1. Access control: Policies, models, and mechanisms;Samarati,2001
2. Role refinement in access control: Model and analysis;Xia;INFORMS J Comput,2014
3. Anomaly discovery and resolution in web access control policies;Hu,2011
4. How do system administrators resolve access-denied issues in the real world?;Xu,2017
5. Towards continuous access control validation and forensics;Xiang,2019