1. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706–734 (1993)
2. Alqhatani, A., Lipford, H.: “there is nothing that i need to keep secret”: sharing practices and concerns of wearable fitness data. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), Santa Clara. USENIX Association, Berkeley (2019)
3. Arenas, M., Libkin, L.: A normal form for xml documents. ACM Trans. Database Syst. 29(1), 195–232 (2004)
4. Aura, T.: Distributed access-rights management with delegation certificates. In: Security Internet Programming, pp. 211–235. Springer, Berlin (1999)
5. Barka, E., Sandhu, R.: Framework for role-based delegation models and some extensions. In: Proceedings of the 16 Annual Computer Security Applications Conference, New Orleans, pp. 168–177 (2000)