1. Andress, M.: Access control. Information security magazine (April 2001)
2. Barkley, B., Uppal: Supporting Relationships in Access Control using Role Based Access Control. In: Fourth ACM Workshop on Role-Based Access Control (1999)
3. Ferraiolo, D., Kuhn., D.R.: Role-based access control. In:15th National Computer Security Conference (1992)
4. Ferraiolo, D., Kuhn., D.R.: NIST/ITL Bulletin (December 1995)
5. Ferraiolo, D., Kuhn., D.R., Chandramouli, R.: Role-Based Access Control. Computer Security Series. Artech House (2003)