1. Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston (1982)
2. Department of Homeland Security, Cybersecurity & Infrastructure Security Agency: Trusted Internet Connections (TIC) 3.0 core guidance documents (2021). https://www.cisa.gov/resources-tools/resources/trusted-internet-connections-tic-30-core-guidance-documents
3. Enokido, T., Barolli, V., Takizawa, M.: A legal information flow (LIF) scheduler based on role-based access control model. Int. J. Comput. Stand. Interfaces 31(5), 906–912 (2009)
4. Fernandez, E.B., Summers, R.C., Wood, C.: Database Security and Integrity. Adison Wesley, Boston (1980)
5. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech, Norwood (2007)