1. Database management system sybase.
http://infocenter.sybase.com/help/index.jsp
2. Date, C.J.: An Introduction to Database Systems, 8th edn. Addison-Wesley, Reading (2013)
3. Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley, Reading (1982)
4. Enokido, T., Takizawa, M.: Purpose-based information flow control for cyber engineering. IEEE Trans. Ind. Electron. 58(6), 2216–2225 (2011)
5. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Controls, 2nd edn. Artech House, Norwood (2007)