1. Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: An extended RBAC profile of XACML. In: SWS 2006, pp. 13–22. ACM (2006)
2. Bertino, E., Bonatti, P., Ferrar, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 2011, 191–233 (2001)
3. Lecture Notes in Computer Science;K. Chen,2005
4. Connor, A., Loomis, R.: Economic analysis of role-based access control. Technical report, National Institute of Standards and Technology (2010)
5. Dalai, A.K., Jena, S.K.: Evaluation of web application security risks and secure design patterns. In: CCS 2011, pp. 565–568. ACM (2011)