Bertino, Elisa (2011). "Access Control for Databases: Concepts and Systems". Foundations and Trends in Databases. 8 (1–2): 1–148. doi:10.1561/1900000014.
Schultz, Eugene (2007). "Risks due to convergence of physical security systems and information technology environments". Information Security Technical Report. 12 (2): 80–84. doi:10.1016/j.istr.2007.06.001.
Pereira, Henrique G. G.; Fong, Philip W. L. (2019). "SEPD: An Access Control Model for Resource Sharing in an IoT Environment". Computer Security – ESORICS 2019. Lecture Notes in Computer Science. Vol. 11736. Springer International Publishing. pp. 195–216. doi:10.1007/978-3-030-29962-0_10. ISBN978-3-030-29961-3. S2CID202579712.
Pereira, Henrique G. G.; Fong, Philip W. L. (2019). "SEPD: An Access Control Model for Resource Sharing in an IoT Environment". Computer Security – ESORICS 2019. Lecture Notes in Computer Science. Vol. 11736. Springer International Publishing. pp. 195–216. doi:10.1007/978-3-030-29962-0_10. ISBN978-3-030-29961-3. S2CID202579712.
Newman, Robert (2010). Security and access control using biometric technologies. Boston, Mass.: Course Technology. ISBN978-1-4354-9667-5. OCLC535966830.
Norman, Thomas L. (2014). Integrated security systems design : a complete reference for building enterprise-wide digital security systems (2nd ed.). Oxford [England]: Butterworth-Heinemann. ISBN978-0-12-800193-6. OCLC891396744.
Davies, Sandi J. (2019). The professional protection officer : practical security strategies and emerging trends. Lawrence J. Fennelly (2nd ed.). Amsterdam: Butterworth-Heinemann. pp. 166–167. ISBN978-0-12-817749-5. OCLC1131862780.
Fennelly, Lawrence J. (2019). Handbook of loss prevention and crime prevention (6th ed.). Amsterdam: Butterworth-Heinemann. p. 239. ISBN978-0-12-817273-5. OCLC1144727242.