//-->
Computer security and protection structures
Walker, Bruce James, (1977)
Cryptography and data security
Denning, Dorothy Elizabeth Robling, (1983)
Cybersecurity : Technology and Governance
Jøsang, Audun, (2025)
A new role mining framework to elicit business roles and to mitigate enterprise risk
Colantonio, Alessandro, (2011)