1. Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control toEnforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3(2), 85–106 (2000)
2. Jiang, Y., Lin, C., Yin, H., Tan, Z.: Security Analysis of Maindatory Access Control Model, Systems, Man and Cybernetics 6, 5013–5018 (2004)
3. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NISC National Computer Security Conference, October 13-16, pp. 554–563. Baltimore, MD (1992)
4. Joshi, J.B.D., Bertino, E., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. reference IEEECS (accepted December 9, 2003. Published online November 18, 2004)
5. Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for gtrbac. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 74–83. ACM, New York (2002)