1. Alqhatani, A., Lipford, H.: “There is nothing that i need to keep secret”: sharing practices and concerns of wearable fitness data. In: Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara (2019)
2. Andreoli, J., Pacull, F., Pagani, D., Pareschi R.: Multiparty negotiation of dynamic distributed object services. J. Sci. Comput. Program. 31, 2–3 (1998)
3. Barkley, J.F., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Proceedings of the Third ACM Workshop on Role Based Access Control, pp. 55–65 (1999)
4. Beam, C., Segev, A.: Electronic Catalogs and Negotiations. CITM Working Paper 96-WP-1016 (1996)
5. Bellare, M., Roga way, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, pp. 62–73. IEEE, New York (1993)