[1]
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat.
Privacy-Aware Role-Based Access control [J]. ACM Transactions on
Information and System Security (TISSEC), 2010, Volume 13:1-31
[2]
Yoonjeong Kim et al. Privacy-aware Role Based Access Control Model:
Revisited for Multi-Policy Conflict Detection [C].
Information Science
and Applications (ICISA), Seoul, April 2010,1-7.
[3]
Qun Ni, E. Bertino. An obligation model bridging access control policies
and privacy policies[C]. SACAMT’08, NY, June 11-13 2008,133-142.
[4]
Elisa Bertino, Carolyn Brodie, Seraphin Calo. Analysis of Privacy and
Security Policies [J].IBM Journal of Research and Development,
2009,Volume 53,Issue 2:1-31.
[5]
Clarke E M, Grumberg O, Peled D A. Model checking [M].
Massachuetts,USA:MIT Press, 2000:33-163.
[6]
Vincent C.Hu, D.Richard Kuhn, Tao Xie, Jeehyun Hwang. Model
Checking for verification of mandatory access control models and
properties [J].International Journal of Software Engineering and
Knowledge Engineering. 2011,Volume 21,Issue 1:103-127
[7]
David Power, Mark Slaymaker, Andrew Simpson. Automatic
conformance checking of Role-based access control policies via Alloy
[J]. ESSo S, LNCS, 2011, 6542 :15-28.
[8]
M.Toahchoodee, I.Ray. Using Alloy to analyse a spatio-temporal access
control model supporting delegation[J]. Information Security,IET, 2009,
Volume3,Issue3:75-113.