1. Reconfiguring Role Based Access Control Policies Using Risk Semantics;Aziz Benjamin;J. High Speed Netw.,2006
2. Usage Control on Cloud systems
3. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
4. Department of Defense Standard CSC-STD-001--83. 1985. Department of Defense Trusted Computer System Evaluation Criteria. DoD Computer Security Center. (Dec. 1985). Department of Defense Standard CSC-STD-001--83. 1985. Department of Defense Trusted Computer System Evaluation Criteria. DoD Computer Security Center. (Dec. 1985).
5. Gianluca Dini Fabio Martinelli Ilaria Matteucci Marinella Petrocchi Andrea Saracino and Daniele Sgandurra. 2016. Risk analysis of Android applications: A user-centric solution. Future Generation Computer Systems (2016). 10.1016/j.future.2016.05.035 Gianluca Dini Fabio Martinelli Ilaria Matteucci Marinella Petrocchi Andrea Saracino and Daniele Sgandurra. 2016. Risk analysis of Android applications: A user-centric solution. Future Generation Computer Systems (2016). 10.1016/j.future.2016.05.035