1. Ashley, P., Hada, S., Karjoth, G., Powers, C, and Schunter, M. (2003). Enterprise Privacy Authorization Language (EPAL). Research Report 3485, IBM Research.
2. Berthold, O. and Köhntopp, M. (2001). Identity management based on P3P. In Lecture Notes in Computer Science, volume 2009, pages 141–160.
3. Campbell, R., Al-Muhtadi, I, Naldurg, P., Sampemane, G., and Mickunas, M. Dennis (2002). Towards security and privacy for pervasive computing. In Proceedings of the International Symposium on Software Security, Keio University, Keio University, Tokyo, Japan.
4. M. Casassa Mont, S. Pearson, P. Bramhall. Towards Accountable Management of Privacy and Identity Information. ESORICS 2003: 146–161
5. Chan, H., Lee, R., Dillon, T., and Chang, E. (2002). E-Commerce: Fundamentals and Applications. pages 287–298. ISBN: 0-471-49303-1.