1. DoD Computer Security Center, Trusted Computer System Evaluation Criteria, December 1985.
2. D. Brewer, M.J. Nash, The Chinese Wall security policy, in: Proceedings of the IEEE Symposium on Security and Privacy, 1989, pp. 206–214.
3. D. Ferraiolo, R. Kuhn, Role-Based Access Control, in: Proceedings of the 15th NIST-NCSC Computer Security Conference, Washington, DC, 1992, pp. 554–563.
4. D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security (TISSEC) 4 (3) (2001) 224–274. .
5. Role-Based Access Control models;Sandhu;IEEE Computer,1996