1. Abassi, R., Fatmi, S.G.E.: Delegation management modeling in a security policy based environment. In: Bouhoula, A., Ida, T., Kamareddine, F. (eds.) SCSS. EPTCS, vol. 122, pp. 85–95 (2013)
2. Alam, M., Hafner, M., Breu, R.: Constraint based role based access control in the sectet–framework model-driven approach. Journal of Computer Security 16(2), 223–260 (2008)
3. Barka, E., Sandhu, R.: Role-based delegation model/hierarchical roles (rbdm1). In: 20th Annual Computer Security Applications Conference, pp. 396–404 (2004)
4. Barka, E., Sandhu, R.S.: Framework for role-based delegation models. In: 16th Annual Computer Security Applications Conference (ACSAC 2000), December 11-15. IEEE Computer Society, New Orleans (2000)
5. Lecture Notes in Computer Science;D. Basin,2007