R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Rolebased access control models, Computer, vol.29, issue.2, 1996.

K. A. Oostendorp and . Badger, Domain and type enforcement firewalls, DISCEX'00, vol.1, 2000.

L. Badger and D. F. Sterne, Practical Domain and Type Enforcement for UNIX, IEEE Symposium on Security and Privacy, 1995.

L. J. Lapadula and D. E. Bell, Secure computer systems: A mathematical model, Citeseer, Tech. Rep, 1996.

D. E. Denning, A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, 1976.

O. Salman and A. Kayssi, Multi-level security for the 5G/IoT ubiquitous network, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), 2017.

H. Xue, A Multilevel Security Model for Private Cloud, Chinese Journal of Electronics, 2014.

L. Logrippo and A. Stambouli, Configuring data flows in the Internet of Things for security and privacy requirements, 11th International Symposium on Foundations and Practice of Security (FPS 2018), 2018.

R. Gopi and A. Rajesh, Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks, Cluster Comput, 2017.

. Pattaranantakul, Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds, IEEE Transactions on Dependable and Secure Computing, 2018.

, Specification # 23.501, 3GPP, 2018.