1. Ching-Ting, L., et al.: A GIS-based simulator for CIIP interdependency analysis. In: International Computer Symposium (ICS), pp. 901–906 (2010)
2. Schaberreiter, T., et al.: Critical infrastructure security modelling and RESCI-MONITOR: a risk based critical infrastructure model. In: IST-Africa Conference Proceedings, pp. 1–8 (2011)
3. Bai, Q.H., Zheng, Y.: Study on the access control model in information security. In: IEEE Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), pp. 830–834 (2011)
4. Sandhu, S., et al.: Role-based access control models. Computer 29(2), 38–47 (1996)
5. El Kalam, A., et al.: Organization based access control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 120–131 (2013)