Hartig et al., "Mechanisms for persistence and security in birlix", IEEE/INSPEC, pp. 309-318. May, 1990. |
Born et al., "Discretionary access control by means of usage conditions", IEEE/INSPEC, pp. 437-450, vol.: 13, No. 5, Jan. 1994. |
Hu et al., "User-role based security profiles for an object-oriented design model", IEEE/INSPEC, pp. 333-348, vol. A-21, Aug. 1992. |
Hu et al., "User-role based security profiles for an object -oriented design model", Compendex Plus, issue: N. A-21, pp. 333-348, Aug. 1993. |
Demurjian et al. "Towards an authorization mechanism for user-role based serity in an object-oriented design model", IEEE, pp. 195-202, Jul. 1993. |
Biskup et al. "The personal model of data: Towards a privacy-oriented information system", IEEE, pp. 575-597, Dec. 1988. |
Ting et al., "Requirements, capabilities and functionalities of user-role based security for an object-oriented design model", IEEE, pp. 275-296, Nov. 1991. |
Jonscher. D, "Extending access control with duties-realized by active mechanisms", IEEE/INSPEC, pp. 91-111, vol.: A-21, Aug. 1992. |
Kelter. U, "Type-level access control for distributed structurally object-oriented database systems", IEEE/INSPEC, pp. 2-40, Nov. 1992. |
Jonscher et al., "A role-based modelling of access control with the held of frames", IEEE/INSPEC, pp. 147-158, May 1991. |