[journal]
/ 1997
/ Security in Computing
/ Prentice-Hall International Inc
: 290~315
[journal]
/ 1996
/ Role-Based Access control Models
29
: 38~47
[journal]
/ 1995
/ Proc. of 11th Annual Computer Security Application Conference
[journal]
/ 1994
/ Dagstull and G.Coulouris and J.Dollimore “A Security Model for Cooperative work a model and its system implications” Positions paper for ACM European SIGOPS Workshop
[journal]
/ 1997
/ A Family of Models for Active and Enterprise-oriented Authorization Management” Proc. of the IFIP WF11.3 Workshop on Database Security
[journal]
/ 2000
/ An Improved Access Control Model for Enterprise Environment” Proceedings of the 11th International Conference on Database and Expert Systems Applications
/ T-RBAC
: 264~273
[journal]
/ 2003
/ “A New Role-Based Delegation Model Using Sub-Role Hierarchies” Proceedings of the 18 th Computer and Information Sciences - ISCIS2003
: 811~818
[journal]
/ 2003
/ “Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment“ Proceedings of the 5 th Asia-Pacific Web Conference
: 287~292
[journal]
/ 2000
/ Proceedings of the fifth ACM workshop on Role-based access control
/ E. Bertino and P. A. Bonatti and E. Ferrari “TRBAC
: 21~30
[journal]
/ 2002
/ “Temporal Hierarchies and Inheritance Semantics for GTRBAC” Seventh ACM Symposium on Access Control Models and Technologies
: 74~83
[journal]
/ 2002
/ J. B. D. Joshi and E. Bertino and A. Ghafoor “Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model” Proceedings of the 26 th Annual International Computer Software and Applications Conference
[journal]
/ 2002
/ J. B. D. Joshi and E. Bertino and A. Ghafoor “Temporal Role Hierarchies in GTRBAC
[journal]
/ 2005.02
/ “기업환경의 접근제어를 위한 확장된 GTRBAC 모델”
/ 한국멀티미디어학회
8
(2)
: 211~224
[journal]
/ 2003
/ A Flexible Delegation Model in RBAC”
/ pp.149-157
: 2003~
[journal]
/ 2004.12
/ “Context를 고려한 확장된 GTRBAC 모델” 순천향산업기술연구소논문집
: 229~234
[journal]
/ 2002
/ “SECOS의 접근제어를 위한 RBAC의 구현”
7
(2)
: 9~18
[journal]
/ 2002
/ “정보시스템 보안을 위한 위험분석 모델”
9
(3)
: 60~67