1. Karp, A.H., Haury, H., Davis, M.H.: From ABAC to ZBAC: The Evolution of Access Control Models. Technical Report HPL-2009-30, HP Labs (2009)
2. Trusted Computer Security Evaluation Criteria (TCSEC), DOD 5200.28-STD. Department of Defense (1985)
3. Ferraiolo, D., Kuhn, D.R.: Role-Based Access Control. In: NIST-NSA National (USA) Computer Security Conference, pp. 554–563 (1992)
4. Pujol, J.M., Sangüesa, R., Delgado, J.: Extracting Reputation in Multi Agent System by Means of Social Network Topology. In: International Joint Conference on Autonomous Agents and Multi-Agent Systems AAMAS 2002, Bologna, Italy, vol. 1, pp. 467–474 (2002)
5. Morchon, O.G., Wehrle, K.: Modular context aware access control for medical sensor networks. In: 15th ACM Symposium on Access Control Models and Technologies (SACMAT), USA (2010)