How to Securely Break into RBAC: The BTG-RBAC Model. (2009)

by A Ferreira, D Chadwick
Venue:Annual Computer Security Applications Conference (ACSAC),