conference, December 1998.
17. Richard T. Simon, Mary Ellen Zurko, "Separation of Duty in Role-Based Environments", 10th Computer Security Foundations Workshop, June 10-12, 1997.
18. Zahir Tari, Shun-Wu Chan, "A Role-Based Access Control for Intranet Security", IEEE Internet Computing, 1997.
19. R. K. Thomas, R. S. Sandhu, "Towards a Task-Based Paradigm for Flexible and Adaptable Access Control in Distributed Applications", Proc. Of 1992-1993 ACM SIGSAC New Security Paradigms Workshops, Little Compton, RI, page 138-142, 1993.
20. R. K. Thomas, R. S. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management", Proceedings of the IFIP WG11.3 Workshop on Database Security, August 11-13, 1997.
21. ISO/IEC 10181-3, "Information Technology-Open Systems Interconnection-Security Frameworks for Open Systems: Access Control Framework", Sep 1996.
22. opengroup, http://www.camb.opengroup.org/RI/www/adage/index.htm
23. The Open Group Research Institute Eleven Cambridge Center, "Adage System Overview", Defense Advanced Research Projects Agency (DARPA) Under contract #F 60602-95-C-0293
24. Workflow Management Coalition, "Workflow Management Coalition Terminology & Glossary", Workflow and Internet: Catalysts for Radical Change (A WfMC White Paper), June 1996.
25. 曾于洲, "以角色為基礎的之存取控制模型實做之研究", 國立交通大學資訊管理研究所, 碩士論文, 民國87年6月。8. David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, "Role-Based Access Control (RBAC): Features and Motivations", Proceedings of 11th Annual Computer Security Application Conference, IEEE Computer Society Press, pages 241-248, December 1995.
9. Luigi Giuri, Pietro lglio, "A Role-Based Secure Database Design Tool", Proceedings 12th Annual Computer Security Applications Conference, Dec 1996.
10. Virgil D. Gligor, Serban I. Gavrila, David Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and their Composition", Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society, May 1998.
11. Mats Gustafsson, Benoit Deligny, Nahid Shahmehri, "Using NFS to Implement Role-Based Access Control", Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 1997.
12. Michael J. Nash, Keith R. Poland, "Some Conundrums Concerning Separation of Duty", Proceedings of IEEE Computer Society Symposium on Security and Privacy, IEEE Computer Society Press, May 1990.
13. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-Based Access Control Models", IEEE Computer, 29(2), pp.38-47, February 1996.
14. Ravi Sandhu, Venkata Bhamidipati, "The URA97 model for role-based administration of User-role assignment", In T. Y. Lin and Xiaolei Qian, editors, Database Security XI: Status and Prospects, North-Holland, 1997.
15. Ravi Sandhu, Qamar Munawer, "The RRA97 Model for Role-Based Administration of Role Hierarchies*", ACSAC98 conference, December 1998.
16. Kathrin Schier, "Multifunctional Smartcards for Electronic Commerce-Application of the Role and Task Based Security Model", 14th Annual Computer Security Applications Conference, December 1998.
17. Richard T. Simon, Mary Ellen Zurko, "Separation of Duty in Role-Based Environments", 10th Computer Security Foundations Workshop, June 10-12, 1997.
18. Zahir Tari, Shun-Wu Chan, "A Role-Based Access Control for Intranet Security", IEEE Internet Computing, 1997.
19. R. K. Thomas, R. S. Sandhu, "Towards a Task-based Paradigm for flexible and adaptable access control in distributed applications", Proc. Of 1992-1993 ACM SIGSAC New Security Paradigms Workshops, Little Compton, RI, page 138-142, 1993.
20. R. K. Thomas, R. S. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management", Proceedings of the IFIP WG11.3 Workshop on Database Security, August 11-13, 1997.
21. ISO/IEC 10181-3, "Information technology-Open Systems Interconnection-Security Frameworks for open systems: Access control framework", Sep 1996.
22. opengroup, http://www.camb.opengroup.org/RI/www/adage/index.htm
23. The Open Group Research Institute Eleven Cambridge Center, "Adage System Overview", Defense Advanced Research Projects Agency (DARPA) Under contract #F 60602-95-C-0293
24. Workflow Management Coalition, "Workflow Management Coalition Terminology & Glossary", Workflow and Internet: Catalysts for Radical Change (A WfMC White Paper), June 1996.
25. 曾于洲, "以角色為基礎的之存取控制模型實做之研究", 國立交通大學資訊管理研究所, 碩士論文, 民國87年6月。