1. Lampson, B.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, pp. 437–443, March 1971
2. Bell, D.E., LaPadula, L.J.: Secure computer systems: unified exposition and multics interpretation. Technical report ESD-TR-73-306, The MITRE Corporation, March 1976
3. Kuhn, D.F.: Role-based access controls. In: 15th National Computer Security Conference, pp. 554–563 (1992)
4. EI Kalam, A.A.: ORBAC: un modèle de contrôle d’accès basé sur les organisations (2003)
5. Sandhu, R.S., Samarati, P.: Access controls, principles and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)