1. Information Security Management.;Murray,1993
2. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control: a multi-dimensional view," in Tenth Annual Computer Security Applications Conference,Dec 1994, pp. 54—62.
3. J. Barkley, "Comparing simple role based access control models and access control lists," in Proceedings of the Second ACM Workshop on Role-based Access Control,ser. RBAC ‘97. New York, NY, USA: ACM, 1997, pp. 127-132. [Online]. Available: http://doi.acm.Org/10.1145/266741.266769
4. Trbac: A temporal role-based access control model;Bertino,2001