1. Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston (1982)
2. Department of Homeland Security, Cybersecurity & Infrastructure Security Agency: Trusted internet connections (tic) 3.0 core guidance documents (2021). https://www.cisa.gov/resources-tools/resources/trusted-internet-connections-tic-30-core-guidance-documents
3. Fernandez, E.B., Summers, R.C., Wood, C.: Database Security and Integrity. Adison Wesley, Boston (1980)
4. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech, Norwood (2007)
5. Kindervag, J., Balaouras, S., Mak, K., Blackborow, J.: No more chewy centers: the zero trust model of information security. Technical report, Forrester Research (2016)