1. Computer security model: unified exposition and multics interpretation;Bell,1975
2. RBAC models – concepts and trends;Bertino;Comput Secur,2003
3. TRBAC: a temporal role-based access control model;Bertino;ACM Trans Inf Syst Secur,2001
4. Integrity considerations for secure computer systems;Biba,1977
5. The Chinese wall security policy;Brewer,1989