1. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001)
2. Box, D.: Essential COM, 1st edn. Addison-Wesley Longman Publishing Co., Inc., Boston (1997)
3. Calvi, A., Ranise, S., Vigano, L.: Automated validation of security-sensitive web services specified in BPEL and RBAC. In: Proceedings of the 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC ’10, Washington, DC, USA, 2010, pp. 456–464. IEEE Computer Society
4. Chen, B.-C., Yang, C.-T., Yeh, H.-T., Lin, C.-C.: Mutual authentication protocol for role-based access control using mobile RFID. Appl. Sci. 6(8), 215 (2016)
5. Chen, H.-C.J., Violetta, M.A., Yang, C.-Y.: Contract RBAC in cloud computing. J. Supercomput. 66(2), 1111–1131 (2013)