1. R.W. Baldwin (1990). Naming and grouping privileges to simplify security management in large database. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland CA, pp. 61–70
2. D.E. Bell (1987). Secure computer systems: a network interpretation. Proceedings of 3rd Annual Computer Security Application Conference. pp. 32–39
3. Common Criteria Editorial Board (1996). Common Criteria for Information Technology Security, Version 1.0
4. D.F. Ferraiolo R. Kuhn (1992). Role-based access controls. Proceedings of 15th NIST-NCSC National Computer Security Conference, Baltimore MD. pp. 554–563
5. D.F. Ferraiolo D.M. Gilbert N. Lynch (1993). An examination of federal and commercial access control policy needs. Proceedings of NIST-NCSC National Computer Security Conference, Baltimore MD. pp. 107–116