Dunlop N, Indulska J, Raymond K: Methods for conflict resolution in policy-based management systems. Proceedings of 7th IEEE International Enterprise Distributed Object Computing Conference (EDOC '03), September 2003, Brisbane, Queensland, Australia 98–109.
Abadi M: Logic in access control. Proceedings of 18th Annual IEEE Symposium on Logic in Computer Science, June 2003, Ottawa, Ontario, Canada 228–233.
Jajodia S, Samarati P, Subrahmanian VS: A logical language for expressing authorizations. Proceedings of IEEE Symposium on Security and Privacy, May 1997, Oakland, Calif, USA 31–42.
Newman A: Approximating the maximum acyclic subgraph, M.S. thesis. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass, USA; 2000.
Schneider FB: Enforceable security policies. ACM Transactions on Information and System Security 2000,3(1):30–50. 10.1145/353323.353382
Walker D: A type system for expressive security policies. Symposium on Principles of Programming Languages (POPL '00), January 2000, Boston, Mass, USA 254–267.
Hoagland JA, Pandey R, Levitt KN: Security policy specification using a graphical approach. In Tech. Rep. CSE-98–3. University of California, Davis Department of Computer Science, Davis, Calif, USA; July 1998.
Bell DE, LaPadula LJ: Secure computer systems: mathematical foundations and model. In Tech. Rep. M74–244. MITRE Corporation, Bedford, Mass, USA; 1973.
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE: Role-based access control models. Computer 1996,29(2):38–47. 10.1109/2.485845
Sandhu RS, Samarati P: Access control: principles and practice. IEEE Communications Magazine 1994,32(9):40–48. 10.1109/35.312842
Blaze M, Feigenbaum J, Lacy J: Decentralized trust management. Proceedings of IEEE Symposium on Security and Privacy, May 1996, Oakland, Calif, USA 164–173.
Bartal Y, Mayer A, Nissim K, Wool A: Firmato: a novel firewall management toolkit. Proceedings of IEEE Symposium on Security and Privacy, May 1999, Oakland, Calif, USA 17–31.