Roshan K. Thomas Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:13-19 [Conf]
D. Richard Kuhn Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:23-30 [Conf]
Sylvia L. Osborn Mandatory access control and role-based access control revisited. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:31-40 [Conf]
Roland Awischus Role based access control with the security administration manager (SAM). [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:61-68 [Conf]
Larry S. Bartz hyperDRIVE: leveraging LDAP to implement RBAC on the Web. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:69-74 [Conf]
Christian Friberg, Achim Held Support for discretionary role based access control in ACL-oriented operating systems. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:83-94 [Conf]
Raymond K. Wong RBAC support in object-oriented role databases. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:109-120 [Conf]
John F. Barkley Comparing simple role based access control models and access control lists. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:127-132 [Conf]
Emil Lupu, Morris Sloman Reconciling role based management and role based access control. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:135-141 [Conf]
Tor Didriksen Rule based database access control - a practical approach. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:143-151 [Conf]