Sloman, Policy Based management of Telecommunications Systems & Networks, http://www-dse.doc.ic.ac.uk/.about.mss. cited by other
. The PONDER Policy Based Management Toolkit, http://www-dse.doc.ic.ac.uk/Research/Policies/index.shtml, Aug. 2002. cited by other
. L Bartz, LDAP Schema for Role Based Access Control, Internet Draft, Oct. 21, 1997. cited by other
. Stokes, Access Control Requirements for LDAP, Internet Draft, Feb. 16, 1998. cited by other
. Stokes, Access Control Requirements for LDAP, Internet Draft, Aug. 10, 1998. cited by other
. Stokes, Access Control Requirements for LDAP, Internet Draft, Jun. 25, 1999. cited by other
. L. Bartz, hyperDRIVE: Leveraging LDAP to Implement RBAC on the Web, IRS, US Dept of Treasury, Indianapolis, IN. cited by other
. Stokes, Access Control Requirements for LDAP, Internet Draft, May 2000. cited by other
. SAP Labs, Inc. "Authorizations Mde Easy: Generating Authorization Profiles" Release 4.5 A/B. 1999. Palo Alto, Ca. cited by other
. Sandhu, Role-Based Access Control Models, IEEE Computer, Feb. 1996, pp. 38-40, vol. 29, No. 2. cited by other
. Ferraiolo, "Role-Based Access Crontrol Model & Reference Implementation w/in A Corporate Intranet," ACM Transactions on Info & Sys Security, Feb 1999, vol. 2, No. 1. cited by other. |