1. R. Anderson, Security Engineering (2 nd . Ed.), Wiley, 2008.
2. M. Anisetti, C.A. Ardagna, and E. Damiani, “Container-level security certification of services”, International Workshop on Business System Management and Engineering (BSME 2010).
3. P. Avgeriou, “Describing, instantiating and evaluating a reference architecture: A case study”, Enterprise Architecture Journal, June 2003.
4. D. Bayliss, HPCC systems: Aggregated data analysis: The paradigm shift”, Lexis Nexis white paper, May 2011, http://hpccsystems.com
5. F. Braz, E.B. Fernandez, and M. VanHilst, “Eliciting security requirements through misuse activities” Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern’08). Turin, Italy, September 1–5, 2008. 328–333.