1. Policy-Driven Role-Based Access Management for Ad-Hoc Collaboration;Ahn Gail-Joon;J. Comput. Secur.,2012
2. Policy templates for relationship-based access control
3. Chahal Arora , Syed Zain R. Rizvi , and Philip W.L. Fong . 2022 . Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. In Symposium on Access Control Models and Technologies (SACMAT '22) . ACM, New York, NY, USA, 223--234. Chahal Arora, Syed Zain R. Rizvi, and Philip W.L. Fong. 2022. Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. In Symposium on Access Control Models and Technologies (SACMAT '22). ACM, New York, NY, USA, 223--234.
4. Leila Bahri , Barbara Carminati , and Elena Ferrari . 2015 . CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs. In Conference on Collaboration and Internet Computing (CIC). IEEE, 36--45 . Leila Bahri, Barbara Carminati, and Elena Ferrari. 2015. CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs. In Conference on Collaboration and Internet Computing (CIC). IEEE, 36--45.
5. Clara Bertolissi , Jerry Hartog , and Nicola Zannone . 2019 . Using Provenance for Secure Data Fusion in Cooperative Systems. In Symposium on Access Control Models and Technologies. ACM, 185--194 . Clara Bertolissi, Jerry Hartog, and Nicola Zannone. 2019. Using Provenance for Secure Data Fusion in Cooperative Systems. In Symposium on Access Control Models and Technologies. ACM, 185--194.