SAP Labs, Inc. "Authorizations Mde Easy: Generating Authorization Profiles" Release 4.5 A/B. 1999. Palo Alto, Ca. cited by other
. Sandhu, Role-Based Access Control Models, IEEE Computer, Feb. 1996, pp. 38-44, vol. 29, No. 2. cited by other
. Ferraiolo, Role-based Access Contol Model & Reference Implemention W/in a Corporate Intranet, ACM Transactions on Info. & Sys. Security, Feb. 1999, pp. 34-64, vol. 2, No. 1. cited by other
. Sloman, Policy Based Management of Telecommunications Systems & Networks, http://www-dse.doc.ic.ac.uk/.about.mss, Sep. 28-29, 1998. cited by other
. The Ponder Policy Based Management Toolkit, http://www-dse.doc.ic.ac.uk/Research/Policies/index.shtml, Aug. 2002. cited by other
. L. Bartz, LDAP Schema for Role Based Access Control, Internet Draft, Oct. 21, 1997. cited by other
. Stokes, Access Control requirements for LDAP, Internet Draft, Feb. 16, 1998. cited by other
. Stokes, Access Control requirements for LDAP, Internet Draft, Aug. 10, 1998. cited by other
. Stokes, Access Control requirements for LDAP, Internet Draft, Jun. 25, 1999. cited by other
. L. Bartz, hyperDRIVE: Leveraging LDAP to Implement RBAC on the Web, IRS, US Dept of Treasury, Indianapolis, IN, Oct. 21, 1997. cited by other
. Stokes, Access Control requirements for LDAP, Internet Draft, May 2000. cited by other. |