@@ -2,7 +2,7 @@
> Authorization decisions are based on the relationship between the resource owner
> and the resource accessor in a social network maintained by the protection
-> system.
+> system. [1]
A Social Network System (SNS) maintains a social network for at least two reason:
@@ -113,10 +113,14 @@ relationships can be "activated" simultaneously.
## Conclusion
-Relationship-Based Access Control works best in application domains in which
-binary relations are more natural for expressing authorization decisions than
-unary relations (e.g., roles).
+>Relationship-Based Access Control works best in application domains in which
+>binary relations are more natural for expressing authorization decisions than
+>unary relations (e.g., roles).
## See also
-* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong](https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf)
+* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong][1]
+* [Learning Relationship-Based Access Control Policies from Black-Box Systems][2]
+
+[1]: https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf
+[2]: https://dl.acm.org/doi/pdf/10.1145/3517121