1. Role-based access control with X.509 attribute certificates
2. , , . A user-centered, modular authorization service built on an RBAC foundation. IEEE Symposium on Security and Privacy. IEEE Computer Press: Los Alamitos, CA, 1999; 57-71.
3. The protection of information in computer systems
4. Role-based access control models
5. , , . The access control system of a European bank—a case study. Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT), Chantilly, VA. ACM Press: New York, 2003.