G. Ahn and R. Sandhu, Role-based authorization constraints specification, ACM Transactions on Information and System Security, vol.3, issue.4, pp.207-226, 2010.
DOI : 10.1145/382912.382913

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.3419

S. Berhe, S. Demurjian, and T. Agresta, Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC, 23rd Annual IFIP Working Conference on Data and Applications Security, 2009.
DOI : 10.1145/1057977.1057979

E. Bertino, E. Ferrari, and V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1, pp.65-104, 1999.
DOI : 10.1145/300830.300837

T. Budd, An Introduction to Object-Oriented Programming, 1997.

P. Centonze, G. Naumovich, J. S. Fink, and M. Pistoia, Role-Based access control consistency validation, Proceedings of the 2006 international symposium on Software testing and analysis , ISSTA'06, 2006.
DOI : 10.1145/1146238.1146253

D. D. 'amour, L. Goulet, L. Jean-francois, S. L. Martin-rodriguez, and P. Raynald, A model and typology of collaboration between professionals in healthcare organizations, BMC Health Services Research, 2008.

J. Juerjens, Secure Systems Development with UML, SpringerVerlag, 2003.

N. Li, M. Tripunitara, and Z. Bizri, On mutually exclusive roles and separation-ofduty, ACM Transaction of Information System Security, 2007.
DOI : 10.1145/1237500.1237501

J. Pavlich-mariscal, S. Demurjian, and D. M. Laurent, A framework of composable access control features: Preserving separation of access control concerns from models to code Special issue on software engineering for secure systems, Science Direct, vol.29, pp.350-379, 2010.

R. Sandhu, D. F. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

Y. Sun, X. Shijun, and P. L. Peng, Flexible Workflow Incorporated with RBAC, Proceedings of the 9th International Conference on Computer Supported Cooperative Work, pp.525-534, 2005.
DOI : 10.1007/11686699_53

A. Teilans, A. Kleins, U. Sukovskis, Y. Merkuryev, and I. Meirans, A Meta-Model Based Approach to UML Modelling, Tenth International Conference on Computer Modeling and Simulation (uksim 2008), pp.667-672, 2008.
DOI : 10.1109/UKSIM.2008.60

K. R. Thomas, Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997.
DOI : 10.1145/266741.266748

J. Zarnett, M. Tripunitara, and P. Lam, Role-based access control (RBAC) in Java via proxy objects using annotations, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, 2010.
DOI : 10.1145/1809842.1809858