1. ITU-T Rec X.812 (1995) I ISO/IEC 10181–3:1996 “Security Frameworks for open systems: Access control framework”
2. ACM Workshop on Role Based Access Control, 1996–2001. See
http://portal.acm.org/portal.cfm
for proceedings.
3. Adams, C., Lloyd, S. (1999). “Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations”. Macmillan Technical Publishing, 1999
4. Austin, T. “PM, A Wiley Tech Brief’, John Wiley and Son, ISBN: 0–471-35380–9, 2000
5. Wahl, M., Kille, S., Howes, T. “Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names”, RFC2253, December 1997.