1. Li X, He J (2011) A user-centric method for data privacy protection in cloud computing. In: 2011 international conference on computer, electrical, and systems sciences and engineering, pp 355–358
2. Bowen BM, Ben Salem M, Hershkop S (2009) Designing host and network sensors to mitigate the insider threat. IEEE Security Privacy Mag 7(6):22–29
3. Ferraiolo DF, Richard Kuhn D, Chandramouli R (2003) Role-based access control. Artech House, Norwood
4. Corradi A, Montanari R, Tibaldi D (2004) Context-based access control for ubiquitous service provisioning. In: Proceedings of the 28th annual international computer software and applications conference, Sep. IEEE Press, New York, pp 444–451
5. Han W, Zhang J, Yao X (2005) Context-sensitive access control model and implementation. In: Proceedings of the fifth international conference on computer and information technology. IEEE Press, New York, pp 757–763