1. Sharma, M., Sural, S., Vaidya, J., Atluri, V.: An administrative model for temporal role-based access control. Comput. Secur. 8303(39), 375–389 (2013)
2. Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31(1), 147–168 (2014)
3. Aqib, M., Shaikh, R.A.: Analysis and comparison of access control policies validation mechanisms. Int. J. Comput. Netw. Inf. Secur. 7(1), 54–69 (2014)
4. St-Martin, M., Felty, A.P.: Verified algorithm for detecting conicts in XACML access control rules. ACM Sigplan Conf. Certif. Programs Proofs 25(10), 166–175 (2016)
5. Lu, Q., Chen, J., Ma, H., Chen, W.: Optimization algorithm for extensible access control markup language policies. J. Comput. Sci. 44(12), 110–113 (2017)