|
Sandhu R.S.; Samarati P.,”Access control: principle and practice”, IEEE Communications Magazine Volume: 32 9, Sept. 1994, pp 40 —48. Sandhu R.S.; Coyne E.J.; Feinstein H.L,”Role-based access control models”, Computer Volume: 29 2, Feb. 1996, pp38 —47. Sandhu R.S.; Coyne E.J.; Feinstein H.L.; Youman C.E.,”Role-based access control: A multi-dimensional view”, Computer Security Applications Conference, 1994. Proceedings. 10th Annual, 1994, pp 54-62. Sandhu R.S.; Munawer, Q., “The RRA97 model for role-based administration of role hierarchies”, Computer Security Applications Conference, 1998. Proceedings. 14th Annual, 1998, pp 39 —49. Sandhu R.S.; Munawer Q., “The ARBAC99 model for administration of roles”, Computer Security Applications Conference, 1999. (ACSAC ''99). Proceedings. 15th Annual, 1999, pp 229 —238. Sandhu R.S.; Feinstein H.,“A three tier architecture for role-based access control”, Proceeding of 17th NIST-NCSC national computer conference, Baltimore, MD, Oct. 11-14, 1994, pp138-149. Ferraiolo D.F.; Cugini J.A.; Kuhn D.R.,”Role-based access control: Features and Motivations”, In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995. Giuri L.; Iglio P.,”A formal model for role-based access control with constrains ”, Computer Security Foundations Workshop, 1996. Proceedings, 9th IEEE, 1996, pp136 —145. Lau K.W.; Jarzabek S.,”A generic discretionary access control system for reuse framework”, Computer Software and Applications Conference, 1998. COMPSAC ''98. Proceedings. 1998, pp356 —361. Kuhn D.R., “Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems”, in second ACM workshop on role-based access control, Nov. 1997. Barkley J., “Comparing simple role based access control models and access control lists”, in second ACM workshop on role-based access control, Nov. 1997. Barkley J., ”Implementing Role based access control using object technology”, In first ACM workshop on role-based access control, 1995. Yialelis N.; Lupu E.; Sloman M.,”role-based security for distributed object systems”, Enabling Technologies: Infrastructure for Collaborative Enterprises, 1996. Proceedings of the 5th Workshop, 1996, pp 80 —85. Kao I.L.; Chow R.,”An extended capability architecture to enforce dynamic access control policies”, Computer Security Applications Conference, 1996, 12th Annual, 1996,pp148 —157. Gustafsson M.; Deligny B.; Shahmehri N, “Using NFS to implement Role-based access control”, Enabling Technologies: Infrastructure for Collaborative Enterprises, 1997. Proceedings, Sixth IEEE Workshops, 1997, pp 299 —304. Tari Z.; Chan S.W., ”A role-based access control for intranet security”, IEEE Internet Computing Volume: 1 5, Sept.-Oct. 1997, pp24 —34. Barkley J.; Cincotta A., “Managing role/permission relations using object access types”, In third ACM workshop on role-based access control, 1998. Hayton R.J.; Bacon J.M.; Moody K.,”Access control in an open distributed environment”, Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium, 1998,pp3 —14. Thomsen D.; O''Brien D.; Bogle J.,”Role based access control framework for network enterprises”, Computer Security Applications Conference, 1998. Proceedings. 14th Annual, 1998, pp 50 —58. Park J.S.; Sandhu R.S.; Ghanta S.,”RBAC on the secure cookies”, In Proceedings of the IFIP WG11.3 Workshop on Database Security. Chapman & Hall, July, 1999. Wong C. K., et al., ”Secure Group Communications Using Key Groups”, Proceedings of ACM SIGCOMM’98, available from http://www.acm.org/sigcomm/sigcomm98/tp/paper06.pdf. Wallner D., et al., “Key Management for Multicast: Issues and Architectures”, RFC 2627. Harkins D., Carrel D., “The Internet Key Exchange (IKE)”, RFC 2409. Maughan D., et al. “Internet Security Association and Key Management Protocol (ISAKMP)”, RFC 2408. Li G.; Shacham N., “Elements of trusted multicasting”, International Conference on Network Protocols, 1994, pp. 23 —30. Garonni G., et al., “Efficient security for large and dynamic multicast groups”, Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative, 1998, pp.376 —383. Waldvogel M., et al., “The Versa Key Framework: Versatile Group Key Management”, IEEE Journal on selected area in communications, Vol 17, no. 9, Sept 1999, pp.1614-1631. Schneier B., Applied Cryptography, second edition, John Wiley & Sons, Inc., 1996.
|