S. Bartsch, A calculus for the qualitative risk assessment of policy override authorization, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.62-70, 2010.
DOI : 10.1145/1854099.1854115

P. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner et al., Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.222-230, 2007.
DOI : 10.1109/SP.2007.21

N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y. Lee et al., Enforcing Access Control Using Risk Assessment, Fourth European Conference on Universal Multiservice Networks (ECUMN'07), pp.419-424, 2007.
DOI : 10.1109/ECUMN.2007.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.510.6592

S. Kandala, R. Sandhu, and V. Bhamidipati, An attribute based framework for riskadaptive access control models, Proceedings the 6th International Conference on Availability, Reliability and Security (ARES'11), 2011.
DOI : 10.1109/ares.2011.41

R. Mcgraw, Risk adaptive access control (RAdAC), Proceedings of NIST & NSA Privilege Management Workshop, 2009.

Q. Ni, E. Bertino, and J. Lobo, Risk-based access control systems built on fuzzy inferences, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.250-260, 2010.
DOI : 10.1145/1755688.1755719

Q. Wang and H. Jin, Quantified risk-adaptive access control for patient privacy protection in health information systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.406-410, 2011.
DOI : 10.1145/1966913.1966969