1. Lecture Notes in Computer Science;F. Alberti,2011
2. Cimatti, A., Clarke, E.M., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV: A New Symbolic Model Checker,
http://nusmv.fbk.eu
3. Lecture Notes in Computer Science;A. Cimatti,2002
4. de Moura, L., Berdine, J., Bjorner, N.: Z3 High-performance Theorem Prover,
http://z3.codeplex.com
5. Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554–563. Springer (1992)