K Sohr, M Drouineaud, G Ahn, M Gogolla. Analyzing and Managing Role-Based Access Control Policies. IEEE Transactions on Knowledge and Data Engineering, , Jan 2008.
the dependencies of IT systems wrt . Otherwise, unauthorized and consequently fraud may instead of `` - authorization constraint