1. Hansmann, U. (2003). Pervasive computing: the mobile world. Berlin: Springer. ISBN 3540002189.
2. Ahmed, A., & Zhang, N. (2009). Towards the realisation of context-risk-aware access control in pervasive computing. Telecommunication Systems Journal. doi: 10.1007/s11235-009-9240-3 .
3. Winsborough, W. H., & Li, N. (2002). Towards practical automated trust negotiation. In Proceedings of the 3rd international workshop on policies for distributed systems and networks (POLICY’02) Monterey, CA, USA.
4. Lecture notes in computer science;D. Zou,2008
5. Li, N., Winsborough, W. H., & Mitchell, J. C. (2003). Distributed credential chain discovery in trust management. Journal of Computer Security, 11, 35–86.