1. Sohr, K., Drouineaud, M., Ahn, G.-J.: Analyzing and managing role-based access control policies. IEEE Trans. Knowl. Data Eng. 20(7), 924–939 (2008)
2. Cameron, K.: The Laws of Identity, vol. 12, pp. 8–11. Microsoft Corp (2005)
3. Mustafa, A.-B.: SCPKI: a smart contract-based PKI and identity system. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35–40. ACM, Abu Dhabi (2017)
4. Fromknecht, C., Velicanu, D., Yakoubov, S.: A decentralized public key infrastructure with identity retention. IACR Cryptology ePrint Archive 2014, 803 (2014)
5. Axon, L.: Privacy-awareness in Blockchain-based PKI. CDT Technical Paper Series 21, 15 (2015)