A first step towards formal verification of security policy properties for RBAC | IEEE Conference Publication | IEEE Xplore