1. Merging heterogeneous security orderings;Bonatti,1996
2. Database Security;Castano,1994
3. Oracle Corporation. Oracle Version 7, Chapters 6 & 7. http://www.oracle.com/products/oracle7/server/whitepapers/security/html/chap_6.html, 1995
4. An authorization model for federated systems;di Virmercati,1996
5. L. Hua, S. Osborn, Modeling unix access control with a role graph, in: Proceedings of International Conference on Computers and Information, June 1998