1. eWeek,
http://www.eweek.com/c/a/Security/Rethinking-Access-Controls-How-WikiLeaks-Could-Have-Been-Prevented/1/
2. Ferraiolo, D., Kuhn, D.: Role-based access control. In: Proceedings of the 15th National Computer Security Conference (1992)
3. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer, 38–47 (1996)
4. ANSI INCITS 359, Standard for Role Based Access Control (2004)
5. IFIP;A. Abdallah,2005