Role-based access control (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Role-based access control" in English language version.

refsWebsite
Global rank English rank
355th place
454th place
2nd place
2nd place
11th place
8th place
207th place
136th place
3rd place
3rd place
low place
low place
low place
low place
102nd place
76th place
low place
low place
low place
low place
low place
8,033rd place
low place
low place
1,185th place
840th place
120th place
125th place
low place
low place
1st place
1st place
18th place
17th place

acm.org

portal.acm.org

acronymfinder.com

books.google.com

brucker.ch

doi.org

handle.net

hdl.handle.net

harvard.edu

ui.adsabs.harvard.edu

idsynch.com

nist.gov

csrc.nist.gov

  • Ferraiolo, D.F. & Kuhn, D.R. (October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563.
  • Sandhu, R., Coyne, E.J., Feinstein, H.L. and Youman, C.E. (August 1996). "Role-Based Access Control Models" (PDF). IEEE Computer. 29 (2): 38–47. CiteSeerX 10.1.1.50.7649. doi:10.1109/2.485845. S2CID 1958270.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  • D.R. Kuhn (1998). "Role based access control on MLS systems without kernel changes". Proceedings of the third ACM workshop on Role-based access control (PDF). pp. 25–32. CiteSeerX 10.1.1.55.4755. doi:10.1145/286884.286890. ISBN 978-1-58113-113-0. S2CID 1711956.
  • "Role Based Access Control – FAQs". csrc.nist.gov. Computer Security Research Center. 2016-11-21. Retrieved 15 August 2018.
  • Ferraiolo, David; Kuhn, Richard (1992-10-13). "Role-Based Access Controls" (PDF). csrc.nist.gov: 554–563. Retrieved 15 August 2018.
  • D.R. Kuhn (1997). "Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems". Proceedings of the second ACM workshop on Role-based access control - RBAC '97 (PDF). pp. 23–30. doi:10.1145/266741.266749. ISBN 0897919858. S2CID 482687.
  • A.C. O'Connor & R.J. Loomis (March 2002). Economic Analysis of Role-Based Access Control (PDF). Research Triangle Institute. p. 145.
  • Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST model for role-based access control" (PDF). Proceedings of the fifth ACM workshop on Role-based access control. pp. 47–63. doi:10.1145/344287.344301. ISBN 158113259X. S2CID 14539795.{{cite book}}: CS1 maint: multiple names: authors list (link)
  • Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R. (Nov–Dec 2007). "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role-Based Access Control" (PDF). IEEE Security & Privacy. 5 (6): 51–53. doi:10.1109/MSP.2007.173. S2CID 28140142. Archived from the original (PDF) on 2008-09-17.{{cite journal}}: CS1 maint: multiple names: authors list (link)

psu.edu

citeseerx.ist.psu.edu

pucpr.br

secplab.ppgia.pucpr.br

researchgate.net

segfaults.net

knight.segfaults.net

semanticscholar.org

api.semanticscholar.org

tynamo.org

utdallas.edu

web.archive.org