1. [1] B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor, “Secure interoperation in a multidomain environment employing rbac policies,” IEEE Trans. Knowl. Data Eng., vol.17, no.11, pp.1557-1577, Nov. 2005.
2. [2] M. Shehab, K. Bhattacharya, and A. Ghafoor, “Web services discovery in secure collaboration environments,” ACM Trans. Internet Technol., vol.8, pp.554-563, Nov. 2007.
3. [3] D.F. Ferraiolo and R. Kuhn, “Role-based access control,” Proc. 15th NIST-NSA National Computer Security Conference, 1992.
4. [4] OASIS XACML TC, “eXtensible access control markup language (XACML) v3.0,” http://www.oasis-open.org/committees/xacml/, Aug. 2010.
5. [5] OASIS Security Services (SAML) TC, “Security assertion markup language. (SAML) V2.0,” http://www.oasis-open.org/committees/security/, March 2005.