1. Ahn, G.J., Shin, M.E.: Role-based authorization constraints specification using Object Constraint Language. In: WETICE 2001. Proceedings of the 10th IEEE International Workshops on Enabling Technologies, pp. 157–162. IEEE Computer Society, Washington, DC, USA (2001)
2. Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39–91 (2006)
3. Boulton, R.J., Gordon, A., Gordon, M.J.C., Harrison, J., Herbert, J., Van Tassel, J.: Experience with Embedding Hardware Description Languages in HOL. In: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, pp. 129–156. North-Holland, Amsterdam (1992)
4. Brito e Abreu, F.: Using OCL to formalize object oriented metrics definitions. Technical Report ES007/2001, FCT/UNL and INESC, Portugal (June 2001), available at
http://ctp.di.fct.unl.pt/QUASAR/Resources/Papers/others/MOOD_OCL.pdf
5. Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for Role-Based Access Control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)