1. Lecture Notes in Computer Science;S Aghaee,2012
2. Colin, J.-N., Simon, B.: D7.2: Second generation of iTEC shells and composer. iTEC Project deliverable 7.2. University of Namur (2012)
3. Crocker, D. (ed.): Augmented BNF for Syntax Specifications: ABNF. RFC 5234 (2008).
http://tools.ietf.org/html/rfc5234
4. De Keukelaere, F., Bhola, S., Steiner, M., Chari, S., and Yoshihama, S.: Smash: secure component model for cross-domain mashups on unmodified browsers. In: Proceedings of the 17th international conference on World Wide Web, pp. 535–544. ACM Press, New York (2008)
5. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)