“…In the literature numerous approaches have been presented dealing with challenging issues related to access control (e.g., [12,20,21,22]). Most of these approaches apply Role-Based Access Control (RBAC) models for defining and managing user privileges [6,23,20,24], e.g., to control the access to business documents and database objects, or to resolve the set of actors that qualify for a newly activated task in a workflow system [25,4,8,21,26,22].…”