1. Lecture Notes in Computer Science;N Ayeb,2016
2. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;E Bacis,2017
3. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, pp. 123–134, September 2007
4. Marz, N., Warren, J.: Big Data: Principles and Best Practices of Scalable Real-Time Data Systems. Manning Publications Co., New York (2015)
5. OASIS Committee Draft: XACML v3.0 multiple decision profile (2010).
https://docs.oasis-open.org/xacml/3.0/xacml-3.0-multiple-v1-spec-cd-03-en.html
. Accessed 10 July 2018