[
1.Kuhn, D. R., E. J. Coyne, T. R. Weil. Adding Attributes to Role-Based Access Control – IEEE Computer, Vol. 43, 2010, No 6, pp. 79-81.10.1109/MC.2010.155
]Search in Google Scholar
[
2. Ferraiolo, D. F., D. R. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007.
]Search in Google Scholar
[
3. Ferraiolo, D. F., R. Sandhu, S. Gavrila, D. R. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. – ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980
]Search in Google Scholar
[
4. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models – IEEE Computer, Vol. 29, February 1996, No 2, pp. 38-47.10.1109/2.485845
]Search in Google Scholar
[
5. Hu, V. C., D. Ferrariolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute Based Access Control (ABAC) Definitions and Considerations – In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162
]Search in Google Scholar
[
6. Jin, X., R. Krishnan, R. Sandhu. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. – In: IFIP Annual Conference on Data and Applications Security and Privacy. Vol. 7371. Springer, 2012, pp. 41-55.
]Search in Google Scholar
[
7. Frederick, G., M. Daniel, S. Sandra, G. Carol. Information Technology Control and Audit. Auerbach Publications, 2004.
]Search in Google Scholar
[
8. Smith, R. E. Authentication From Passwords to Public Keys. Addison Wesley, 2002.
]Search in Google Scholar
[
9. Sandhu, R., P. Samarati. Authentication, Access Control, and Audit. – ACM Comput. Surv., Vol. 28, March 1996, No 1, pp. 241-243.10.1145/234313.234412
]Search in Google Scholar
[
10. Schlegel, M., P. Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-Based Access Control Policies. – In: Proc. of 17th International Joint Conference on e-Business and Telecommunications (ICETE’2020) – SECRYPT, 2020, pp. 431-442. ISBN: 978-989-758-446-6, ISSN 2184-7711, DOI: 10.5220/0009834304310442.10.5220/0009834304310442
]Search in Google Scholar
[
11. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security – In: Hindawi, Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069
]Search in Google Scholar
[
12. Chatterjee, A., Y. Pitroda, M. Parmar. Dynamic Role-Based Access Control for Decentralized Applications – In: Blockchain – ICBC 2020. Lecture Notes in Computer Science. Vol. 12404. Springer, Cham, 2020, pp. 185-197. DOI: 10.1007/978-3-030-59638-5_13.10.1007/978-3-030-59638-5_13
]Search in Google Scholar
[
13. Abdalla, M., D. Catalano, R. Gay, B. Ursu. Inner-Product Functional Encryption with Fine-Grained Access Control. – In: S. Moriai, H. Wang, Eds. Advances in Cryptology – ASIACRYPT 2020. ASIACRYPT 2020. Lecture Notes in Computer Science. Vol. 12493. Cham., Springer, 2020, pp. 467-497. https://doi.org/10.1007/978-3-030-64840-4_1610.1007/978-3-030-64840-4_16
]Search in Google Scholar
[
14. Ding, S., J. Cao, C. Li, K. Fan, H. Li. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT – In: IEEE Access, Vol. 7, 2019, pp. 38431-38441. DOI: 10.1109/ACCESS.2019.2905846.10.1109/ACCESS.2019.2905846
]Search in Google Scholar
[
15. Sun, S., S. Chen, R. Du. Trusted and Efficient Cross-Domain Access Control System Based on Blockchain. – Scientific Programming, Vol. 2020, 2020, Article ID 8832568. 13 p. https://doi.org/10.1155/2020/883256810.1155/2020/8832568
]Search in Google Scholar
[
16. Albulayhi, K., A. Abuhussein, F. Alsubaei, F. T. Sheldon. Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. – In: 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 748-755. DOI: 10.1109/CCWC47524.2020.9031179.10.1109/CCWC47524.2020.9031179
]Search in Google Scholar
[
17. Li, H., L. Pei, D. Liao, S. Chen, M. Zhang, D. Xu. FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain. – IEEE Access, Vol. 8, 2020, pp. 85190-85203. DOI: 10.1109/ACCESS.2020.2992203.10.1109/ACCESS.2020.2992203
]Search in Google Scholar
[
18. Meneka, M., K. Meenakshisundaram. An Enhancement Role and Attribute Based Access Control Mechanism in Big Data. – International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, 2018, No 5, pp. 3187-3193. ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5pp3187-3193.
]Search in Google Scholar
[
19. Zigmonda, E., S. Chonga, C. Dimoulasb, S. Moorec. Fine-Grained Language-Based Access Control for Database-Backed Applications – The Art, Science, and Engineering of Programming, Vol. 4, 2020, No 2, Article 3. 30 p. DOI: 10.22152/programming-journal.org/2020/4/3.10.22152/programming-journal.org/2020/4/3
]Search in Google Scholar
[
20. Ding, Y., H. Sato. Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment. – In: Proc. of 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 2020, pp. 17-22. DOI: 10.1109/MobileCloud48802.2020.00011.10.1109/MobileCloud48802.2020.00011
]Search in Google Scholar
[
21. Liu, M., C. Yang, H. Li, Y. Zhang. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks. – In: Sensors 2020, Vol. 20, 2020, No 6, 1741. 15 p. https://doi.org/10.3390/s2006174110.3390/s20061741714746732245041
]Search in Google Scholar
[
22. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-38.10.1515/cait-2016-0002
]Search in Google Scholar
[
23. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027
]Search in Google Scholar
[
24. Ekran Systems https://www.ekransystem.com/en/blog/rbac-vs-abac
]Search in Google Scholar
[
25. Penelov. Last Access Mart 2021. https://packagist.org/packages/laravelroles/rolespermissions
]Search in Google Scholar
[
26. PenelovLast Access Mart 2021. https://github.com/MGP-Ucict/mpenelova
]Search in Google Scholar
[
27. SpatiLast Access Mart 2021. https://github.com/spatie/laravel-permission
]Search in Google Scholar
[
28. SilbeLast Access Mart 2021. https://github.com/JosephSilber/bouncer
]Search in Google Scholar
[
29. KenedLast Access Mart 2021. https://github.com/jeremykenedy/laravel-roles
]Search in Google Scholar