1. Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL). Research Report 3485, IBM Research (2003),
http://www.zurich.ibm.com/security/enterprise-privacy/epal/specification
2. Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P privacy policies and privacy authorization. In: Proc. 1st ACM Workshop on Privacy in the Electronic Society (WPES), pp. 103–109 (2002)
3. Belokosztolszki, A., Moody, K.: Meta-policies for distributed role-based access control systems. In: Proc. 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 106–115 (2002)
4. Bettini, C., Jajodia, S., Wang, X.S., Wijesekerat, D.: Obligation monitoring in policy management. In: Proc. 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 2–12 (2002)
5. Bonatti, P.A., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A componentbased architecture for secure data publication. In: Proc. 17th Annual Computer Security Applications Conference, pp. 309–318 (2001)