Luigi Giuri Role-Based Access Control on the Web Using Java. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:11-18 [Conf]
Konstantin Beznosov, Yi Deng A Framework for Implementing Role-Based Access Control Using CORBA Security Service. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:19-30 [Conf]
Trent Jaeger On the Increasing Importance of Constraints. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:33-42 [Conf]
Glenn Faden RBAC in UNIX Administration. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:95-101 [Conf]
Thomas Hildmann, Jörg Barholdt Managing Trust Between Collaborating Companies Using Outsourced Role Based Acces Control. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:105-111 [Conf]
John Linn, Magnus Nyström Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:121-130 [Conf]