1. R.J. Anderson. Why cryptosystems fail. Communications of the ACM, 37 (11): 32–40, November 1994.
2. Bertino, E., Origgi, F., and P. Samarati,“A New Authorization Model for Object-Oriented Databases,” Proceedings, IFIP WG 11.3 8th International working conference on Database Security, Bad Salzdetfurth, Germany, August, 1994.
3. J. Biskup, H. H. Brueggemann, The Personal Model of Data: Towards a Privacy- Oriented Information System, Computers & Security, 7 (1988) pp. 575–597.
4. T. A. Brooks and M M. Kaplan. Security technologies. AT&T Technical Journal, 73 (5): 4–8, September/October 1994.
5. The Common Object Request Broker: Architecture and Specification OMG Document number 91.12.1, December, 1991.