1. [1] Byun, J.-W., Bertino, E. and Li, N.: Purpose Based Access Control of Complex Data for Privacy Protection, Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05), pp.102-110 (2005).
2. [2] Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S. and Samarati, P.: A Privacy-Aware Access Control System, Journal of Computer Security, Vol.16, No.4, pp.369-397 (2008).
3. [3] Ni, Q., Bertino, E., Lobo, C., Brodie, C., Karat, C.-M., Karat, J. and Trombetta, A.: Privacy-Aware Role-Based Access Control, ACM Trans. on Information and System Security, Vol.13, No.3, pp.24: 1-24: 31 (2010).
4. [4] Liberty Alliance Project: Liberty IGF Privacy Constraints Specification (2008), available from <http://www.projectliberty.org/specs>.
5. Secure interoperation in a multidomain environment employing RBAC policies