A. Schaad, J. Moffett and J. Jacob, “The Role-Based Access Control System of a European Bank: A Case Study and Discussion,” Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, Chantilly, 3-4 May 2001, pp. 3-9. doi:10.1145/373256.373257
 D. Hahn, R. Shangraw, M. Keith and D. Coursey, “Does Visualization Affect Perceptions of Ethically Complex Policy Decisions: An Experimental Study,” Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hilton Waikoloa, 3-6 January 2007 p. 96.
 P. Rao, G. Ghinita, E. Bertino and J. Lobo, “Visualization for Access Control Policy Analysis Results Using MultiLevel Grids,” IEEE International Symposium on Policies for Distributed Systems and Networks, London, 20-22 July 2009.
 W. J. Xu, M. Shehab and G.-J. Ahn, “Visualization Based Policy Analysis: Case Study in SELinux,” Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, Estes Park, 11-13 June 2008.
 R. Reeder, L. Bauer, L. Cranor, M. Reiter, K. Bacon, K. How and H. Strong, “Expandable Grids for Visualizing and Authoring Computer Security Policies,” CHI’08: Proceedings of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, Florence, 5-10 April 2008.
 B. Shafiq, J. B. D. Joshi, E. Bertino and A. Ghafoor, “Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies,” IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 11, 2005, pp. 1557-1577.
 B. Johnson and B. Shneiderman, “Tree-Maps: A SpaceFilling Approach to the Visualization of Hierarchical Information Structures”, Proceedings of the 2nd Conference on IEEE Visualization, San Diego, 22-25 October 1991, pp. 284-291.