1. Lecture Notes;Samarati,2001
2. Authentication, access control and intrusion detection. CRC Handbook of Computer Science and Engineering. CRC Press, 1997; 1929-1948.
3. Flexible support for multiple access control policies
4. Role-based access control models
5. Separation of duties in computerized information systems. Proceedings of the IFIP WG11.3 Workshop on Database Security, Halifax, U.K., September 1990. North-Holland: The Netherlands.