1. Ahuja, R., Magnanti, T., Orlin, J.: Network flows: theory, algorithms, and applications. Prentice Hall, Englewood Cliffs (1993)
2. Aura, T.: On the structure of delegation networks. In: Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1998, pp. 14–26. IEEE Computer Society Press, Los Alamitos (1998)
3. Benczúr Pushdown-reduce, A.A.: an algorithm for connectivity augmentation and poset covering problems. Discrete Applied Mathematics 129(2-3), 233–262 (2003)
4. Lecture Notes in Computer Science;T. Beth,1994
5. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 6-8, pp. 164–173. Oakland, CA,USA (1996)