1. Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and Taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11–33 (2004)
2. Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley Longman Publishing Co., Inc, Boston (2003)
3. Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional, Boston (2012)
4. Clements, P., Northrop, L.: Software architecture: an executive overview. Technical report, CMU/SEI-96-TR-003, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (1996).
http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=12509
5. Firesmith, D.: Security use cases. J. Object Technol. 2(1), 53–64 (2003).
http://dx.doi.org/10.5381/jot.2003.2.3.c6