1. Adaptive Cryptographic Access Control;Kayem,2010
2. Security Control—Chapter 4;Needham,2008
3. Authorization and access Control;Vimercati,2007
4. Information systems security—Chapter 6. In Information Systems for Business and Beyond; The Open Textbook Challenge by the Saylor Academyhttps://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
5. Key Elements of an Information Security Policyhttps://resources.infosecinstitute.com/key-elements-information-security-policy/#gref