1. Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A.V., Martin, D.M.: Automatic management of network security policy. In: DARPA Information Survivability Conference & Exposition II (DISCEX 2001), vol. 2. pp. 12–26. DARPA in cooperation with the IEEE Computer Society’s Technical Committee on Security and Privacy. IEEE, Anaheim, CA, 12–14 June 2001
2. Cheng, P.C., Rohatgi, P., Keser, C., Karger, P., Wagner, G., Reninger, A.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: IEEE Symposium on Security and Privacy, pp. 222–230, May 2007
3. Desharnais, J., Frappier, M., Khedri, R., Mili, A.: Integration of sequential scenarios. IEEE Trans. Softw. Eng. 24(9), 695–708 (1998)
4. Dijkstra, E., Scholten, C.: Predicate Calculus and Program Semantics. Springer-Verlag New York Inc., New York (1990)
5. Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554–563 (1992)