A. Anderson, XACML profile for Role Based Access Control, 2004.

. Ni, B. Qun, L. Elisa, B. Jorge, C. Carolyn et al., Privacy-aware Role-Based Access Control, ACM Transaction Information and System Security, vol.24, pp.1-2431, 2010.
DOI : 10.1145/1805974.1805980

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.4222-274, 2001.
DOI : 10.1145/501978.501980

URL : http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf

C. Vincent, D. F. Hu, D. R. Ferraiolo, and . Kuhn, Assessment of access control system. National Institute of Standards and Technology, 2006.

C. A. Ardagna, M. Cremonini, S. De-capitani-di-vimercati, and P. Samarati, A privacy-aware access control system, Journal of Computer Security (JCS), pp.369-392, 2008.
DOI : 10.3233/JCS-2008-0328

URL : http://seclab.dti.unimi.it/Papers/ACDS-JCS2008.pdf

A. Th, J. Rath, and . Colin, Towards enforcement of purpose for privacy policy in distributed healthcare, The 3rd IEEE International Conference on Consumer eHealth Platforms, Services and Applications (CeHPSA), 2013.

. Frederic, A. Cuppens, and . Nora, Cuppens. Modeling Contextual Security Policies in OrBAC, International Journal of Information Security (IJIS), vol.7, issue.4, pp.285-305, 2008.

E. Yuan and J. Tong, Attribute based access control a new access control approach for service oriented architectures (soa), 2005.