1. Corin, R., Etalle, S., den Hartog, J., Lenzini, G., Staicu, I.: A Logic for Auditing Accountability in Decentralized Systems, vol. 173, pp. 187–202. Springer, Berlin (2004)
2. Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J..: An Audit Logic for Accountability. In: IEEE Computer Society, pp. 34–43 (2005)
3. Department of Defense Trusted Computer System Evaluation Criteria, CSC-STD-011-83, Fort Meade, MD (1983)
4. Bell, D., LaPadula, L.: Secure Computer System: Unified Exposition and Multics Interpretation. MITRE, Bedford (1975)
5. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference, Baltimore, MD (1992)