1. Basit, S., James, B.D., Joshi, M., Elisa, B., Arif, G.: Secure Interoperation in a Multi-domain Environment Employing RBAC Policies. IEEE Transactions on knowledge and data engineering 17(11) (November 2005)
2. Franco, A., Fabio, F., Enrico, N., Maurizio, T.: A Layered IT Infrastructure for Secure Interoperability in Personal Data Registry Digital Government Services. In: Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE 2004), pp. 95–102 (2004)
3. Freudenthal, E., Pesin, T., Port, L., Keenan, E., et al.: dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. In: Edward, K. (ed.) Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, pp. 411–420. IEEE Computer Society, Los Alamitos (2002)
4. Jalal, A., Apu, K., Roy, C., Dennis, M.: The A - IRBAC2000 Model: Administrative Interoperable Role-Base Access Control. ACM Transactions on Informatin and Systems Security 3(2), 173–182 (2001)
5. Park, J.S., Keith, P.C., Teresa, M.N., Josh, A.D.: A composite rbac approach for large, complex organizations. In: ACM Symposium on Access Control Models and Technologies, pp. 163–172 (2004)