1. Shin, Moon Sun, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee, and Seon-Phil Jeong. 2015. Constructing RBAC based security model in u-healthcare service platform. The Scientific World Journal 937914: 13. https://doi.org/10.1155/2015/937914.
2. Moon, Chang-Joo, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik. 2004. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. Computers & Security 23.
3. Sun, Yuqing, Qihua Wang, Ninghui Li, Elisa Bertino, and Mikhail Atallah. 2011. On the complexity of authorization in RBAC under qualification and security constraints. IEEE Transactions on Dependable and Secure Computing: 86.
4. Information technology—information and data management; Research conducted at China Medical University and hospital has provided new information about information and data management (CBR-based negotiation RBAC model for enhancing ubiquitous resources management). Computers, Networks & Communications (2017).
5. Fischer, Jeffrey, Daniel Marino, Rupak Majumdar, and Todd Millstein. 2009. Fine-Grained Access Control with Object-Sensitive Roles. Berlin, Heidelberg: Springer.