1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. of the 28th symposium on Principles of Programming Languages POPL 2001, pp. 104–115. ACM Press, New York (2001)
2. Abiteboul, S., Hull, R., Vianu, V.: Foundations of databases. Addison-Wesley, Reading (1995)
3. Lecture Notes in Computer Science;R. Amadio,1999
4. Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: Proc. of 6th ACM Conference on Computer and Communications Security, CCS 1999 (1999)
5. Becker, M.Y., Sewell, P.: Flexible trust management, applied to electronic health records. In: Proc. of the 17th IEEE Computer Security Foundations Workshop CSFW 2004. IEEE Computer Society Press, Los Alamitos (2004)