1. National Computer Security Center: A guide to understanding discretionary access control in trusted systems. Report NSCD-TG-003 Version 1 (1987)
2. Department of Defense (1985) Trusted computer system evaluation criteria. DoD 5200.28-STD, National Computer Security Center, USA
3. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
4. Caumanns, J., Kuhlisch, R., Pfaff, O., Rode, O.: IHE IT infrastructure technical framework white paper – access control. http://www.ihe.net/Technical_Framework/upload/IHE_ITI_TF_WhitePaper_AccessControl_2009-09-28.pdf (2009)
5. Health Level Seven International: HL7 implementation guide for CDA® release 2: digital signatures and delegation of rights, release 1. http://www.hl7.org/implement/standards/product_brief.cfm?product_id=375 (2014)