1. U.S. Department of health and human services personal health records and the HIPAA privacy rule (2008).
http://www.hhs.gov
2. Shete, S.S., Kulkarni, C.S.: Database security using role-based access control system. Int. J. Eng. Sci. Comput. 6(6), 8047-5053 (2016)
3. Karimi, F., Esmaeilpour, M.: A dynamic media access control protocol for controlling congestion in wireless sensor network by using fuzzy logic system and learning automata. Int. J. Comput. Sci. Inf. Secur. 14(4), 445–460 (2016)
4. Onarliogluamd, K., Robertson, W.: Overhaul: input-driven access control for better privacy on traditional operating systems. In: International Conference on Dependable Systems and Networks, pp. 443–454 (2016)
5. Xiao, P., He, J.H., Fu, Y.F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 115–120 (2012)