1. Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3 (2000)
2. Lecture Notes in Computer Science;J. Ligatti,2005
3. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for Role-based Access Control: Towards a Unified Standard. In: Proc. of RBAC. ACM, New York (2000)
4. Gligor, V.D., Gavrila, S.I., Ferraiolo, D.F.: On the formal definition of separation-of-duty policies and their composition. In: Proc. of Symposium on Security and Privacy. IEEE, Los Alamitos (1998)
5. Spivey, M.: The Z notation: a reference manual. Prentice Hall International Ltd., Englewood Cliffs (1992)