1. Adams, M., ter Hofstede, H. M. A., Edmond, D., & van der Aalst, W. M. P. (2006). Implementing Dynamic Flexibility in Workflows using Worklets. Technical Report BPM-06-06. BPM Center.
2. Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic Databases. In Proceedings of the 28th International Conference on Very Large Data Bases (VLDB '02).
3. An Ontology for Privacy-Aware Access Control in Network Monitoring Environments.;A.Antonakopoulou;Journal of Research and Practice in Information Technology
4. Leveraging Access Control for Privacy Protection: A Survey;A.Antonakopoulou;Privacy protection measures and technologies in business organizations: aspects and standards,2012
5. Bertino, E., Catania, B., Damiani, M. L., & Perlasca, P. (2005). GEO-RBAC: A spatially aware RBAC. In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT ’06) (pp. 29-37). New York, NY: ACM.