Access Control Hierarchies
Read Carefully
- Ravi Sandhu, “Role Hierarchies and Constraints for
Lattice-Based Access Controls.” Proc.
Fourth European Symposium on Research in Computer Security, Rome,
Italy, September 25-27, 1996, pages 65-79. Published as Lecture Notes in
Computer Science, Computer Security-ESORICS96 (Elisa Bertino et al,
editors), Springer-Verlag, 1996. pdf
- Ravi Sandhu, “Role
Activation Hierarchies.” Proc. Third ACM
Workshop on Role-Based Access Control, Fairfax, Virginia,
October 22-23, 1998,
pages 33-40. pdf
- Sylvia
Osborn, Ravi Sandhu and Qamar Munawer. “Configuring
Role-Based Access Control to Enforce Mandatory and Discretionary Access
Control Policies.” ACM Transactions
on Information and System Security, Volume 3, Number 2, May 2000,
pages 85-106. pdf
Limit to MAC portion. This paper
includes material from 1 and 2.
- Jason
Crampton. “On permissions,
inheritance and role hierarchies.”
Proceedings of the 10th ACM
conference on Computer and communications security, Washington D.C
2003, pages: 85-92. Available in
ACM digital library through GMU.