. 5g-ppp, View on 5G Architecture (Version 2.0), 2017.

D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn, Role-Based Access Control (RBAC): Features and Motivations, 11th Annual Computer Security Applications Conference, 1995.

V. C. Hu, D. R. Kuhn, D. F. Ferraiolo, and J. Voas, Attribute-Based Access Control, Computer, vol.48, issue.2, 2015.

L. Badger and D. F. Sterne, Practical Domain and Type Enforcement for UNIX, IEEE Symposium on Security and Privacy, 1995.

D. E. Bell and L. J. Lapadula, Secure Computer Systems: Mathematical Foundations, Mitre Corp Bedford MA, Tech. Rep. MTR-2547, vol.1, 1973.

D. E. Denning, A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, 1976.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Rolebased access control models, Computer, vol.29, issue.2, 1996.

R. S. Sandhu and P. Samarati, Access control: Principle and practice, IEEE Communications Magazine, vol.32, issue.9, 1994.

K. A. Oostendorp and . Badger, Domain and type enforcement firewalls, DISCEX'00, vol.1, 2000.

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, 1993.

M. Gasser, Building a Secure Computer System, 1988.

L. J. Lapadula and D. E. Bell, Secure computer systems: A mathematical model, Citeseer, Tech. Rep, 1996.

O. Salman and A. Kayssi, Multi-level security for the 5G/IoT ubiquitous network, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), 2017.

H. Xue, A Multilevel Security Model for Private Cloud, Chinese Journal of Electronics, 2014.

P. Watson, A Multi-Level Security Model for Partitioning Workflows over Federated Clouds, 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 2011.

L. Logrippo and A. Stambouli, Configuring data flows in the Internet of Things for security and privacy requirements, 11th International Symposium on Foundations and Practice of Security (FPS 2018), 2018.

U. Tupakula, V. Varadharajan, and K. Karmakar, Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance, Advanced Information Networking and Applications, 2020.

A. Alshehri and R. Sandhu, Access Control Models for Virtual Object Communication in Cloud-Enabled IoT, 2017 IEEE International Conference on Information Reuse and Integration (IRI), 2017.

R. Gopi and A. Rajesh, Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks, Cluster Comput, 2017.

V. Oleshchuk and R. Fensli, Remote Patient Monitoring Within a Future 5G Infrastructure, Wireless Pers Commun, vol.57, issue.3, 2011.

. Pattaranantakul, Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds, IEEE Transactions on Dependable and Secure Computing, 2018.

, Specification # 23.501, 3GPP, 2018.

. 5g-ensure, Deliverable D2.7 -Security Architecture, 2016.

, Specification # 23.502, 3GPP, 2019.