1. Bingyu, Z., Huanguo, Z., Xi, G., et al.: A fine-grained authorization model based on credibility in trusted network connection. J. Wuhan Univ. (Sci. Edn.) 02, 147–150 (2010)
2. Wu, C.: Fine-grained authorization delegation method based on quantitative roles. Comput. Eng. 13, 36–38 + 42 (2012)
3. Chaudhuri, S., Dutta, T., Sudarshan, S.: Fine grained authorization through predicated grants. In: IEEE International Conference on Data Engineering. IEEE (2007)
4. Sun, W., Shucheng, Y., Lou, W., et al.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014. IEEE (2014)
5. Wang, Q., Yu, T., Li, N., et al.: On the correctness criteria of fine-grained access control in relational databases. In: International Conference on Very Large Data Bases. DBLP (2007)