Barkley, "Role Based Access Control (RBAC)," Software Diagnostics and Conformance Testing National Institute of Standards and Technology (Mar. 1998). |
Gavrila and Barkley, "Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management," (Oct. 1998). |
Barkley, "Application Engineering in Health Care," pp. 1-7 (May 9, 1995). |
Cugini and Ferraiolo, "Role Based Access Control Slide Set--May 1995," National Institute of Standards and Technology (1995). |
Smith, Sr. et al., "A Marketing Survey of Civil Federal Government Organizations to Determine the Need for a Role-Based Access Control (RBAC) Security Product," Seta Corporation (Jul. 1996). |
Ferraiolo and Barkley, "Specifying and Managing Role-Based Access Control within a Corporation Intranet," (1997). |
Ferraiolo et al., "Role-Based Access Control (RBAC): Features and Motivations," (1995). |
Kuhn, "Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems," (1997). |
Barkley, "Comparing Simple Role Based Access Control Models and Access Control Lists," (1997). |
Barkley et al., "Role Based Access Control for the World Wide Web," (1997). |
Ferraiolo and Kuhn, "Role-Based Access Control," Reprinted from Proceedings of 15.sup.th National Computer Security Conference (1992). |
Barkley, "Implementing Role Based Access Control using Object Technology,"(1995). |
Tucker (editor), "The Computer Science and Engineering Handbook", chapter 49, pp. 1112-1124 and chapter 91, pp. 1929-1948 (1996). |