D. F. Ferraiolo, R. D. Kuhn, and R. Chandramouli, Role-Based Access Control Massive data loss at HCA. Retrieved, 2003.

R. Richardson, 2006 CSI/FBI Computer Crime and Security Survey Computer Security Institute Using First- Order Logic to Reason about Policies, 2006.

C. M. Husek, ELGA The Electronic Health Record in Austria International Conference of Society for Medical Innovation and Technology. Vienna, Austria. Internet Engineering Task Force The Transport Layer Security (TLS) Protocol Version 1.2. Retrieved, 2002.

T. Liebert, F. Massacci, N. Zannone, A. Trombetta, E. Bertino et al., Ongoing concern over Pentagon network attack. IT News Digest Privacy Is Linking Permission to Purpose ?asterCard Open Data Storage Version 2.0. Technical SpecificationsPrivacy-aware role based access, Proceedings of the 12th ACM symposium on Access control models and technologie, pp.179-191, 2002.

C. D. Pedersen, A. With, P. Pucheral, S. P. Yin, L. Bouganim et al., MedCom -the Danish Healthcare Data Network Meeting System and Method of Managing Indexation of Flash Memory, PicoDBMS: Scaling down database techniques for the smartcard. Very Large Data Bases Journal (VLDBJ), pp.120-132, 2001.

L. Røstad and O. Nytrø, Personalized access control for a personally controlled health record, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pp.9-16, 2008.
DOI : 10.1145/1456508.1456511